OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks
Muhammad Shafiq, Zhaoquan Gu, Omar Cheikhrouhou, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 77

Showing 1-25 of 77 citing articles:

Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview
Maad M. Mijwil, Omega John Unogwu, Youssef Filali, et al.
Deleted Journal (2023), pp. 57-63
Open Access | Times Cited: 58

Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Yazeed Yasin Ghadi, Tehseen Mazhar, Tamara Al Shloul, et al.
IEEE Access (2024) Vol. 12, pp. 12699-12719
Open Access | Times Cited: 22

Industry 4.0-based smart systems in aquaculture: A comprehensive review
Vitorino Biazi, Carlos Marques
Aquacultural Engineering (2023) Vol. 103, pp. 102360-102360
Open Access | Times Cited: 31

Advances and Challenges in IoT-Based Smart Drug Delivery Systems: A Comprehensive Review
Amisha S. Raikar, Pramod Kumar, Gokuldas S. Raikar, et al.
Applied System Innovation (2023) Vol. 6, Iss. 4, pp. 62-62
Open Access | Times Cited: 24

Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools
Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Tehseen Mazhar, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 14

IoT and Man‐in‐the‐Middle Attacks
Hamidreza Fereidouni, Olga Fadeitcheva, Mehdi Zalai
Security and Privacy (2025) Vol. 8, Iss. 2
Open Access | Times Cited: 1

Privacy‐preserving remote sensing images recognition based on limited visual cryptography
Denghui Zhang, Muhammad Shafiq, Liguo Wang, et al.
CAAI Transactions on Intelligence Technology (2023) Vol. 8, Iss. 4, pp. 1166-1177
Open Access | Times Cited: 20

Dependable federated learning for IoT intrusion detection against poisoning attacks
Run Yang, Hui He, Yulong Wang, et al.
Computers & Security (2023) Vol. 132, pp. 103381-103381
Closed Access | Times Cited: 16

Analyzing the impact of cyber-attacks on the performance of digital twin-based industrial organizations
Ridwan Mustofa, Md. Rafiquzzaman, Niamat Ullah Ibne Hossain
Journal of Industrial Information Integration (2024) Vol. 41, pp. 100633-100633
Closed Access | Times Cited: 6

IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology
Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, et al.
Electronics (2023) Vol. 12, Iss. 5, pp. 1233-1233
Open Access | Times Cited: 13

Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach
Roberto Casado‐Vara, Marcos Severt, Antonio Díaz-Longueira, et al.
Mathematics (2024) Vol. 12, Iss. 2, pp. 250-250
Open Access | Times Cited: 5

A Semantic Framework to Detect Problems in Activities of Daily Living Monitored through Smart Home Sensors
Giorgos Giannios, Lampros Mpaltadoros, Vasilis Alepopoulos, et al.
Sensors (2024) Vol. 24, Iss. 4, pp. 1107-1107
Open Access | Times Cited: 5

A robust sliding window adaptive filtering technique for phonocardiogram signal denoising
Vishwanath Madhava Shervegar
Multimedia Tools and Applications (2025)
Closed Access

3D printed bespoke solid dosage forms for oral drug delivery
Dimitrios G. Fatouros, Iakovos Xenikakis
Elsevier eBooks (2025), pp. 127-157
Closed Access

Exploring Stakeholder Relationships in Technology Adoption as Strategic Innovation: Narrative Literature Review
Cindy Aprilia, Raditya Ardianwiliandri
Springer proceedings in business and economics (2025), pp. 241-260
Closed Access

A nano-design of a quantum-based arithmetic and logic unit for enhancing the efficiency of the future IoT applications
Seyed‐Sajad Ahmadpour, Maryam Zaker, Nima Jafari Navimipour, et al.
AIP Advances (2025) Vol. 15, Iss. 3
Open Access

An approach to assess robustness of MQTT-based IoT systems
Bruno Jesus, Fernando Lins, Nuno Laranjeiro
Internet of Things (2025), pp. 101590-101590
Open Access

Managing Capital Allocation for Better Technology Integration Outcomes in Healthcare Companies
Diogo Modesto, Ricardo Marcão
Advances in medical technologies and clinical practice book series (2025), pp. 137-156
Closed Access

Architectural Model and Modified Long Range Wide Area Network (LoRaWAN) for Boat Traffic Monitoring and Transport Detection Systems in Shallow Waters
Diaz Saputra, Ford Lumban Gaol, Edi Abdurachman, et al.
Emerging Science Journal (2023) Vol. 7, Iss. 4, pp. 1188-1205
Open Access | Times Cited: 12

Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems
Mohammed El‐Hajj, Pim Beune
Information (2024) Vol. 15, Iss. 6, pp. 304-304
Open Access | Times Cited: 4

A Lightweight Blockchain Scheme for Secure Data Communication in Internet of Things-enabled Wireless Sensor Network
Lavina Balraj, A. Prasanth, K.K. Devi Sowndarya, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 4

Unmasking vulnerabilities by a pioneering approach to securing smart IoT cameras through threat surface analysis and dynamic metrics
Akashdeep Bhardwaj, Salil Bharany, Ashraf Osman Ibrahim, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100513-100513
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top