
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Threat Detection and Mitigation for Tactile Internet Driven Consumer IoT-Healthcare System
R. Rajesh, S. Hemalatha, Senthil Murugan Nagarajan, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4249-4257
Closed Access | Times Cited: 15
R. Rajesh, S. Hemalatha, Senthil Murugan Nagarajan, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4249-4257
Closed Access | Times Cited: 15
Showing 15 citing articles:
An industrial dataspace for automotive supply chain: secure data sharing based on data association relationship
Yuqiao Liao, Xianguang Kong, Lei Yin, et al.
Journal of Industrial Information Integration (2025), pp. 100778-100778
Closed Access
Yuqiao Liao, Xianguang Kong, Lei Yin, et al.
Journal of Industrial Information Integration (2025), pp. 100778-100778
Closed Access
Machine Learning-Powered Intrusion Detection for Network Security
H. D. Nandish, R Rahul, Hari Charan Dasari, et al.
Lecture notes in networks and systems (2025), pp. 97-108
Closed Access
H. D. Nandish, R Rahul, Hari Charan Dasari, et al.
Lecture notes in networks and systems (2025), pp. 97-108
Closed Access
Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2
Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1
Intrusion Detection System Using Hybrid Model of Denoising Autoencoder and Ladder Variational Autoencoder
SriramVenkata Navyakala, Rajesh Rathinam
(2024) Vol. 15, pp. 214-219
Closed Access
SriramVenkata Navyakala, Rajesh Rathinam
(2024) Vol. 15, pp. 214-219
Closed Access
Enhancing Cloud IoT Security With Blockchain and SDN
U Kumaran, Thammisetty Swetha, Ishi Sharma, et al.
(2024), pp. 973-978
Closed Access
U Kumaran, Thammisetty Swetha, Ishi Sharma, et al.
(2024), pp. 973-978
Closed Access
Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access
Cybersecurity Framework Development for BoTNet Attack Detection using ISSOA based Attention Recurrent Autoencoder
Sravanthi Dontu, Rohith Vallabhaneni, Santosh Reddy Addula, et al.
(2024), pp. 1-7
Closed Access
Sravanthi Dontu, Rohith Vallabhaneni, Santosh Reddy Addula, et al.
(2024), pp. 1-7
Closed Access
Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Jordi Doménech, Isabel V. Martin-Faus, Saber Mhiri, et al.
Internet of Things (2024) Vol. 28, pp. 101420-101420
Open Access
Tactile and Sensor Technologies in Medical Health Industry
Bhupinder Singh, Christian Kaunert
Advances in healthcare information systems and administration book series (2024), pp. 255-284
Closed Access
Bhupinder Singh, Christian Kaunert
Advances in healthcare information systems and administration book series (2024), pp. 255-284
Closed Access
Hybrid quantum enhanced federated learning for cyber attack detection
G. Ganesan Subramanian, M. Chinnadurai
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
G. Ganesan Subramanian, M. Chinnadurai
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
U Kumaran, Thammisetty Swetha, Gopireddy Shanmukha Reddy, et al.
(2024), pp. 979-983
Closed Access
U Kumaran, Thammisetty Swetha, Gopireddy Shanmukha Reddy, et al.
(2024), pp. 979-983
Closed Access
A semantic communication model for the task of high quality image transmission to edge-end devices
Ze-Peng Wen, Jiandong Fang, Xiuling Wang
Internet of Things (2024), pp. 101384-101384
Open Access
Ze-Peng Wen, Jiandong Fang, Xiuling Wang
Internet of Things (2024), pp. 101384-101384
Open Access
Source Code Analysis With Deep Neural Networks
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access
The Role of Cybersecurity Legislation in Promoting Data Privacy
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access