OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 149

Showing 1-25 of 149 citing articles:

Fusion of Federated Learning and Industrial Internet of Things: A survey
M. Parimala, Swarna Priya Ramu, Quoc‐Viet Pham, et al.
Computer Networks (2022) Vol. 212, pp. 109048-109048
Open Access | Times Cited: 184

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Harun Oz, Ahmet Arış, Albert Lévi, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-37
Open Access | Times Cited: 174

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review
Abdullah Ayub Khan, Asif Ali Laghari, Zaffar Ahmed Shaikh, et al.
IEEE Access (2022) Vol. 10, pp. 122679-122695
Open Access | Times Cited: 123

A survey on security and privacy issues of UAVs
Yassine Mekdad, Ahmet Arış, Leonardo Babun, et al.
Computer Networks (2023) Vol. 224, pp. 109626-109626
Open Access | Times Cited: 99

Explainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions
Nour Moustafa, Nickolaos Koroniotis, Marwa Keshk, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1775-1807
Closed Access | Times Cited: 76

A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
Hassan Jalil Hadi, Yue Cao, Khaleeq Un Nisa, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103607-103607
Closed Access | Times Cited: 74

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54

IEEE Communications Surveys and Tutorials
Dusit Niyato
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2058-2063
Open Access | Times Cited: 98

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
Abiodun Esther Omolara, Moatsum Alawida, Abiodun Esther Omolara
Neural Computing and Applications (2023) Vol. 35, Iss. 31, pp. 23063-23101
Closed Access | Times Cited: 34

A Survey of Public IoT Datasets for Network Security Research
François De Keersmaeker, Yinan Cao, Gorby Kabasele Ndonda, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1808-1840
Closed Access | Times Cited: 28

Ultra‐reliability and low‐latency communications on the internet of things based on 5G network: Literature review, classification, and future research view
Seyed Salar Sefati, Simona Halunga
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 6
Closed Access | Times Cited: 26

A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions
Kwok Tai Chui, Brij B. Gupta, Jiaqi Liu, et al.
Information (2023) Vol. 14, Iss. 7, pp. 388-388
Open Access | Times Cited: 22

Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 22

Scavenging Energy and Information through Dynamically Regulating the Electrical Double Layer
Xiang Li, Zhong Lin Wang, Di Wei
Advanced Functional Materials (2024)
Closed Access | Times Cited: 12

Containerized cloud-based honeypot deception for tracking attackers
Devi Priya V S, S. Sibi Chakkaravarthy
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 21

SUSIC: A Secure User Access Control Mechanism for SDN-Enabled IIoT and Cyber–Physical Systems
Azeem Irshad, Ghulam Ali Mallah, Muhammad Bilal, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 18, pp. 16504-16515
Open Access | Times Cited: 20

A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions
Marco M. Cook, Angelos K. Marnerides, Chris Johnson, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1705-1747
Closed Access | Times Cited: 19

The Role of Deep Learning in Advancing Proactive Cybersecurity Measures for Smart Grid Networks: A Survey
Nima Abdi, Abdullatif Albaseer, Mohamed Abdallah
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16398-16421
Open Access | Times Cited: 7

Communications Security in Industry X: A Survey
Ijaz Ahmad, Felipe Rodríguez, Tanesh Kumar, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 982-1025
Open Access | Times Cited: 5

Prescribed-Time Output Feedback Control for Cyber–Physical Systems Under Output Constraints and Malicious Attacks
Yangang Yao, Yu Kang, Yun‐Bo Zhao, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 11, pp. 6518-6530
Closed Access | Times Cited: 5

Fuzzy logic and deep Q learning based control for traffic lights
Ilhan Tunc, Mehmet Turan Söylemez
Alexandria Engineering Journal (2022) Vol. 67, pp. 343-359
Open Access | Times Cited: 27

Boosting Cyber-Threat Intelligence via Collaborative Intrusion Detection
Massimo Guarascio, Nunziato Cassavia, Francesco Sergio Pisani, et al.
Future Generation Computer Systems (2022) Vol. 135, pp. 30-43
Open Access | Times Cited: 24

Exploring self-organization and self-adaption for smart manufacturing complex networks
Zhengang Guo, Yingfeng Zhang, Sichao Liu, et al.
Frontiers of Engineering Management (2022) Vol. 10, Iss. 2, pp. 206-222
Open Access | Times Cited: 23

Cybersafe Capabilities and Utilities for Smart Cities
Kassim Kalinaki, Navod Neranjan Thilakarathne, Hamisi Ramadhan Mubarak, et al.
Advanced sciences and technologies for security applications (2023), pp. 71-86
Closed Access | Times Cited: 15

A review of on-device machine learning for IoT: An energy perspective
Nazlı Tekin, Ahmet Arış, Abbas Acar, et al.
Ad Hoc Networks (2023) Vol. 153, pp. 103348-103348
Closed Access | Times Cited: 14

Page 1 - Next Page

Scroll to top