OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures
G. Rajendran, R S Ragul Nivash, Purushotham Parthiban Parthy, et al.
(2019)
Closed Access | Times Cited: 46

Showing 1-25 of 46 citing articles:

Machine learning approaches to IoT security: A systematic literature review
Rasheed Ahmad, Izzat Alsmadi
Internet of Things (2021) Vol. 14, pp. 100365-100365
Closed Access | Times Cited: 203

Lightweight Cryptography for the Internet of Things
Alaa Hassan
Advances in intelligent systems and computing (2020), pp. 780-795
Closed Access | Times Cited: 155

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, et al.
Sustainability (2021) Vol. 13, Iss. 16, pp. 9463-9463
Open Access | Times Cited: 60

IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Neurocomputing (2023) Vol. 551, pp. 126533-126533
Closed Access | Times Cited: 15

IoT Vulnerabilities and Attacks: SILEX Malware Case Study
Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1978-1978
Open Access | Times Cited: 15

Forensics and security issues in the Internet of Things
Shams Forruque Ahmed, Shanjana Shuravi Shawon, Afsana Bhuyian, et al.
Wireless Networks (2025)
Open Access

Challenges in detecting security threats in WoT: a systematic literature review
Ruhma Sardar, Tayyaba Anees, Ahmad Sami Al-Shamayleh, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 7
Open Access

Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking
Eman Shaikh, A. R. Al-Ali, Shahabuddin Muhammad, et al.
IEEE Access (2023) Vol. 11, pp. 26358-26374
Open Access | Times Cited: 12

Health IoT Threats: Survey of Risks and Vulnerabilities
Samaneh Madanian, Tserendorj Chinbat, Subasinghage Maduka Nuwangi, et al.
Future Internet (2024) Vol. 16, Iss. 11, pp. 389-389
Open Access | Times Cited: 3

Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
Aarón David Echeverría, Cristhian Cevallos, Iván Ortiz-Garcés, et al.
Applied Sciences (2021) Vol. 11, Iss. 7, pp. 3260-3260
Open Access | Times Cited: 23

Device-specific security challenges and solution in IoT edge computing: a review
Aditi Roy, J. Kokila, N. Ramasubramanian, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 18, pp. 20790-20825
Closed Access | Times Cited: 8

Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks
Danilo Bruschi, Andrea Di Pasquale, Andrea Lanzi, et al.
Journal of Computer Security (2024), pp. 1-29
Closed Access | Times Cited: 1

Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale
Brennan Huber, Farah Kandah
2023 IEEE International Conference on Consumer Electronics (ICCE) (2024), pp. 1-6
Closed Access | Times Cited: 1

A Conceptual Framework for Securing IoT-BIM
Baydaa Hashim Mohammed, Afifuddin Husairi, Hasimi Sallehudin, et al.
(2022), pp. 68-71
Closed Access | Times Cited: 6

Strength of Deep Learning-based Solutions to Secure Healthcare IoT: A Critical Review
Arul Treesa Mathew, M. Prasanna
The Open Biomedical Engineering Journal (2023) Vol. 17, Iss. 1
Open Access | Times Cited: 3

Smart Home IoT Cybersecurity Survey: A Systematic Mapping
Leonardo Ayavaca-Vallejo, Diego Ávila-Pesantez
(2023), pp. 1-6
Closed Access | Times Cited: 3

An analysis of security challenges and their perspective solutions for cloud computing and IoT
Muhammad Muhammad, Tahir Alyas, Faraz Ahmad, et al.
ICST Transactions on Scalable Information Systems (2018), pp. 166718-166718
Open Access | Times Cited: 7

Deep Residual CNN for Preventing Botnet Attacks on The Internet of Things
D. Tsany Rahmantyo, Bayu Erfianto, Gandeva Bayu Satrya
2021 4th International Conference of Computer and Informatics Engineering (IC2IE) (2021), pp. 462-466
Closed Access | Times Cited: 6

Penetration Testing: Smart Home IoT Devices
Ashok Adarsh Angadi, Cihan Varol, Narasimha Shashidhar
Lecture notes in computer science (2023), pp. 33-46
Closed Access | Times Cited: 2

Intrusion Detection System for IoT: Analysis of PSD Robustness
Lamoussa Sanogo, Éric Alata, Alexandru Takacs, et al.
Sensors (2023) Vol. 23, Iss. 4, pp. 2353-2353
Open Access | Times Cited: 2

Applications of IoT and Various Attacks on IoT
Sumeet Dhillon, Nishchol Mishra, Devendra Kumar Shakya
Lecture notes in networks and systems (2023), pp. 705-719
Closed Access | Times Cited: 2

Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation
Ahmad Mustafa Mohamad Al-Aboosi, Samar Kamil, Siti Norul Huda Sheikh Abdullah, et al.
(2021)
Closed Access | Times Cited: 5

A Systematic Mapping Study on Intrusion Response Systems
Adel Rezapour, Mohammad GhasemiGol, Daniel Takabi
IEEE Access (2024) Vol. 12, pp. 46524-46550
Closed Access

Page 1 - Next Page

Scroll to top