OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems
William Oliff, Avgoustinos Filippoupolitis, George Loukas
(2017) Vol. 8, pp. 379-385
Open Access | Times Cited: 12

Showing 12 citing articles:

Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
Arup Barua, Md Abdullah Al Alamin, Md. Shohrab Hossain, et al.
IEEE Open Journal of the Communications Society (2022) Vol. 3, pp. 251-281
Open Access | Times Cited: 82

Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2019), pp. 1469-1483
Open Access | Times Cited: 59

Bluetooth low energy for internet of things: review, challenges, and open issues
Mahmood A. Al-Shareeda‬‏, Murtaja Ali Saare, Selvakumar Manickam, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1182-1182
Open Access | Times Cited: 10

Crowd-Assisted Hardware Identifier Updates for Securing Beacon-Centric IoT Networks
Kang Eun Jeon, Simon Wong, James She, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 32527-32539
Closed Access | Times Cited: 1

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode
Yue Zhang, Jian Weng, Rajib Dey, et al.
arXiv (Cornell University) (2019)
Open Access | Times Cited: 9

SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures
Sunny Shrestha, Esa Irby, Raghav Thapa, et al.
Communications in computer and information science (2022), pp. 108-127
Closed Access | Times Cited: 5

Threats, Countermeasures, and Research Trends for BLE-based IoT Devices
Ashwath Anand Pammi
(2017)
Closed Access | Times Cited: 5

Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems
William Oliff, Avgoustinos Filippoupolitis, George Loukas
(2017), pp. 1-10
Closed Access | Times Cited: 3

Bluetooth Security: A Comprehensive Guide to Protecting Your Wireless Devices
S. A. Sahaaya Arul Mary
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 6, pp. 1419-1426
Open Access

SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures
Sunny Shrestha, Esa Irby, Raghav Thapa, et al.
SSRN Electronic Journal (2021)
Closed Access | Times Cited: 2

An Improved Authentication Scheme for Ble Devices with No I/O Capabilities
Chandranshu Gupta, Gaurav Varshney
SSRN Electronic Journal (2022)
Open Access | Times Cited: 1

Android Defense in Depth Strategy in an Automobile Ecosystem
Balasubramanian Achuthan, Srinivas Chandupatla, Nalinikanth Yerram
SAE technical papers on CD-ROM/SAE technical paper series (2020)
Closed Access

Page 1

Scroll to top