
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 15
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 15
Showing 15 citing articles:
Explainability in AI-based behavioral malware detection systems
Antonio Galli, Valerio La Gatta, Vincenzo Moscato, et al.
Computers & Security (2024) Vol. 141, pp. 103842-103842
Open Access | Times Cited: 13
Antonio Galli, Valerio La Gatta, Vincenzo Moscato, et al.
Computers & Security (2024) Vol. 141, pp. 103842-103842
Open Access | Times Cited: 13
NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
STFNIoT:Lightweight IoT Intrusion Detection Based on Explainable Analysis Using Spatiotemporal Fusion Networks
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access
Trust dynamicity for IoT: How do i trust your social IoT cluster?
Davide Ferraris, Carmen Fernández-Gago, Younes Assouyat, et al.
Internet of Things (2025), pp. 101529-101529
Closed Access
Davide Ferraris, Carmen Fernández-Gago, Younes Assouyat, et al.
Internet of Things (2025), pp. 101529-101529
Closed Access
Comprehensive Study of IoT Vulnerabilities and Countermeasures
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access
Bias‐Switchable Volatile and Nonvolatile Multifunctional Photoelectric Memristors Based on MXene Quantum Dots for Efficient Selective Encryption‐Decryption and Recognition
Ziyu Huang, Weilong Huang, Chenhui Xu, et al.
Advanced Functional Materials (2025)
Closed Access
Ziyu Huang, Weilong Huang, Chenhui Xu, et al.
Advanced Functional Materials (2025)
Closed Access
Double Layer Blockchain-Assisted Trusted Data Flow Model for Industrial Control Systems
Xiangzhen Peng, Chengliang Zheng, Yidi Wang, et al.
Reliability Engineering & System Safety (2025), pp. 111013-111013
Closed Access
Xiangzhen Peng, Chengliang Zheng, Yidi Wang, et al.
Reliability Engineering & System Safety (2025), pp. 111013-111013
Closed Access
A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges
Jean Baptiste Minani, Fatima Sabir, Naouel Moha, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 4, pp. 785-815
Closed Access | Times Cited: 3
Jean Baptiste Minani, Fatima Sabir, Naouel Moha, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 4, pp. 785-815
Closed Access | Times Cited: 3
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
José-Antonio Gómez-Hernández, Pedro García‐Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
José-Antonio Gómez-Hernández, Pedro García‐Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
Optimized Deep Transfer Learning with Soft Voting Ensemble for Netflow Intrusion Detection Systems in Internet of Things
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Ensemble Learning Techniques for the Detection of IoT Botnets
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
(2024), pp. 80-85
Closed Access
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
(2024), pp. 80-85
Closed Access
A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey
Rashid Mustafa, Nurul I. Sarkar, Mahsa Mohaghegh, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7209-7209
Open Access
Rashid Mustafa, Nurul I. Sarkar, Mahsa Mohaghegh, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7209-7209
Open Access
AI-Driven Secure Intrusion Detection for Internet of Things (IOT) Networks
Chigozie Kingsley Ejeofobiri, Olayinka Olubola Victor-Igun, C. I. Okoye
Deleted Journal (2024) Vol. 31, Iss. 4, pp. 40-55
Open Access
Chigozie Kingsley Ejeofobiri, Olayinka Olubola Victor-Igun, C. I. Okoye
Deleted Journal (2024) Vol. 31, Iss. 4, pp. 40-55
Open Access
Enhancing Iot Security and Efficiency Through Rina: A Comprehensive Qualitative Analysis and Use Case Study
Peyman Teymoori, Toktam Ramezanifarkhani
(2024)
Closed Access
Peyman Teymoori, Toktam Ramezanifarkhani
(2024)
Closed Access
Enhancing Iot Security and Efficiency Through Rina: A Comprehensive Qualitative Analysis and Use Case Study
Peyman Teymoori, Toktam Ramezanifarkhani
(2024)
Closed Access
Peyman Teymoori, Toktam Ramezanifarkhani
(2024)
Closed Access
A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Jean Pierre Ntayagabiri, Youssef Bentaleb, Jérémie Ndikumagenge, et al.
Journal of Computing Theories and Applications (2024) Vol. 2, Iss. 3, pp. 324-341
Closed Access
Jean Pierre Ntayagabiri, Youssef Bentaleb, Jérémie Ndikumagenge, et al.
Journal of Computing Theories and Applications (2024) Vol. 2, Iss. 3, pp. 324-341
Closed Access
Identify: Intelligent Device Identification Using Device Fingerprints and Machine Learning
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access
A Comprehensive IDs to Detect Botnet Attacks Using Machine Learning Techniques
Abdullah A. Alghamdi, Ayad Barsoum
(2024), pp. 1-6
Closed Access
Abdullah A. Alghamdi, Ayad Barsoum
(2024), pp. 1-6
Closed Access