
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Device Fingerprinting for Cyber-Physical Systems: A Survey
Vijay Kumar, Kolin Paul
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-41
Open Access | Times Cited: 14
Vijay Kumar, Kolin Paul
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-41
Open Access | Times Cited: 14
Showing 14 citing articles:
Integrating CP-ABE and Device Fingerprint Into Federated Learning
Chunlu Chen, Rodrigo Román, Kevin I‐Kai Wang, et al.
Lecture notes in computer science (2025), pp. 420-436
Closed Access
Chunlu Chen, Rodrigo Román, Kevin I‐Kai Wang, et al.
Lecture notes in computer science (2025), pp. 420-436
Closed Access
Securing the Internet of Things: A Comprehensive Examination of Machine and Deep Learning Approaches Against Denial of Service Attacks
Deepak Singh, R. Uma Mageswari
Broadband Communications, Networks and Systems (2025), pp. 176-188
Closed Access
Deepak Singh, R. Uma Mageswari
Broadband Communications, Networks and Systems (2025), pp. 176-188
Closed Access
ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive Monitoring
Alaa T. Al Ghazo, Ratnesh Kumar
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 4, pp. 2539-2550
Closed Access | Times Cited: 2
Alaa T. Al Ghazo, Ratnesh Kumar
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 4, pp. 2539-2550
Closed Access | Times Cited: 2
False Data Injection Detection in Nuclear Systems Using Dynamic Noise Analysis
Konstantinos Gkouliaras, Vasileios Theos, Zachery Dahm, et al.
IEEE Access (2024) Vol. 12, pp. 94936-94949
Open Access | Times Cited: 2
Konstantinos Gkouliaras, Vasileios Theos, Zachery Dahm, et al.
IEEE Access (2024) Vol. 12, pp. 94936-94949
Open Access | Times Cited: 2
SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of Things
Christian Spinnler, T Labs, Norman Franchi
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-12
Closed Access | Times Cited: 1
Christian Spinnler, T Labs, Norman Franchi
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-12
Closed Access | Times Cited: 1
Security Analysis of DNP3 Protocol in SCADA System
Qais Saif Qassim, Musab A. M. Ali, Nooritawati Md Tahir
(2023), pp. 314-319
Closed Access | Times Cited: 4
Qais Saif Qassim, Musab A. M. Ali, Nooritawati Md Tahir
(2023), pp. 314-319
Closed Access | Times Cited: 4
Radio frequency fingerprinting techniques for device identification: a survey
Sohail Abbas, Manar Abu Talib, Qassim Nasir, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1389-1427
Closed Access | Times Cited: 4
Sohail Abbas, Manar Abu Talib, Qassim Nasir, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 1389-1427
Closed Access | Times Cited: 4
Identify: Intelligent Device Identification Using Device Fingerprints and Machine Learning
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access
Survey and Experimentation to Compare IoT Device Model Identification Methods
Norihiro Okui, Masataka Nakahara, Ayumu Kubota
(2024), pp. 13-17
Closed Access
Norihiro Okui, Masataka Nakahara, Ayumu Kubota
(2024), pp. 13-17
Closed Access
MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field Using Mobile Devices
Beatrice Perez, Abhinav Mehrotra, Mirco Musolesi
Lecture notes in computer science (2024), pp. 3-24
Closed Access
Beatrice Perez, Abhinav Mehrotra, Mirco Musolesi
Lecture notes in computer science (2024), pp. 3-24
Closed Access
A Survey of Electromagnetic Radiation Based Hardware Assurance and Reliability Monitoring Methods in Integrated Circuits
Manoj Yasaswi Vutukuru, John M. Emmert, Rashmi Jha
IEEE Access (2024) Vol. 12, pp. 150623-150638
Open Access
Manoj Yasaswi Vutukuru, John M. Emmert, Rashmi Jha
IEEE Access (2024) Vol. 12, pp. 150623-150638
Open Access
Landmark-v6: A stable IPv6 landmark representation method based on multi-feature clustering
Zhaorui Ma, Xinhao Hu, Fenlin Liu, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103921-103921
Closed Access
Zhaorui Ma, Xinhao Hu, Fenlin Liu, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103921-103921
Closed Access
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints
Blerim Rexha, Arbena Musa, Kamer Vishi, et al.
Research Square (Research Square) (2023)
Open Access
Blerim Rexha, Arbena Musa, Kamer Vishi, et al.
Research Square (Research Square) (2023)
Open Access
The Current State of Fingerprinting in Operational Technology Environments
Cheronika Manyfield-Donald, Candice Mitchell
(2023), pp. 2509-2514
Closed Access
Cheronika Manyfield-Donald, Candice Mitchell
(2023), pp. 2509-2514
Closed Access