OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Device Fingerprinting for Cyber-Physical Systems: A Survey
Vijay Kumar, Kolin Paul
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-41
Open Access | Times Cited: 14

Showing 14 citing articles:

Integrating CP-ABE and Device Fingerprint Into Federated Learning
Chunlu Chen, Rodrigo Román, Kevin I‐Kai Wang, et al.
Lecture notes in computer science (2025), pp. 420-436
Closed Access

Securing the Internet of Things: A Comprehensive Examination of Machine and Deep Learning Approaches Against Denial of Service Attacks
Deepak Singh, R. Uma Mageswari
Broadband Communications, Networks and Systems (2025), pp. 176-188
Closed Access

ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive Monitoring
Alaa T. Al Ghazo, Ratnesh Kumar
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 4, pp. 2539-2550
Closed Access | Times Cited: 2

False Data Injection Detection in Nuclear Systems Using Dynamic Noise Analysis
Konstantinos Gkouliaras, Vasileios Theos, Zachery Dahm, et al.
IEEE Access (2024) Vol. 12, pp. 94936-94949
Open Access | Times Cited: 2

SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things
Christian Spinnler, T Labs, Norman Franchi
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-12
Closed Access | Times Cited: 1

Security Analysis of DNP3 Protocol in SCADA System
Qais Saif Qassim, Musab A. M. Ali, Nooritawati Md Tahir
(2023), pp. 314-319
Closed Access | Times Cited: 4

Radio frequency fingerprinting techniques for device identification: a survey
Sohail Abbas, Manar Abu Talib, Qassim Nasir, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1389-1427
Closed Access | Times Cited: 4

Identify: Intelligent Device Identification Using Device Fingerprints and Machine Learning
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access

Survey and Experimentation to Compare IoT Device Model Identification Methods
Norihiro Okui, Masataka Nakahara, Ayumu Kubota
(2024), pp. 13-17
Closed Access

MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile Devices
Beatrice Perez, Abhinav Mehrotra, Mirco Musolesi
Lecture notes in computer science (2024), pp. 3-24
Closed Access

A Survey of Electromagnetic Radiation Based Hardware Assurance and Reliability Monitoring Methods in Integrated Circuits
Manoj Yasaswi Vutukuru, John M. Emmert, Rashmi Jha
IEEE Access (2024) Vol. 12, pp. 150623-150638
Open Access

Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering
Zhaorui Ma, Xinhao Hu, Fenlin Liu, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103921-103921
Closed Access

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints
Blerim Rexha, Arbena Musa, Kamer Vishi, et al.
Research Square (Research Square) (2023)
Open Access

The Current State of Fingerprinting in Operational Technology Environments
Cheronika Manyfield-Donald, Candice Mitchell
(2023), pp. 2509-2514
Closed Access

Page 1

Scroll to top