
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Attack-Resilient Architecture for the Internet of Things
Hussain M. J. Almohri, Layne T. Watson, David Evans
IEEE Transactions on Information Forensics and Security (2020), pp. 1-1
Open Access | Times Cited: 18
Hussain M. J. Almohri, Layne T. Watson, David Evans
IEEE Transactions on Information Forensics and Security (2020), pp. 1-1
Open Access | Times Cited: 18
Showing 18 citing articles:
A Comprehensive Study of the IoT Cybersecurity in Smart Cities
Roberto Andrade, Sang Guun Yoo, Luis Tello-Oquendo, et al.
IEEE Access (2020) Vol. 8, pp. 228922-228941
Open Access | Times Cited: 78
Roberto Andrade, Sang Guun Yoo, Luis Tello-Oquendo, et al.
IEEE Access (2020) Vol. 8, pp. 228922-228941
Open Access | Times Cited: 78
A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
Patruni Muralidhara Rao, B. D. Deebak
Ad Hoc Networks (2023) Vol. 146, pp. 103159-103159
Closed Access | Times Cited: 38
Patruni Muralidhara Rao, B. D. Deebak
Ad Hoc Networks (2023) Vol. 146, pp. 103159-103159
Closed Access | Times Cited: 38
Design of a Channel Robust Radio Frequency Fingerprint Identification Scheme
Yuexiu Xing, Aiqun Hu, Junqing Zhang, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 8, pp. 6946-6959
Closed Access | Times Cited: 21
Yuexiu Xing, Aiqun Hu, Junqing Zhang, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 8, pp. 6946-6959
Closed Access | Times Cited: 21
An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network
Raveendranadh Bokka, Sadasivam Tamilselvan
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 3
Closed Access | Times Cited: 11
Raveendranadh Bokka, Sadasivam Tamilselvan
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 3
Closed Access | Times Cited: 11
Identity management for Internet of Things: Concepts, challenges and opportunities
Bruno Cremonezi, Alex Borges Vieira, José Augusto M. Nacif, et al.
Computer Communications (2024) Vol. 224, pp. 72-94
Closed Access | Times Cited: 3
Bruno Cremonezi, Alex Borges Vieira, José Augusto M. Nacif, et al.
Computer Communications (2024) Vol. 224, pp. 72-94
Closed Access | Times Cited: 3
Privacy and Security Best Practices for IoT Solutions
Matteo Anedda, Alessandro Floris, Roberto Girau, et al.
IEEE Access (2023) Vol. 11, pp. 129156-129172
Open Access | Times Cited: 6
Matteo Anedda, Alessandro Floris, Roberto Girau, et al.
IEEE Access (2023) Vol. 11, pp. 129156-129172
Open Access | Times Cited: 6
Enhanced IoT Wi-Fi protocol standard’s security using secure remote password
Hiba A. Tarish
Periodicals of Engineering and Natural Sciences (PEN) (2022) Vol. 10, Iss. 1, pp. 632-632
Open Access | Times Cited: 5
Hiba A. Tarish
Periodicals of Engineering and Natural Sciences (PEN) (2022) Vol. 10, Iss. 1, pp. 632-632
Open Access | Times Cited: 5
BAC: A block alliance consensus mechanism for the mine consortium blockchain
Yingsen Wang, Yulan Ma, Yan Qiang, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 27
Closed Access | Times Cited: 4
Yingsen Wang, Yulan Ma, Yan Qiang, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 27
Closed Access | Times Cited: 4
Multi-scale Attentional Temporal Memory Fusion Network For Radio Frequency Fingerprint Identification Under Low SNR
Jialong Li, Caidan Zhao, Lvdong Chen, et al.
(2024) Vol. abs/2105.05944, pp. 524-530
Closed Access
Jialong Li, Caidan Zhao, Lvdong Chen, et al.
(2024) Vol. abs/2105.05944, pp. 524-530
Closed Access
Collaborative Radio Frequency Fingerprint Identification Using Dual-Channel Parallel CNN
Hanbo Wang, Jian Wang
(2024), pp. 351-355
Closed Access
Hanbo Wang, Jian Wang
(2024), pp. 351-355
Closed Access
Anomolous Behavioral Pattern Analysis for IoT Application Using Firewall
Mayank Agrawal, Preeti Badhani, Neha Tripathi, et al.
(2024), pp. 1-5
Closed Access
Mayank Agrawal, Preeti Badhani, Neha Tripathi, et al.
(2024), pp. 1-5
Closed Access
Twin eye Authentication Gateway Architecture Resilient to DDoS attacks in 6LoWPAN IoT Network Using Machine Learning Techniques
L Manjula, G T Raju
(2023), pp. 1-7
Closed Access | Times Cited: 1
L Manjula, G T Raju
(2023), pp. 1-7
Closed Access | Times Cited: 1
KFREAIN: Design of A Kernel-Level Forensic Layer for Improving Real-Time Evidence Analysis Performance in IoT Networks
Seema Shukla, Sangeeta Mangesh, Prachi Chhabra
EMITTER International Journal of Engineering Technology (2023) Vol. 11, Iss. 2, pp. 125-144
Open Access | Times Cited: 1
Seema Shukla, Sangeeta Mangesh, Prachi Chhabra
EMITTER International Journal of Engineering Technology (2023) Vol. 11, Iss. 2, pp. 125-144
Open Access | Times Cited: 1
A Channel Robust Radio Frequency Fingerprint Authentication Method Based on Hadamard Product Comparison
Yan Chen, Jiabao Yu, Hongxia Chen, et al.
(2023), pp. 779-784
Closed Access | Times Cited: 1
Yan Chen, Jiabao Yu, Hongxia Chen, et al.
(2023), pp. 779-784
Closed Access | Times Cited: 1
Dynamic System Diversification for Securing Cloud-based IoT Subnetworks
Hussain M. J. Almohri, Layne T. Watson, David Evans, et al.
ACM Transactions on Autonomous and Adaptive Systems (2022) Vol. 17, Iss. 1-2, pp. 1-23
Closed Access | Times Cited: 2
Hussain M. J. Almohri, Layne T. Watson, David Evans, et al.
ACM Transactions on Autonomous and Adaptive Systems (2022) Vol. 17, Iss. 1-2, pp. 1-23
Closed Access | Times Cited: 2
Project Urban Patrol: Building an Attack Resilient Smart Home Architecture
Cynthia Mascarenhas, Rebecca Prasad, Paul Borges, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 2
Cynthia Mascarenhas, Rebecca Prasad, Paul Borges, et al.
(2021), pp. 1-6
Closed Access | Times Cited: 2
Privacy Protection Based on Packet Filtering for Home Internet-of-Things
Beibei Cheng, Yiming Zhu, Yuxuan Chen, et al.
(2023), pp. 1214-1219
Closed Access
Beibei Cheng, Yiming Zhu, Yuxuan Chen, et al.
(2023), pp. 1214-1219
Closed Access
Intelligent IoT Security Monitoring based on Fuzzy Optimum-Path Forest Classifier
Yongzhao Xu, Renato William R. de Souza, Elias P. Medeiros, et al.
Research Square (Research Square) (2022)
Open Access
Yongzhao Xu, Renato William R. de Souza, Elias P. Medeiros, et al.
Research Square (Research Square) (2022)
Open Access