OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Computational Intelligence Enabled Cybersecurity for the Internet of Things
Shanshan Zhao, Shancang Li, Lianyong Qi, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2020) Vol. 4, Iss. 5, pp. 666-674
Closed Access | Times Cited: 52

Showing 1-25 of 52 citing articles:

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54

Integrating Internet of Things and multi-temperature delivery planning for perishable food E-commerce logistics: a model and application
Y.P. Tsang, C.H. Wu, H.Y. Lam, et al.
International Journal of Production Research (2020) Vol. 59, Iss. 5, pp. 1534-1556
Open Access | Times Cited: 90

Private blockchain-based encryption framework using computational intelligence approach
Taher M. Ghazal, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, et al.
Egyptian Informatics Journal (2022) Vol. 23, Iss. 4, pp. 69-75
Open Access | Times Cited: 63

Security and Privacy for Low Power IoT Devices on 5G and Beyond Networks: Challenges and Future Directions
Jonathan Cook, Sabih ur Rehman, M. Arif Khan
IEEE Access (2023) Vol. 11, pp. 39295-39317
Open Access | Times Cited: 28

Metaheuristics with Deep Learning Model for Cybersecurity and Android Malware Detection and Classification
Ashwag Albakri, Fatimah Alhayan, Nazik Alturki, et al.
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2172-2172
Open Access | Times Cited: 23

Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2123-2137
Closed Access | Times Cited: 11

Industrial Revolution 4.0 and Supply Chain Digitization
Syed Baber Ali
South Asian Journal of Social Review (2022), pp. 21-41
Closed Access | Times Cited: 34

Cybersecurity Risk Analysis in the IoT: A Systematic Review
Thanaa Saad AlSalem, Mohammed Amin Almaiah, Abdalwali Lutfi
Electronics (2023) Vol. 12, Iss. 18, pp. 3958-3958
Open Access | Times Cited: 19

Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security
Sarah Bin Hulayyil, Shancang Li, Lida Xu
Electronics (2023) Vol. 12, Iss. 18, pp. 3927-3927
Open Access | Times Cited: 17

Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
Megha Kuliha, Sunita Verma
International Journal of Intelligent Networks (2024) Vol. 5, pp. 161-174
Open Access | Times Cited: 7

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey
Yawei Yue, Shancang Li, Phil Legg, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 38

Deep learning technology of computer network security detection based on artificial intelligence
Qinghui Liu, Tianping Zhang
Computers & Electrical Engineering (2023) Vol. 110, pp. 108813-108813
Closed Access | Times Cited: 13

Multicriteria group decision making for prioritizing IoT risk factors with linear diophantine fuzzy sets and MARCOS method
J. Vimala, Jeevitha Kannan, Nasreen Kausar, et al.
Granular Computing (2024) Vol. 9, Iss. 3
Open Access | Times Cited: 4

Web 3.0: Applications, Opportunities and Challenges in the Next Internet Generation
Haoxiang Zhang, Yang Lu
Systems Research and Behavioral Science (2025)
Closed Access

Functional Requirements and Supply Chain Digitalization in Industry 4.0
Lu Han, Hanping Hou, Zhuming Bi, et al.
Information Systems Frontiers (2021)
Closed Access | Times Cited: 29

Gauss-Mapping Black Widow Optimization With Deep Extreme Learning Machine for Android Malware Classification Model
Ghadah Aldehim, Munya A. Arasi, Majdi Khalid, et al.
IEEE Access (2023) Vol. 11, pp. 87062-87070
Open Access | Times Cited: 11

Data anonymization evaluation against re-identification attacks in edge storage
Ming‐Hui Chen, Li Shan Cang, Zheng Chang, et al.
Wireless Networks (2023) Vol. 30, Iss. 6, pp. 5263-5277
Closed Access | Times Cited: 8

Influencing factors analysis in pear disease recognition using deep learning
Fang Yang, Fuzhong Li, Kai Zhang, et al.
Peer-to-Peer Networking and Applications (2020) Vol. 14, Iss. 3, pp. 1816-1828
Open Access | Times Cited: 22

SentinelFusion based machine learning comprehensive approach for enhanced computer forensics
Umar Islam, Abeer Abdullah Alsadhan, Hathal Salamah Alwageed, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2183-e2183
Open Access | Times Cited: 2

Internet of Things (IoT) applications security trends and challenges
Asif Ali Laghari, Hang Li, Abdullah Ayub Khan, et al.
Discover Internet of Things (2024) Vol. 4, Iss. 1
Open Access | Times Cited: 2

An adapting soft computing model for intrusion detection system
Husam Ibrahiem Husain Alsaadi, Rafah M. ALmuttari, Osman N. Uçan, et al.
Computational Intelligence (2021) Vol. 38, Iss. 3, pp. 855-875
Closed Access | Times Cited: 17

True-chaotic substitution box based on Boolean functions
Iqtadar Hussain
The European Physical Journal Plus (2020) Vol. 135, Iss. 8
Closed Access | Times Cited: 16

Attack Risk Analysis in Data Anonymization in Internet of Things
Tianli Yang, Li Shan Cang, Muddesar Iqbal, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 4, pp. 4986-4993
Closed Access | Times Cited: 5

Page 1 - Next Page

Scroll to top