
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100
Showing 1-25 of 100 citing articles:
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 149
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 149
A survey on security and privacy issues of UAVs
Yassine Mekdad, Ahmet Arış, Leonardo Babun, et al.
Computer Networks (2023) Vol. 224, pp. 109626-109626
Open Access | Times Cited: 99
Yassine Mekdad, Ahmet Arış, Leonardo Babun, et al.
Computer Networks (2023) Vol. 224, pp. 109626-109626
Open Access | Times Cited: 99
Wireless Backhaul in 5G and Beyond: Issues, Challenges and Opportunities
Berke Tezergil, Ertan Onur
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2579-2632
Open Access | Times Cited: 78
Berke Tezergil, Ertan Onur
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2579-2632
Open Access | Times Cited: 78
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
Sangjun Kim, Kyung‐Joon Park, Chenyang Lu
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 3, pp. 1534-1573
Closed Access | Times Cited: 74
Sangjun Kim, Kyung‐Joon Park, Chenyang Lu
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 3, pp. 1534-1573
Closed Access | Times Cited: 74
Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities
Xing Yang, Lei Shu, Ye Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 7, pp. 4319-4330
Closed Access | Times Cited: 59
Xing Yang, Lei Shu, Ye Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 7, pp. 4319-4330
Closed Access | Times Cited: 59
Energy consumption of on-device machine learning models for IoT intrusion detection
Nazlı Tekin, Abbas Acar, Ahmet Arış, et al.
Internet of Things (2022) Vol. 21, pp. 100670-100670
Open Access | Times Cited: 50
Nazlı Tekin, Abbas Acar, Ahmet Arış, et al.
Internet of Things (2022) Vol. 21, pp. 100670-100670
Open Access | Times Cited: 50
A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles
Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, et al.
Vehicular Communications (2022) Vol. 37, pp. 100515-100515
Open Access | Times Cited: 45
Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, et al.
Vehicular Communications (2022) Vol. 37, pp. 100515-100515
Open Access | Times Cited: 45
Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective
Ayaskanta Mishra, Amitkumar V. Jha, Bhargav Appasani, et al.
International Journal of Systems Assurance Engineering and Management (2022) Vol. 14, Iss. S3, pp. 699-721
Closed Access | Times Cited: 44
Ayaskanta Mishra, Amitkumar V. Jha, Bhargav Appasani, et al.
International Journal of Systems Assurance Engineering and Management (2022) Vol. 14, Iss. S3, pp. 699-721
Closed Access | Times Cited: 44
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Patruni Muralidhara Rao, B. D. Deebak
Ad Hoc Networks (2023) Vol. 146, pp. 103159-103159
Closed Access | Times Cited: 38
Patruni Muralidhara Rao, B. D. Deebak
Ad Hoc Networks (2023) Vol. 146, pp. 103159-103159
Closed Access | Times Cited: 38
Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
Abiodun Esther Omolara, Moatsum Alawida, Abiodun Esther Omolara
Neural Computing and Applications (2023) Vol. 35, Iss. 31, pp. 23063-23101
Closed Access | Times Cited: 34
Abiodun Esther Omolara, Moatsum Alawida, Abiodun Esther Omolara
Neural Computing and Applications (2023) Vol. 35, Iss. 31, pp. 23063-23101
Closed Access | Times Cited: 34
Wrapper-based deep feature optimization for activity recognition in the wearable sensor networks of healthcare systems
Karam Kumar Sahoo, Raghunath Ghosh, Saurav Mallik, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 28
Karam Kumar Sahoo, Raghunath Ghosh, Saurav Mallik, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 28
Drone Technology
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 14
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 14
Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects
Sujitha Lakshminarayana, Amit Praseed, P. Santhi Thilagam
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2510-2546
Closed Access | Times Cited: 12
Sujitha Lakshminarayana, Amit Praseed, P. Santhi Thilagam
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2510-2546
Closed Access | Times Cited: 12
Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey
Mahdi Alkaeed, Adnan Qayyum, Junaid Qadir
Journal of Network and Computer Applications (2024) Vol. 231, pp. 103989-103989
Open Access | Times Cited: 10
Mahdi Alkaeed, Adnan Qayyum, Junaid Qadir
Journal of Network and Computer Applications (2024) Vol. 231, pp. 103989-103989
Open Access | Times Cited: 10
Use of AI Applications for the Drone Industry
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 31
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 31
Healthcare monitoring system for automatic database management using mobile application in IoT environment
Shawki Saleh, Bouchaib Cherradi, Oussama El Gannour, et al.
