
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SafeChain: Securing Trigger-Action Programming From Attack Chains
Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu‐Chun Hsiao
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 10, pp. 2607-2622
Open Access | Times Cited: 48
Kai-Hsiang Hsu, Yu-Hsi Chiang, Hsu‐Chun Hsiao
IEEE Transactions on Information Forensics and Security (2019) Vol. 14, Iss. 10, pp. 2607-2622
Open Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
A Comprehensive Study of the IoT Cybersecurity in Smart Cities
Roberto Andrade, Sang Guun Yoo, Luis Tello-Oquendo, et al.
IEEE Access (2020) Vol. 8, pp. 228922-228941
Open Access | Times Cited: 76
Roberto Andrade, Sang Guun Yoo, Luis Tello-Oquendo, et al.
IEEE Access (2020) Vol. 8, pp. 228922-228941
Open Access | Times Cited: 76
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
(2020)
Open Access | Times Cited: 70
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
(2020)
Open Access | Times Cited: 70
Scalable analysis of interaction threats in IoT systems
Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri
(2020)
Closed Access | Times Cited: 52
Mohannad Alhanahnah, Clay Stevens, Hamid Bagheri
(2020)
Closed Access | Times Cited: 52
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 30
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 30
“I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users
Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, et al.
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 4, pp. 54-75
Open Access | Times Cited: 34
Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, et al.
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 4, pp. 54-75
Open Access | Times Cited: 34
Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 26
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 26
Behavioral equivalences for AbU: Verifying security and safety in distributed IoT systems
Michele Pasqua, Marino Miculan
Theoretical Computer Science (2024) Vol. 998, pp. 114537-114537
Open Access | Times Cited: 4
Michele Pasqua, Marino Miculan
Theoretical Computer Science (2024) Vol. 998, pp. 114537-114537
Open Access | Times Cited: 4
SIGFRID: Unsupervised, Platform-Agnostic Interference Detection in IoT Automation Rules
Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Internet of Things (2025)
Closed Access
Gaetano Cimino, Vincenzo Deufemia
ACM Transactions on Internet of Things (2025)
Closed Access
Conflict Detection and Resolution in IoT Systems: A Survey
Pavana Pradeep Kumar, Krishna Kant
IoT (2022) Vol. 3, Iss. 1, pp. 191-218
Open Access | Times Cited: 18
Pavana Pradeep Kumar, Krishna Kant
IoT (2022) Vol. 3, Iss. 1, pp. 191-218
Open Access | Times Cited: 18
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
Yinbo Yu, Jiajia Liu
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3773-3788
Open Access | Times Cited: 18
Yinbo Yu, Jiajia Liu
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3773-3788
Open Access | Times Cited: 18
A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
(2021)
Open Access | Times Cited: 16
Haotian Chi, Qiang Zeng, Xiaojiang Du, et al.
(2021)
Open Access | Times Cited: 16
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
Xuyang Chen, Xiaolu Zhang, Michael G. Elliot, et al.
Computers & Security (2022) Vol. 120, pp. 102812-102812
Closed Access | Times Cited: 11
Xuyang Chen, Xiaolu Zhang, Michael G. Elliot, et al.
Computers & Security (2022) Vol. 120, pp. 102812-102812
Closed Access | Times Cited: 11
IoTCom: Dissecting Interaction Threats in IoT Systems
Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, et al.
IEEE Transactions on Software Engineering (2022) Vol. 49, Iss. 4, pp. 1523-1539
Closed Access | Times Cited: 11
Mohannad Alhanahnah, Clay Stevens, Bocheng Chen, et al.
IEEE Transactions on Software Engineering (2022) Vol. 49, Iss. 4, pp. 1523-1539
Closed Access | Times Cited: 11
A Survey on Conflict Detection in IoT-based Smart Homes
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks
Haotian Chi, Chenglong Fu, Qiang Zeng, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022)
Closed Access | Times Cited: 8
Haotian Chi, Chenglong Fu, Qiang Zeng, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2022)
Closed Access | Times Cited: 8
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
Liuhuo Wan, Kailong Wang, Kulani Mahadewa, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 3106-3116
Closed Access | Times Cited: 1
Liuhuo Wan, Kailong Wang, Kulani Mahadewa, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 3106-3116
Closed Access | Times Cited: 1
Security Analysis of Low-Budget IoT Smart Home Appliances Embedded Software and Connectivity
Kacper Murat, Dominik Topyła, Krzysztof Zdulski, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2371-2371
Open Access | Times Cited: 1
Kacper Murat, Dominik Topyła, Krzysztof Zdulski, et al.
Electronics (2024) Vol. 13, Iss. 12, pp. 2371-2371
Open Access | Times Cited: 1
CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
Automated Generation of LTL Specifications For Smart Home IoT Using Natural Language
Shiyu Zhang, Juan Zhai, Lei Bu, et al.
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 (2020), pp. 622-625
Closed Access | Times Cited: 12
Shiyu Zhang, Juan Zhai, Lei Bu, et al.
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 (2020), pp. 622-625
Closed Access | Times Cited: 12
Friendly Fire
Musard Balliu, Massimo Merro, Michele Pasqua, et al.
ACM Transactions on Privacy and Security (2021) Vol. 24, Iss. 3, pp. 1-40
Open Access | Times Cited: 11
Musard Balliu, Massimo Merro, Michele Pasqua, et al.
ACM Transactions on Privacy and Security (2021) Vol. 24, Iss. 3, pp. 1-40
Open Access | Times Cited: 11
Defining Configurable Virtual Reality Templates for End Users
Valentino Artizzu, Gianmarco Cherchi, Davide Fara, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-35
Open Access | Times Cited: 7
Valentino Artizzu, Gianmarco Cherchi, Davide Fara, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-35
Open Access | Times Cited: 7
Scrutinizing Implementations of Smart Home Integrations
Kulani Mahadewa, Kailong Wang, Guangdong Bai, et al.
IEEE Transactions on Software Engineering (2019) Vol. 47, Iss. 12, pp. 2667-2683
Open Access | Times Cited: 11
Kulani Mahadewa, Kailong Wang, Guangdong Bai, et al.
IEEE Transactions on Software Engineering (2019) Vol. 47, Iss. 12, pp. 2667-2683
Open Access | Times Cited: 11
Identification of Biometric Images Using Latent Elements.
Mariya Nazarkevych, Mykola Logoyda, Serhii Dmytruk, et al.
IDDM (2019), pp. 99-108
Closed Access | Times Cited: 10
Mariya Nazarkevych, Mykola Logoyda, Serhii Dmytruk, et al.
IDDM (2019), pp. 99-108
Closed Access | Times Cited: 10
How risky are real users' IFTTT applets?
Camille Cobb, Milijana Surbatovich, Anna Kawakami, et al.
Symposium On Usable Privacy and Security (2020), pp. 505-529
Closed Access | Times Cited: 9
Camille Cobb, Milijana Surbatovich, Anna Kawakami, et al.
Symposium On Usable Privacy and Security (2020), pp. 505-529
Closed Access | Times Cited: 9