
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems
Yinbo Yu, Jiajia Liu
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3773-3788
Open Access | Times Cited: 18
Yinbo Yu, Jiajia Liu
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3773-3788
Open Access | Times Cited: 18
Showing 18 citing articles:
Improve the safety and performance of internet of things assessment devices: From vibration characteristics, interpretable method of knowledge, and combining data
Chafaa Hamrouni, Aarif Alutaybi, Ghofrane Ouerfelli, et al.
Sound&Vibration (2025) Vol. 59, Iss. 2, pp. 2144-2144
Open Access
Chafaa Hamrouni, Aarif Alutaybi, Ghofrane Ouerfelli, et al.
Sound&Vibration (2025) Vol. 59, Iss. 2, pp. 2144-2144
Open Access
Ontology-Based Classification and Detection of the Smart Home Automation Rules Conflicts
Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa
IEEE Access (2024) Vol. 12, pp. 85072-85088
Open Access | Times Cited: 3
Adeeb Mansoor Ansari, Mohammed Nazir, Khurram Mustafa
IEEE Access (2024) Vol. 12, pp. 85072-85088
Open Access | Times Cited: 3
A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
Yongheng Xing, Liang Hu, Xinqi Du, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124724-124724
Closed Access | Times Cited: 3
SeIoT: Detecting Anomalous Semantics in Smart Homes via Knowledge Graph
Ruoyu Li, Qing Li, Yucheng Huang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7005-7018
Closed Access | Times Cited: 3
Ruoyu Li, Qing Li, Yucheng Huang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7005-7018
Closed Access | Times Cited: 3
ZMAD: Lightweight Model-Based Anomaly Detection for the Structured Z-Wave Protocol
Carlos Kayembe Nkuba, Seunghoon Woo, Heejo Lee, et al.
IEEE Access (2023) Vol. 11, pp. 60562-60577
Open Access | Times Cited: 8
Carlos Kayembe Nkuba, Seunghoon Woo, Heejo Lee, et al.
IEEE Access (2023) Vol. 11, pp. 60562-60577
Open Access | Times Cited: 8
HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps
Alyaa A. Hamza, Islam Tharwat Abdel Halim, Mohamed Sobh, et al.
Sensors (2022) Vol. 22, Iss. 3, pp. 1079-1079
Open Access | Times Cited: 13
Alyaa A. Hamza, Islam Tharwat Abdel Halim, Mohamed Sobh, et al.
Sensors (2022) Vol. 22, Iss. 3, pp. 1079-1079
Open Access | Times Cited: 13
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
Xuyang Chen, Xiaolu Zhang, Michael G. Elliot, et al.
Computers & Security (2022) Vol. 120, pp. 102812-102812
Closed Access | Times Cited: 11
Xuyang Chen, Xiaolu Zhang, Michael G. Elliot, et al.
Computers & Security (2022) Vol. 120, pp. 102812-102812
Closed Access | Times Cited: 11
A Survey on Conflict Detection in IoT-based Smart Homes
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6
CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 1
Detecting Smart Home Automation Application Interferences with Domain Knowledge
Tao Wang, Wei Chen, Liwei Liu, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1086-1097
Closed Access | Times Cited: 2
Tao Wang, Wei Chen, Liwei Liu, et al.
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) (2023), pp. 1086-1097
Closed Access | Times Cited: 2
Safety Assurance in IoT-Based Smart Homes
Mouiad Al-Wahah, Auhood Al-Hossenat
IntechOpen eBooks (2024)
Closed Access
Mouiad Al-Wahah, Auhood Al-Hossenat
IntechOpen eBooks (2024)
Closed Access
Building Device Models Using LLMs for Requirements Simulation in Smart Homes
Shi Chen, Xiaohong Chen, Zhi Jin
(2024), pp. 176-183
Closed Access
Shi Chen, Xiaohong Chen, Zhi Jin
(2024), pp. 176-183
Closed Access
SaVeWoT: Scripting and Verifying Web of Things Systems and Their Effects on the Physical World
Justus Fries, Michael Freund, Andreas Harth
Lecture notes in computer science (2024), pp. 99-113
Closed Access
Justus Fries, Michael Freund, Andreas Harth
Lecture notes in computer science (2024), pp. 99-113
Closed Access
iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses
M. M. Alam, Siwei Zhang, Eric F. Rodríguez Rodríguez, et al.
(2024), pp. 76-92
Closed Access
M. M. Alam, Siwei Zhang, Eric F. Rodríguez Rodríguez, et al.
(2024), pp. 76-92
Closed Access
Security and Safety Verification in IoT Apps
Lobna Abuserrieh, Manar H. Alalfi
(2023), pp. 601-605
Closed Access | Times Cited: 1
Lobna Abuserrieh, Manar H. Alalfi
(2023), pp. 601-605
Closed Access | Times Cited: 1
KFREAIN: Design of A Kernel-Level Forensic Layer for Improving Real-Time Evidence Analysis Performance in IoT Networks
Seema Shukla, Sangeeta Mangesh, Prachi Chhabra
EMITTER International Journal of Engineering Technology (2023) Vol. 11, Iss. 2, pp. 125-144
Open Access | Times Cited: 1
Seema Shukla, Sangeeta Mangesh, Prachi Chhabra
EMITTER International Journal of Engineering Technology (2023) Vol. 11, Iss. 2, pp. 125-144
Open Access | Times Cited: 1
A Points-to-Sensitive Model Checker for C Programs in IoT Firmware
Yinbo Yu, Jiajia Liu, Dejun Mu
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 19, pp. 18998-19011
Closed Access | Times Cited: 2
Yinbo Yu, Jiajia Liu, Dejun Mu
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 19, pp. 18998-19011
Closed Access | Times Cited: 2
RTIFQLD: An Integrated Framework for RealTime IoT Forensic Analysis via Incremental QLearning Modelled with Resource Aware DQN Operations
Gangavarapu Rajesh Babu, Virendra Kumar Sharma
(2023), pp. 1-12
Closed Access
Gangavarapu Rajesh Babu, Virendra Kumar Sharma
(2023), pp. 1-12
Closed Access