
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22
Showing 22 citing articles:
Empowering homes with intelligence: An investigation of smart home technology adoption and usage
Sara Gøthesen, Moutaz Haddara, Karippur Nanda Kumar
Internet of Things (2023) Vol. 24, pp. 100944-100944
Open Access | Times Cited: 33
Sara Gøthesen, Moutaz Haddara, Karippur Nanda Kumar
Internet of Things (2023) Vol. 24, pp. 100944-100944
Open Access | Times Cited: 33
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 6
Deepak Adhikari, Wei Jiang, Jinyu Zhan, et al.
Computer Science Review (2024) Vol. 54, pp. 100665-100665
Closed Access | Times Cited: 6
Attack Detection in Smart Home IoT Networks: A Survey on Challenges, Methods and Analysis
M. Vinay Kuma Rreddy, Amit Lathigara, Muthangi Kantha Reddy
Broadband Communications, Networks and Systems (2025), pp. 310-319
Closed Access
M. Vinay Kuma Rreddy, Amit Lathigara, Muthangi Kantha Reddy
Broadband Communications, Networks and Systems (2025), pp. 310-319
Closed Access
Testbeds and Evaluation Frameworks for Anomaly Detection within Built Environments: A Systematic Review
Mohammed Alosaimi, Omer Rana, Charith Perera
ACM Computing Surveys (2025)
Closed Access
Mohammed Alosaimi, Omer Rana, Charith Perera
ACM Computing Surveys (2025)
Closed Access
An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz F. Carvalho, et al.
IEEE Access (2024) Vol. 12, pp. 70690-70706
Open Access | Times Cited: 4
Reliability Model and Emergency Maintenance Strategies for Smart Home Systems
Hongyan Dui, Xinyue Wang, Xinghui Dong, et al.
Reliability Engineering & System Safety (2024) Vol. 251, pp. 110402-110402
Closed Access | Times Cited: 4
Hongyan Dui, Xinyue Wang, Xinghui Dong, et al.
Reliability Engineering & System Safety (2024) Vol. 251, pp. 110402-110402
Closed Access | Times Cited: 4
A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions
Md. Motiur Rahman, Deepti Gupta, Smriti Bhatt, et al.
Future Internet (2024) Vol. 16, Iss. 4, pp. 139-139
Open Access | Times Cited: 3
Md. Motiur Rahman, Deepti Gupta, Smriti Bhatt, et al.
Future Internet (2024) Vol. 16, Iss. 4, pp. 139-139
Open Access | Times Cited: 3
An intelligent multi-layer framework with SHAP integration for botnet detection and classification
Swechchha Gupta, Buddha Singh
Computers & Security (2024) Vol. 140, pp. 103783-103783
Closed Access | Times Cited: 2
Swechchha Gupta, Buddha Singh
Computers & Security (2024) Vol. 140, pp. 103783-103783
Closed Access | Times Cited: 2
Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security
Abbas Javed, Muhammad Naeem Awais, Ayyaz-Ul-Haq Qureshi, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7320-7320
Open Access | Times Cited: 1
Abbas Javed, Muhammad Naeem Awais, Ayyaz-Ul-Haq Qureshi, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7320-7320
Open Access | Times Cited: 1
Analyzing and detecting Botnet Attacks using Anomaly Detection with Machine Learning
R. Barath Ramesh, S. John Justin Thangaraj
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 911-915
Closed Access | Times Cited: 4
R. Barath Ramesh, S. John Justin Thangaraj
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 911-915
Closed Access | Times Cited: 4
Near Field Communication Studies in Transportation Business
Sri Sarjana
(2023), pp. 266-271
Closed Access | Times Cited: 4
Sri Sarjana
(2023), pp. 266-271
Closed Access | Times Cited: 4
Legal Challenges in Overcoming Changes in Social Behaviour Due to the Development of Technology and Information
Salsa Octaviani Suryanto, Aji Mulyana
Golden Ratio of Law and Social Policy Review (2024) Vol. 3, Iss. 2, pp. 84-96
Open Access | Times Cited: 1
Salsa Octaviani Suryanto, Aji Mulyana
Golden Ratio of Law and Social Policy Review (2024) Vol. 3, Iss. 2, pp. 84-96
Open Access | Times Cited: 1
Data-driven Technology Applications in Planning, Demand-side Management, and Cybersecurity for Smart Household Community
Dipanshu Naware, Arghya Mitra
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4868-4883
Closed Access | Times Cited: 1
Dipanshu Naware, Arghya Mitra
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4868-4883
Closed Access | Times Cited: 1
Surveying Strategies: Detecting Sinkhole Attacks in IoT Networks
S. Shanthini, C. Sheeba Joice
Lecture notes in networks and systems (2024), pp. 101-121
Closed Access
S. Shanthini, C. Sheeba Joice
Lecture notes in networks and systems (2024), pp. 101-121
Closed Access
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
Omair Faraj, David Megías, Joaquín García-Alfaro
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-11
Closed Access
Omair Faraj, David Megías, Joaquín García-Alfaro
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-11
Closed Access
Addressing the necessity of cybersecurity literacy: the case of ETTCS CyberTeach project
Apostolos Xenakis, Vasileios Vlachos, Pedro Juan Roig, et al.
Information and Computer Security (2024)
Closed Access
Apostolos Xenakis, Vasileios Vlachos, Pedro Juan Roig, et al.
Information and Computer Security (2024)
Closed Access
Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization
Juan Ignacio Iturbe-Araya, Helena Rifà-Pous
International Journal of Information Security (2024) Vol. 24, Iss. 1
Open Access
Juan Ignacio Iturbe-Araya, Helena Rifà-Pous
International Journal of Information Security (2024) Vol. 24, Iss. 1
Open Access
Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps
Asma Touqir, Faisal Iradat, Abdur Rakib, et al.
Research Square (Research Square) (2024)
Closed Access
Asma Touqir, Faisal Iradat, Abdur Rakib, et al.
Research Square (Research Square) (2024)
Closed Access
Real-Time Anomaly Detection in IoT Networks with Random Forests and Bayesian Optimization
Santosh Lavate, Priyeshu Srivastava
Lecture notes in networks and systems (2024), pp. 333-344
Closed Access
Santosh Lavate, Priyeshu Srivastava
Lecture notes in networks and systems (2024), pp. 333-344
Closed Access
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Preventing and Detecting Malware in Smart Environments. The Smart Home Case
Shruti Kulkarni, Alexios Mylonas, Stilianos Vidalis
Advances in information security (2024), pp. 395-410
Closed Access
Shruti Kulkarni, Alexios Mylonas, Stilianos Vidalis
Advances in information security (2024), pp. 395-410
Closed Access
An Intelligent Multi-Layer Framework with Shap Integration for Botnet Detection and Classification
Swechchha Gupta, Buddha Singh
(2023)
Closed Access | Times Cited: 1
Swechchha Gupta, Buddha Singh
(2023)
Closed Access | Times Cited: 1