Bulletin of Electrical Engineering and Informatics (2022) Vol. 12, Iss. 2, pp. 1055-1068
Open Access | Times Cited: 31
Shawki Saleh, Bouchaib Cherradi, Oussama El Gannour, et al.
Bulletin of Electrical Engineering and Informatics (2022) Vol. 12, Iss. 2, pp. 1055-1068
Open Access | Times Cited: 31
Linking blockchain technology and digital advertising: How blockchain technology can enhance digital advertising to be more effective, efficient, and trustworthy
Jooyoung Kim, Kyu Hyoung Lee, Jaemin Kim
Journal of Business Research (2023) Vol. 160, pp. 113819-113819
Closed Access | Times Cited: 19
Jooyoung Kim, Kyu Hyoung Lee, Jaemin Kim
Journal of Business Research (2023) Vol. 160, pp. 113819-113819
Closed Access | Times Cited: 19
Integration of federated learning with IoT for smart cities applications, challenges, and solutions
Yazeed Yasin Ghadi, Tehseen Mazhar, Syed Faisal Abbas Shah, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1657-e1657
Open Access | Times Cited: 17
Yazeed Yasin Ghadi, Tehseen Mazhar, Syed Faisal Abbas Shah, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1657-e1657
Open Access | Times Cited: 17
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103786-103786
Open Access | Times Cited: 7
Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103786-103786
Open Access | Times Cited: 7
Heterogeneous Network Access and Fusion in Smart Factory: A Survey
Dan Xia, C.-S. Jiang, Jiafu Wan, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 26
Dan Xia, C.-S. Jiang, Jiafu Wan, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 6, pp. 1-31
Closed Access | Times Cited: 26
Ultra-strong adhesive, self-healing and electroactive bio-based hydrogels for the on-demand fabrication of sandwich-inspired smart electronic sensing floors
Xiaoliang Zou, Xuechuan Wang, Mengmeng Gou, et al.
Journal of Materials Chemistry A (2022) Vol. 10, Iss. 27, pp. 14555-14567
Closed Access | Times Cited: 26
Xiaoliang Zou, Xuechuan Wang, Mengmeng Gou, et al.
Journal of Materials Chemistry A (2022) Vol. 10, Iss. 27, pp. 14555-14567
Closed Access | Times Cited: 26
Who’s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment
Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, et al.
ACM Transactions on Internet of Things (2022) Vol. 3, Iss. 4, pp. 1-39
Closed Access | Times Cited: 24
Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, et al.
ACM Transactions on Internet of Things (2022) Vol. 3, Iss. 4, pp. 1-39
Closed Access | Times Cited: 24
A Comprehensive Survey of Security Issues of Smart Home System: “Spear” and “Shields,” Theory and Practice
Jian Yang, Liu Sun
IEEE Access (2022) Vol. 10, pp. 124167-124192
Open Access | Times Cited: 22
Jian Yang, Liu Sun
IEEE Access (2022) Vol. 10, pp. 124167-124192
Open Access | Times Cited: 22
A review of on-device machine learning for IoT: An energy perspective
Nazlı Tekin, Ahmet Arış, Abbas Acar, et al.
Ad Hoc Networks (2023) Vol. 153, pp. 103348-103348
Closed Access | Times Cited: 14
Nazlı Tekin, Ahmet Arış, Abbas Acar, et al.
Ad Hoc Networks (2023) Vol. 153, pp. 103348-103348
Closed Access | Times Cited: 14