
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
HEKA: A Novel Intrusion Detection System for Attacks to Personal Medical Devices
Akm Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, et al.
(2020), pp. 1-9
Closed Access | Times Cited: 52
Akm Iqtidar Newaz, Amit Kumar Sikder, Leonardo Babun, et al.
(2020), pp. 1-9
Closed Access | Times Cited: 52
Showing 1-25 of 52 citing articles:
A survey on IoT platforms: Communication, security, and privacy perspectives
Leonardo Babun, Kyle Denney, Z. Berkay Celik, et al.
Computer Networks (2021) Vol. 192, pp. 108040-108040
Open Access | Times Cited: 181
Leonardo Babun, Kyle Denney, Z. Berkay Celik, et al.
Computer Networks (2021) Vol. 192, pp. 108040-108040
Open Access | Times Cited: 181
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 149
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 149
A survey on wireless body area networks: architecture, security challenges and research opportunities
Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha Kalutarage
Computers & Security (2021) Vol. 104, pp. 102211-102211
Open Access | Times Cited: 123
Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha Kalutarage
Computers & Security (2021) Vol. 104, pp. 102211-102211
Open Access | Times Cited: 123
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100
Reliable and Resilient AI and IoT-Based Personalised Healthcare Services: A Survey
Najma Taimoor, Semeen Rehman
IEEE Access (2021) Vol. 10, pp. 535-563
Open Access | Times Cited: 78
Najma Taimoor, Semeen Rehman
IEEE Access (2021) Vol. 10, pp. 535-563
Open Access | Times Cited: 78
An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications
Ankita Anand, Shalli Rani, Divya Anand, et al.
Sensors (2021) Vol. 21, Iss. 19, pp. 6346-6346
Open Access | Times Cited: 67
Ankita Anand, Shalli Rani, Divya Anand, et al.
Sensors (2021) Vol. 21, Iss. 19, pp. 6346-6346
Open Access | Times Cited: 67
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 63
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 63
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68
Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
Philip Virgil Astillo, Daniel Gerbi Duguma, Hoonyong Park, et al.
Future Generation Computer Systems (2021) Vol. 128, pp. 395-405
Closed Access | Times Cited: 41
Philip Virgil Astillo, Daniel Gerbi Duguma, Hoonyong Park, et al.
Future Generation Computer Systems (2021) Vol. 128, pp. 395-405
Closed Access | Times Cited: 41
Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, et al.
Proceedings on Privacy Enhancing Technologies (2020) Vol. 2021, Iss. 1, pp. 145-166
Open Access | Times Cited: 40
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, et al.
Proceedings on Privacy Enhancing Technologies (2020) Vol. 2021, Iss. 1, pp. 145-166
Open Access | Times Cited: 40
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
Mohammed Zubair, Ali Ghubaish, Devrim Ünal, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8280-8280
Open Access | Times Cited: 24
Mohammed Zubair, Ali Ghubaish, Devrim Ünal, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8280-8280
Open Access | Times Cited: 24
Attack Detection for Medical Cyber-Physical Systems–A Systematic Literature Review
Simon Weber, Stefan Stein, Michael Pilgermann, et al.
IEEE Access (2023) Vol. 11, pp. 41796-41815
Open Access | Times Cited: 15
Simon Weber, Stefan Stein, Michael Pilgermann, et al.
IEEE Access (2023) Vol. 11, pp. 41796-41815
Open Access | Times Cited: 15
IoT Security: Challenges, IDS Evolution and AI Defensive Schemes: A Review
Neeraj Kumar, Sanjeev Sharma
Communications in computer and information science (2025), pp. 25-55
Closed Access
Neeraj Kumar, Sanjeev Sharma
Communications in computer and information science (2025), pp. 25-55
Closed Access
An interpretable dimensional reduction technique with an explainable model for detecting attacks in Internet of Medical Things devices
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Swati Lipsa, Ranjan Kumar Dash, Nikola Ivković
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Investigation of Machine Learning Techniques in Intrusion Detection System for IoT Network
S. Shinly Swarna Sugi, S. Raja Ratna
(2020), pp. 1164-1167
Closed Access | Times Cited: 35
S. Shinly Swarna Sugi, S. Raja Ratna
(2020), pp. 1164-1167
Closed Access | Times Cited: 35
A Self-Learning Approach for Detecting Intrusions in Healthcare Systems
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Georgios Efstathopoulos, et al.
ICC 2022 - IEEE International Conference on Communications (2021), pp. 1-6
Open Access | Times Cited: 31
Panagiotis Radoglou-Grammatikis, Panagiotis Sarigiannidis, Georgios Efstathopoulos, et al.
ICC 2022 - IEEE International Conference on Communications (2021), pp. 1-6
Open Access | Times Cited: 31
CPS Device-Class Identification via Behavioral Fingerprinting: From Theory to Practice
Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2413-2428
Open Access | Times Cited: 22
Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2413-2428
Open Access | Times Cited: 22
Federated Intrusion Detection In NG-IoT Healthcare Systems: An Adversarial Approach
Ilias Siniosoglou, Panagiotis Sarigiannidis, Vasilis Argyriou, et al.
ICC 2022 - IEEE International Conference on Communications (2021), pp. 1-6
Open Access | Times Cited: 21
Ilias Siniosoglou, Panagiotis Sarigiannidis, Vasilis Argyriou, et al.
ICC 2022 - IEEE International Conference on Communications (2021), pp. 1-6
Open Access | Times Cited: 21
TrMAps: Trust Management in Specification-Based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System
Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, et al.
IEEE Journal of Biomedical and Health Informatics (2021) Vol. 25, Iss. 10, pp. 3763-3775
Closed Access | Times Cited: 19
Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, et al.
IEEE Journal of Biomedical and Health Informatics (2021) Vol. 25, Iss. 10, pp. 3763-3775
Closed Access | Times Cited: 19
Security Threats and Cryptographic Protocols for Medical Wearables
Luis Hernández–Álvarez, Juan José Bullón Pérez, Farrah Kristel Batista, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 886-886
Open Access | Times Cited: 13
Luis Hernández–Álvarez, Juan José Bullón Pérez, Farrah Kristel Batista, et al.
Mathematics (2022) Vol. 10, Iss. 6, pp. 886-886
Open Access | Times Cited: 13
Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices
Abigail Judith, G. Jaspher W. Kathrine, Salaja Silas, et al.
(2023), pp. 139-139
Open Access | Times Cited: 6
Abigail Judith, G. Jaspher W. Kathrine, Salaja Silas, et al.
(2023), pp. 139-139
Open Access | Times Cited: 6
Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey
Nur Imtiazul Haque, Hasan Shahriar, Md Golam Dastgir, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 16
Nur Imtiazul Haque, Hasan Shahriar, Md Golam Dastgir, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 16
The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, et al.
(2022)
Open Access | Times Cited: 9
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, et al.
(2022)
Open Access | Times Cited: 9
OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers
Romain Cayre, Vincent Nicomette, Guillaume Auriol, et al.
(2024), pp. 700-715
Open Access | Times Cited: 1
Romain Cayre, Vincent Nicomette, Guillaume Auriol, et al.
(2024), pp. 700-715
Open Access | Times Cited: 1