OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Analysis of the RPL Version Number Attack with Multiple Attackers
Ahmet Arış, Sema Oktuğ
(2020), pp. 1-8
Closed Access | Times Cited: 22

Showing 22 citing articles:

A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey
Abbas Jamalipour, Sarumathi Murali
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 12, pp. 9444-9466
Closed Access | Times Cited: 70

A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, et al.
Sensors (2022) Vol. 22, Iss. 9, pp. 3400-3400
Open Access | Times Cited: 53

RPL-based attack detection approaches in IoT networks: review and taxonomy
Nadia A. Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 6

A Lightweight Scheme for Mitigating RPL Version Number Attacks in IoT Networks
Ibrahim S. Alsukayti, Aman Singh
IEEE Access (2022) Vol. 10, pp. 111115-111133
Open Access | Times Cited: 21

RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study
Ibrahim S. Alsukayti, Mohammed Alreshoodi
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 4878-4878
Open Access | Times Cited: 12

Simulation-based Analysis of RPL Routing Attacks and Their Impact on IoT Network Performance
Raveendranadh Bokka, Tamilselvan Sadasivam
Journal of Electronic Testing (2024) Vol. 40, Iss. 2, pp. 259-273
Closed Access | Times Cited: 4

The Routing Protocol for low power and lossy networks (RPL) under Attack: Simulation and Analysis
Amal Hkiri, Mouna Karmani, Mohsen Machhout
(2022), pp. 143-148
Closed Access | Times Cited: 15

A potential flooding version number attack against RPL based IOT networks
Mehdi Rouissat, Mohammed Belkheir, Hichem Sid Ahmed Belkhira
Journal of Electrical Engineering (2022) Vol. 73, Iss. 4, pp. 267-275
Open Access | Times Cited: 14

A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks 
Mehdi Rouissat, Mohammed Belkheir, Hicham Sid Ahmed Belkhira, et al.
JUCS - Journal of Universal Computer Science (2023) Vol. 29, Iss. 2, pp. 118-151
Open Access | Times Cited: 6

An Intrusion Detection System against RPL-based Routing Attacks for IoT Networks
Manjula Hebbaka Shivanajappa, Roopa Maidanahalli Seetharamaiah, Bharath Viswaraju Sai, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 2, pp. 1324-1324
Open Access | Times Cited: 1

Securing RPL-Based Networks Against Version Number and Rank Attacks
Alaa Eddine Khalfoune, Rachid Beghdad
Acta Informatica Pragensia (2024) Vol. 13, Iss. 3, pp. 340-358
Open Access | Times Cited: 1

Network Intrusion Detection Utilizing Autoencoder Neural Networks
Zakiya Manzoor Khan
Deleted Journal (2024) Vol. 31, Iss. 3s, pp. 336-354
Open Access | Times Cited: 1

Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets
Farooq Ahmad, Muhammad Tayyab Chaudhry, Muhammad Hasan Jamal, et al.
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0285700-e0285700
Open Access | Times Cited: 3

Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things
Ali Deveci, Selim Yılmaz, Sevil Şen
Lecture notes in computer science (2023), pp. 177-193
Closed Access | Times Cited: 2

Analysis of Hatchetman Attack in RPL Based IoT Networks
Girish Sharma, Jyoti Grover, Abhishek Verma, et al.
Communications in computer and information science (2022), pp. 666-678
Closed Access | Times Cited: 3

DE2RA-RPL: detection and elimination of resource-related attacks in IoT RPL-based protocol
Deepavathi Paganraj, Mala Chelliah
The Journal of Supercomputing (2024) Vol. 80, Iss. 15, pp. 22397-22427
Closed Access

DDoS Analysis: The Effect of Version Number Attack in RPL
Ammar Ibrahim El Sayed, Mahmoud Abdelaziz, Mohamed Hussein, et al.
Research Square (Research Square) (2024)
Open Access

Assessing the Impact of RPL Attacks in Challenging Environments: An Evolution-assisted Study
Özlem Ceviz, Selim Yılmaz
Journal of Polytechnic (2024) Vol. 28, Iss. 1, pp. 123-135
Open Access

Enhancing Iot Routing Security: A Trust Management Approach
Anup W. Burange, Vaishali M. Deshmukh, Yugandhara A. Thakare, et al.
(2023)
Closed Access

Network Intrusion Detection Using Autoencode Neural Network
Et al. Zakiya Manzoor Khan
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1678-1688
Open Access

HVSNA: An Advanced Hybrid Attack on RPL-Based Low-Power Wireless Networks
B H Hrishikesh, Ankita Venkata Mandalam, Animesh Giri
(2023) Vol. 5, pp. 1-6
Closed Access

Uncertainty and Its Role in IoT Risk Management
Roberto Andrade, Luis Tello-Oquendo, Iván Paz
Springer eBooks (2021), pp. 23-43
Closed Access

Page 1

Scroll to top