
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
BDTwin: An Integrated Framework for Enhancing Security and Privacy in Cybertwin-Driven Automotive Industrial Internet of Things
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 18, pp. 17110-17119
Closed Access | Times Cited: 40
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 18, pp. 17110-17119
Closed Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
Permissioned Blockchain and Deep Learning for Secure and Efficient Data Sharing in Industrial Healthcare Systems
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8065-8073
Open Access | Times Cited: 123
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8065-8073
Open Access | Times Cited: 123
A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
Journal of Parallel and Distributed Computing (2022) Vol. 164, pp. 55-68
Closed Access | Times Cited: 108
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, et al.
Journal of Parallel and Distributed Computing (2022) Vol. 164, pp. 55-68
Closed Access | Times Cited: 108
P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT
Prabhat Kumar, Randhir Kumar, Govind P. Gupta, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 9, pp. 6358-6367
Closed Access | Times Cited: 84
Prabhat Kumar, Randhir Kumar, Govind P. Gupta, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 9, pp. 6358-6367
Closed Access | Times Cited: 84
A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40
Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu
Decision Analytics Journal (2023) Vol. 7, pp. 100206-100206
Open Access | Times Cited: 40
A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
BDEdge: Blockchain and Deep-Learning for Secure Edge-Envisioned Green CAVs
Prabhat Kumar, Randhir Kumar, Govind P. Gupta, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 6, Iss. 3, pp. 1330-1339
Closed Access | Times Cited: 49
Prabhat Kumar, Randhir Kumar, Govind P. Gupta, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 6, Iss. 3, pp. 1330-1339
Closed Access | Times Cited: 49
Intrusion Detection in the Automotive Domain: A Comprehensive Review
Brooke Lampe, Weizhi Meng
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2356-2426
Open Access | Times Cited: 23
Brooke Lampe, Weizhi Meng
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2356-2426
Open Access | Times Cited: 23
Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8
IoT security using heuristic aided symmetric convolution-based deep temporal convolution network for intrusion detection by extracting multi-cascaded deep attention features
R. Latha, S. John Justin Thangaraj
Expert Systems with Applications (2025), pp. 126363-126363
Closed Access
R. Latha, S. John Justin Thangaraj
Expert Systems with Applications (2025), pp. 126363-126363
Closed Access
Enhancing Cloud Security Through AI‐Driven Intrusion Detection Utilizing Deep Learning Methods and Autoencoder Technology
P. V. Sivarambabu, Richa Agrawal, Arepalli Tirumala, et al.
(2025), pp. 249-264
Closed Access
P. V. Sivarambabu, Richa Agrawal, Arepalli Tirumala, et al.
(2025), pp. 249-264
Closed Access
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
C.T.Dora Pravina, Mrunalini Buradkar, Md Khalid Jamal, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 24
C.T.Dora Pravina, Mrunalini Buradkar, Md Khalid Jamal, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 24
TrojanDetector: A Multi-Layer Hybrid Approach for Trojan Detection in Android Applications
Subhan Ullah, Tahir Ahmad, Attaullah Buriro, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 10755-10755
Open Access | Times Cited: 20
Subhan Ullah, Tahir Ahmad, Attaullah Buriro, et al.
Applied Sciences (2022) Vol. 12, Iss. 21, pp. 10755-10755
Open Access | Times Cited: 20
CANShield: Deep-Learning-Based Intrusion Detection Framework for Controller Area Networks at the Signal Level
Md Hasan Shahriar, Yang Xiao, Pablo Moriano, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 22111-22127
Open Access | Times Cited: 11
Md Hasan Shahriar, Yang Xiao, Pablo Moriano, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 22111-22127
Open Access | Times Cited: 11
A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions
Panjun Sun, Yi Wan, Zongda Wu, et al.
Computers & Security (2024) Vol. 148, pp. 104097-104097
Closed Access | Times Cited: 3
Panjun Sun, Yi Wan, Zongda Wu, et al.
Computers & Security (2024) Vol. 148, pp. 104097-104097
Closed Access | Times Cited: 3
Blockchain‐oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks
Vuppula Roopa, Himansu Shekhar Pradhan
IET Blockchain (2023) Vol. 3, Iss. 2, pp. 74-97
Open Access | Times Cited: 9
Vuppula Roopa, Himansu Shekhar Pradhan
IET Blockchain (2023) Vol. 3, Iss. 2, pp. 74-97
Open Access | Times Cited: 9
Decentralized Consensus Blockchain and IPFS-Based Data Aggregation for Efficient Data Storage Scheme
G. Subathra, A. Antonidoss, Bhupesh Kumar Singh
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 14
G. Subathra, A. Antonidoss, Bhupesh Kumar Singh
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 14
Data protection in internet of medical things using blockchain and secret sharing method
Shreyshi Shree, Zhou Chen, Masoud Barati
The Journal of Supercomputing (2023) Vol. 80, Iss. 4, pp. 5108-5135
Closed Access | Times Cited: 8
Shreyshi Shree, Zhou Chen, Masoud Barati
The Journal of Supercomputing (2023) Vol. 80, Iss. 4, pp. 5108-5135
Closed Access | Times Cited: 8
Deep-Learning and Blockchain-Empowered Secure Data Sharing for Smart Grid Infrastructure
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16155-16168
Closed Access | Times Cited: 2
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16155-16168
Closed Access | Times Cited: 2
Blockchain-based information sharing and supply and demand matching cloud platform for automotive manufacturing supply chain
Jinyu Wei, Xin Zhang, Yaoxi Liu, et al.
Industrial Management & Data Systems (2024)
Closed Access | Times Cited: 2
Jinyu Wei, Xin Zhang, Yaoxi Liu, et al.
Industrial Management & Data Systems (2024)
Closed Access | Times Cited: 2
High-Availability Encryption-Based Cloud Resource Provisioning System
K. Ranjith Singh, Abdul Shareef Pallivalappil, Pooja Singh, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 11
K. Ranjith Singh, Abdul Shareef Pallivalappil, Pooja Singh, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 11
A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology
Shakeel Ahmed, Parvathaneni Naga Srinivasu, Abdulaziz Alhumam
Sensors (2023) Vol. 23, Iss. 14, pp. 6564-6564
Open Access | Times Cited: 5
Shakeel Ahmed, Parvathaneni Naga Srinivasu, Abdulaziz Alhumam
Sensors (2023) Vol. 23, Iss. 14, pp. 6564-6564
Open Access | Times Cited: 5
Improved Transformer-Based Privacy-Preserving Architecture for Intrusion Detection in Secure V2X Communications
Qifeng Lai, Xiong Chen, Jian Chen, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1810-1820
Closed Access | Times Cited: 5
Qifeng Lai, Xiong Chen, Jian Chen, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1810-1820
Closed Access | Times Cited: 5
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 1
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 1
Intrusion detection system for V2X communication in VANET networks using machine learning-based cryptographic protocols
V. Thiruppathy Kesavan, Md. Jakir Hossen, Gopi Ramasamy, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
V. Thiruppathy Kesavan, Md. Jakir Hossen, Gopi Ramasamy, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Multi-Threaded Sound Propagation Algorithm to Improve Performance on Mobile Devices
Eunjae Kim, Suk‐Won Choi, Cheong Ghil Kim, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 973-973
Open Access | Times Cited: 3
Eunjae Kim, Suk‐Won Choi, Cheong Ghil Kim, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 973-973
Open Access | Times Cited: 3