
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Internet of Things Security: Challenges and Key Issues
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 74
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 74
Showing 1-25 of 74 citing articles:
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 311-320
Open Access | Times Cited: 57
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 311-320
Open Access | Times Cited: 57
Deep learning-based intrusion detection approach for securing industrial Internet of Things
Sahar Soliman, Wed Oudah, Ahamed Aljuhani
Alexandria Engineering Journal (2023) Vol. 81, pp. 371-383
Open Access | Times Cited: 53
Sahar Soliman, Wed Oudah, Ahamed Aljuhani
Alexandria Engineering Journal (2023) Vol. 81, pp. 371-383
Open Access | Times Cited: 53
FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
IEEE Access (2023) Vol. 11, pp. 28934-28954
Open Access | Times Cited: 47
Walid I. Khedr, Ameer E. Gouda, Ehab R. Mohamed
IEEE Access (2023) Vol. 11, pp. 28934-28954
Open Access | Times Cited: 47
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Big Data Mining and Analytics (2023) Vol. 6, Iss. 3, pp. 273-287
Open Access | Times Cited: 43
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
Bindu Bala, Sunny Behal
Computer Science Review (2024) Vol. 52, pp. 100631-100631
Closed Access | Times Cited: 14
FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs
Sara Amaouche, Azidine Guezzaz, Said Benkirane, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7488-7488
Open Access | Times Cited: 21
Sara Amaouche, Azidine Guezzaz, Said Benkirane, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7488-7488
Open Access | Times Cited: 21
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
Nur Mohammad, Rabeya Khatoon, Sadia Islam Nilima, et al.
Journal of Computer and Communications (2024) Vol. 12, Iss. 08, pp. 257-277
Open Access | Times Cited: 9
Nur Mohammad, Rabeya Khatoon, Sadia Islam Nilima, et al.
Journal of Computer and Communications (2024) Vol. 12, Iss. 08, pp. 257-277
Open Access | Times Cited: 9
A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
Nathalie Tan Yhe Huan, Zuriati Ahmad Zukarnain
IEEE Access (2024) Vol. 12, pp. 69765-69782
Open Access | Times Cited: 8
Nathalie Tan Yhe Huan, Zuriati Ahmad Zukarnain
IEEE Access (2024) Vol. 12, pp. 69765-69782
Open Access | Times Cited: 8
Blockchain-Based Authentication Schemes in Smart Environments: A Systematic Literature Review
Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34774-34796
Closed Access | Times Cited: 7
Mustafa A. Al Sibahee, Zaid Ameen Abduljabbar, Alladoumbaye Ngueilbaye, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34774-34796
Closed Access | Times Cited: 7
Anomaly detection model based on gradient boosting and decision tree for IoT environments security
Maryam Douiba, Said Benkirane, Azidine Guezzaz, et al.
Journal of Reliable Intelligent Environments (2022) Vol. 9, Iss. 4, pp. 421-432
Closed Access | Times Cited: 35
Maryam Douiba, Said Benkirane, Azidine Guezzaz, et al.
Journal of Reliable Intelligent Environments (2022) Vol. 9, Iss. 4, pp. 421-432
Closed Access | Times Cited: 35
Innovations in Security: A Study of Cloud Computing and IoT
Hamza Azam, Muhammed Ahnaf Tajwar, Sathesan Mayhialagan, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 18
Hamza Azam, Muhammed Ahnaf Tajwar, Sathesan Mayhialagan, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 18
Estimation of Global Irradiation on Horizontal Plane Using Artificial Neural Network
Mohammed Benchrifa, Jamal Mabrouki, Rachid Tadili
Lecture notes in networks and systems (2023), pp. 395-400
Closed Access | Times Cited: 16
Mohammed Benchrifa, Jamal Mabrouki, Rachid Tadili
Lecture notes in networks and systems (2023), pp. 395-400
Closed Access | Times Cited: 16
Enhancing Internet of Things security using performance gradient boosting for network intrusion detection systems
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access
A New Secure Model for Cloud Environments Using RBFNN and AdaBoost
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Hanaa Attou, Azidine Guezzaz, Said Benkirane, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
A user-centric taxonomy of cyber harm in the metaverse
Jeb Webb, Sophie McKenzie, Robin Doss, et al.
