OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
Wen Fei, Hiroyuki Ohno, Srinivas Sampalli
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Closed Access | Times Cited: 15

Showing 15 citing articles:

Explainability in AI-based behavioral malware detection systems
Antonio Galli, Valerio La Gatta, Vincenzo Moscato, et al.
Computers & Security (2024) Vol. 141, pp. 103842-103842
Open Access | Times Cited: 13

NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access

STFNIoT:Lightweight IoT Intrusion Detection Based on Explainable Analysis Using Spatiotemporal Fusion Networks
Hanlin Chen, Huan Liu, Wenjun Yang
Research Square (Research Square) (2025)
Closed Access

Trust dynamicity for IoT: How do i trust your social IoT cluster?
Davide Ferraris, Carmen Fernández-Gago, Younes Assouyat, et al.
Internet of Things (2025), pp. 101529-101529
Closed Access

Comprehensive Study of IoT Vulnerabilities and Countermeasures
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access

Double Layer Blockchain-Assisted Trusted Data Flow Model for Industrial Control Systems
Xiangzhen Peng, Chengliang Zheng, Yidi Wang, et al.
Reliability Engineering & System Safety (2025), pp. 111013-111013
Closed Access

A Systematic Review of IoT Systems Testing: Objectives, Approaches, Tools, and Challenges
Jean Baptiste Minani, Fatima Sabir, Naouel Moha, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 4, pp. 785-815
Closed Access | Times Cited: 3

Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
José-Antonio Gómez-Hernández, Pedro García‐Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1

Ensemble Learning Techniques for the Detection of IoT Botnets
Ahsan Nazir, Jingsha He, Nafei Zhu, et al.
(2024), pp. 80-85
Closed Access

A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey
Rashid Mustafa, Nurul I. Sarkar, Mahsa Mohaghegh, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7209-7209
Open Access

AI-Driven Secure Intrusion Detection for Internet of Things (IOT) Networks
Chigozie Kingsley Ejeofobiri, Olayinka Olubola Victor-Igun, C. I. Okoye
Deleted Journal (2024) Vol. 31, Iss. 4, pp. 40-55
Open Access

A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Jean Pierre Ntayagabiri, Youssef Bentaleb, Jérémie Ndikumagenge, et al.
Journal of Computing Theories and Applications (2024) Vol. 2, Iss. 3, pp. 324-341
Closed Access

Identify: Intelligent Device Identification Using Device Fingerprints and Machine Learning
Liwei Liu, Muhammad Ajmal Azad, Harjinder Singh Lallie, et al.
(2024)
Closed Access

A Comprehensive IDs to Detect Botnet Attacks Using Machine Learning Techniques
Abdullah A. Alghamdi, Ayad Barsoum
(2024), pp. 1-6
Closed Access

Page 1

Scroll to top