
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 26
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices
Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, et al.
IEEE Access (2024) Vol. 12, pp. 23733-23750
Open Access | Times Cited: 44
Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, et al.
IEEE Access (2024) Vol. 12, pp. 23733-23750
Open Access | Times Cited: 44
Estimating reference crop evapotranspiration using improved convolutional bidirectional long short-term memory network by multi-head attention mechanism in the four climatic zones of China
Juan Dong, Liwen Xing, Ningbo Cui, et al.
Agricultural Water Management (2024) Vol. 292, pp. 108665-108665
Open Access | Times Cited: 14
Juan Dong, Liwen Xing, Ningbo Cui, et al.
Agricultural Water Management (2024) Vol. 292, pp. 108665-108665
Open Access | Times Cited: 14
SIGFRID: Unsupervised, Platform-Agnostic Interference Detection in IoT Automation Rules
Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Internet of Things (2025)
Closed Access
Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Internet of Things (2025)
Closed Access
A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
Horizontal IoT Platform EMULSION
Иван Ганчев, Zhanlin Ji, Máirtín O’Droma
Electronics (2023) Vol. 12, Iss. 8, pp. 1864-1864
Open Access | Times Cited: 8
Иван Ганчев, Zhanlin Ji, Máirtín O’Droma
Electronics (2023) Vol. 12, Iss. 8, pp. 1864-1864
Open Access | Times Cited: 8
NLP‐Driven Chatbots
A. Mary Sowjanya, Kotagiri Srividya
(2024), pp. 713-725
Closed Access | Times Cited: 2
A. Mary Sowjanya, Kotagiri Srividya
(2024), pp. 713-725
Closed Access | Times Cited: 2
Hybrid Prompt Learning for Generating Justifications of Security Risks in Automation Rules
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Intelligent Systems and Technology (2024) Vol. 15, Iss. 5, pp. 1-26
Closed Access | Times Cited: 2
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Intelligent Systems and Technology (2024) Vol. 15, Iss. 5, pp. 1-26
Closed Access | Times Cited: 2
Security Analysis of Low-Budget IoT Smart Home Appliances Embedded Software and Connectivity
Kacper Murat, Dominik Topyła, Krzysztof Zdulski, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2371-2371
Open Access | Times Cited: 1
Kacper Murat, Dominik Topyła, Krzysztof Zdulski, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2371-2371
Open Access | Times Cited: 1
CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
On the User Perception of Security Risks of TAP Rules: A User Study
Bernardo Breve, Gaetano Cimino, Giuseppe Desolda, et al.
Lecture notes in computer science (2023), pp. 162-179
Closed Access | Times Cited: 3
Bernardo Breve, Gaetano Cimino, Giuseppe Desolda, et al.
Lecture notes in computer science (2023), pp. 162-179
Closed Access | Times Cited: 3
A Study on Exploring the Level of Awareness of Privacy Concerns and Risks
Tommy Nguyen, Garnet Yeates, Tony Ly, et al.
Applied Sciences (2023) Vol. 13, Iss. 24, pp. 13237-13237
Open Access | Times Cited: 2
Tommy Nguyen, Garnet Yeates, Tony Ly, et al.
Applied Sciences (2023) Vol. 13, Iss. 24, pp. 13237-13237
Open Access | Times Cited: 2
Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model
Dongming Sun, Liang Hu, Gang Wu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18320-18334
Closed Access
Dongming Sun, Liang Hu, Gang Wu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18320-18334
Closed Access
Crossover in mutation oriented norm evolution
Bingyu Lv, Xianchang Wang, Rui Zhang
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6081-6102
Open Access
Bingyu Lv, Xianchang Wang, Rui Zhang
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6081-6102
Open Access
Securing the smart home environment: an experiment on the impact of explainable warnings
Angela Martone, Federica Cena, Cristina Gena, et al.
(2024), pp. 1-3
Closed Access
Angela Martone, Federica Cena, Cristina Gena, et al.
(2024), pp. 1-3
Closed Access
A trusted mechanism against device reputation attacks in Web‐of‐Things applications
Geetanjali Rathee, Chaker Abdelaziz Kerrache, Carlos T. Calafate, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 6
Closed Access
Geetanjali Rathee, Chaker Abdelaziz Kerrache, Carlos T. Calafate, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 6
Closed Access
Data-Driven Intervention Strategies for Mitigating Illegal Wildlife Trade: A Case Study of the United States
Pan Xue, Tianchang Zhou, Hui Sun, et al.
Lecture notes in computer science (2024), pp. 172-183
Closed Access
Pan Xue, Tianchang Zhou, Hui Sun, et al.
Lecture notes in computer science (2024), pp. 172-183
Closed Access
Assessing Cybersecurity Threats: The Application of NLP in Advanced Threat Intelligence Systems
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
Md Aminul Islam, Rabiul Islam, Sabbir Ahmed Chowdhury, et al.
Lecture notes in networks and systems (2024), pp. 1-14
Closed Access
Enhancing digital currency adoption: examining user experiences
Puneett Bhatnagr
Management Decision (2024)
Closed Access
Puneett Bhatnagr
Management Decision (2024)
Closed Access
Understanding User Needs in Smart Homes and How to Fulfil Them
Andrea Mattioli, Fabio Paternò
Lecture notes in computer science (2023), pp. 125-142
Closed Access | Times Cited: 1
Andrea Mattioli, Fabio Paternò
Lecture notes in computer science (2023), pp. 125-142
Closed Access | Times Cited: 1
Democratizing Cybersecurity in Smart Environments: Investigating the Mental Models of Novices and Experts
Bernardo Breve, Giuseppe Desolda, Francesco Greco, et al.
Lecture notes in computer science (2023), pp. 145-161
Closed Access | Times Cited: 1
Bernardo Breve, Giuseppe Desolda, Francesco Greco, et al.
Lecture notes in computer science (2023), pp. 145-161
Closed Access | Times Cited: 1
Understanding Concepts, Methods and Tools for End-User Control of Automations in Ecosystems of Smart Objects and Services
Margherita Andrao, Fabrizio Balducci, Bernardo Breve, et al.
Lecture notes in computer science (2023), pp. 104-124
Closed Access | Times Cited: 1
Margherita Andrao, Fabrizio Balducci, Bernardo Breve, et al.
Lecture notes in computer science (2023), pp. 104-124
Closed Access | Times Cited: 1
A framework for the integration of deep learning-based systems in humanoid robots
Andrea F. Abate, Lucia Cascone, Lucia Cimmino, et al.
(2023)
Closed Access
Andrea F. Abate, Lucia Cascone, Lucia Cimmino, et al.
(2023)
Closed Access
Unveiling the Depths: A Comprehensive Analysis of Natural Language Processing and Generative Adversarial Neural Networks for Text Generation Models in Deep Learning
Rashi Agarwal, Himanshu Agarwal, Senam Pandey
(2023), pp. 1-6
Closed Access
Rashi Agarwal, Himanshu Agarwal, Senam Pandey
(2023), pp. 1-6
Closed Access