International journal of law, crime and justice (2025) Vol. 81, pp. 100734-100734
Open Access
Jeb Webb, Sophie McKenzie, Robin Doss, et al.
International journal of law, crime and justice (2025) Vol. 81, pp. 100734-100734
Open Access
Machine-Learning-Based Vulnerability Detection and Classification in Internet of Things Device Security
Sarah Bin Hulayyil, Shancang Li, Lida Xu
Electronics (2023) Vol. 12, Iss. 18, pp. 3927-3927
Open Access | Times Cited: 15
Sarah Bin Hulayyil, Shancang Li, Lida Xu
Electronics (2023) Vol. 12, Iss. 18, pp. 3927-3927
Open Access | Times Cited: 15
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
Ahlem Abid, Farah Jemili, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 2217-2238
Closed Access | Times Cited: 13
Ahlem Abid, Farah Jemili, Ouajdi Korbaa
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 2217-2238
Closed Access | Times Cited: 13
An Intrusion Detection Model using election-Based Feature Selection and K-NN
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Microprocessors and Microsystems (2023), pp. 104966-104966
Closed Access | Times Cited: 13
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Microprocessors and Microsystems (2023), pp. 104966-104966
Closed Access | Times Cited: 13
Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
R. Gayathri, Shola Usharani, Miroslav Mahdal, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1708-1708
Open Access | Times Cited: 12
R. Gayathri, Shola Usharani, Miroslav Mahdal, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1708-1708
Open Access | Times Cited: 12
IoT-Enabled Smart Agriculture: Security Issues and Applications
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2023), pp. 566-571
Closed Access | Times Cited: 12
Mouaad Mohy-eddine, Azidine Guezzaz, Said Benkirane, et al.
Lecture notes in networks and systems (2023), pp. 566-571
Closed Access | Times Cited: 12
Internet of Things Authentication Protocols: Comparative Study
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 65-91
Open Access | Times Cited: 4
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 65-91
Open Access | Times Cited: 4
Exploring Personalized Internet of Things (PIoT), social connectivity, and Artificial Social Intelligence (ASI): A survey
Bisma Gulzar, Shabir Ahmad Sofi, Sahil Sholla
High-Confidence Computing (2024) Vol. 4, Iss. 3, pp. 100242-100242
Open Access | Times Cited: 4
Bisma Gulzar, Shabir Ahmad Sofi, Sahil Sholla
High-Confidence Computing (2024) Vol. 4, Iss. 3, pp. 100242-100242
Open Access | Times Cited: 4
Intrusion Detection Framework for IoT-Based Smart Environments Security
Chaimae Hazman, Said Benkirane, Azidine Guezzaz, et al.
Lecture notes in networks and systems (2023), pp. 546-552
Closed Access | Times Cited: 10
Chaimae Hazman, Said Benkirane, Azidine Guezzaz, et al.
Lecture notes in networks and systems (2023), pp. 546-552
Closed Access | Times Cited: 10
Provably Secure Dynamic Anonymous Authentication Protocol for Wireless Sensor Networks in Internet of Things
Zixuan Ding, Qi Xie
Sustainability (2023) Vol. 15, Iss. 7, pp. 5734-5734
Open Access | Times Cited: 10
Zixuan Ding, Qi Xie
Sustainability (2023) Vol. 15, Iss. 7, pp. 5734-5734
Open Access | Times Cited: 10
Overview of 5G & Beyond Security
Fawad Shokoor, Wasswa Shafik, S. Mojtaba Matinkhah
EAI Endorsed Transactions on Internet of Things (2022) Vol. 8, Iss. 30, pp. e2-e2
Open Access | Times Cited: 16
Fawad Shokoor, Wasswa Shafik, S. Mojtaba Matinkhah
EAI Endorsed Transactions on Internet of Things (2022) Vol. 8, Iss. 30, pp. e2-e2
Open Access | Times Cited: 16