OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things
Salma Khanam, Ismail Ahmedy, Mohd Yamani Idna Idris, et al.
IEEE Access (2020) Vol. 8, pp. 219709-219743
Open Access | Times Cited: 91

Showing 1-25 of 91 citing articles:

Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends
AKM Bahalul Haque, Bharat Bhushan, Gaurav Dhiman
Expert Systems (2021) Vol. 39, Iss. 5
Closed Access | Times Cited: 212

Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 17

Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 17

Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
Moustafa Mamdouh, Ali Ismail Awad, Ashraf A. M. Khalaf, et al.
Computers & Security (2021) Vol. 111, pp. 102491-102491
Open Access | Times Cited: 81

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, et al.
Sustainability (2021) Vol. 13, Iss. 16, pp. 9463-9463
Open Access | Times Cited: 60

Revisiting the internet of things: New trends, opportunities and grand challenges
Khalid Elgazzar, Haytham Khalil, Taghreed Alghamdi, et al.
Frontiers in the Internet of Things (2022) Vol. 1
Open Access | Times Cited: 39

Internet of robotic things for mobile robots: Concepts, technologies, challenges, applications, and future directions
Homayun Kabir, Mau‐Luen Tham, Yoong Choon Chang
Digital Communications and Networks (2023) Vol. 9, Iss. 6, pp. 1265-1290
Open Access | Times Cited: 37

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
Princy Victor, Arash Habibi Lashkari, Rongxing Lu, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1380-1431
Open Access | Times Cited: 31

Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques
Mohammed Aziz Al Kabir, Wael Elmedany, Mhd Saeed Sharif
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 4, pp. 199-223
Open Access | Times Cited: 31

Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22

A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
Mumin Adam, Mohammad Hammoudeh, Rana Alrawashdeh, et al.
IEEE Access (2024) Vol. 12, pp. 57128-57149
Open Access | Times Cited: 8

Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1

IoT and Man‐in‐the‐Middle Attacks
Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai
Security and Privacy (2025) Vol. 8, Iss. 2
Open Access | Times Cited: 1

A Systematic Review on Recent Trends, Challenges, Privacy and Security Issues of Underwater Internet of Things
Delphin Raj Kesari Mary, Eunbi Ko, Seung-Geun Kim, et al.
Sensors (2021) Vol. 21, Iss. 24, pp. 8262-8262
Open Access | Times Cited: 49

Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, et al.
Cluster Computing (2021) Vol. 25, Iss. 3, pp. 1729-1748
Closed Access | Times Cited: 42

Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer
Mauro Tropea, Mattia Giovanni Spina, Floriano De Rango, et al.
Future Internet (2022) Vol. 14, Iss. 5, pp. 145-145
Open Access | Times Cited: 32

Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
Palak Bagga, Ashok Kumar Das, Vinay Chamola, et al.
Telecommunication Systems (2022) Vol. 81, Iss. 1, pp. 125-173
Open Access | Times Cited: 26

RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures
Eid Rehman, Muhammad Haseeb-ud-Din, Arif Jamal Malik, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8890-8924
Closed Access | Times Cited: 25

Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments
Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, et al.
Computers & Security (2022) Vol. 122, pp. 102904-102904
Open Access | Times Cited: 25

Adversarial machine learning in IoT from an insider point of view
Fatimah Aloraini, Amir Javed, Omer Rana, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103341-103341
Open Access | Times Cited: 25

A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
Mohammed Bouzidi, Nishu Gupta, Faouzi Alaya Cheikh, et al.
IEEE Access (2022) Vol. 10, pp. 101362-101384
Open Access | Times Cited: 22

A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
Mudassar Ali Khan, Ikram Ud Din, Tha’er Majali, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9089-9089
Open Access | Times Cited: 22

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Neurocomputing (2023) Vol. 551, pp. 126533-126533
Closed Access | Times Cited: 15

An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
Internet of Things (2024) Vol. 27, pp. 101314-101314
Open Access | Times Cited: 5

Towards Robust Cyber Attack Taxonomies: A Survey with Requirements, Structures, and Assessment
Paulo Roberto dos Santos, Paulo Angelo Alves Resende, João José Costa Gondim, et al.
ACM Computing Surveys (2025) Vol. 57, Iss. 8, pp. 1-36
Closed Access

Page 1 - Next Page

Scroll to top