
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Analysis of Security Issues and Countermeasures for the Industrial Internet of Things
Shantanu Pal, Zahra Jadidi
Applied Sciences (2021) Vol. 11, Iss. 20, pp. 9393-9393
Open Access | Times Cited: 47
Shantanu Pal, Zahra Jadidi
Applied Sciences (2021) Vol. 11, Iss. 20, pp. 9393-9393
Open Access | Times Cited: 47
Showing 1-25 of 47 citing articles:
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 87
Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 87
Intelligent approaches toward intrusion detection systems for Industrial Internet of Things: A systematic comprehensive review
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
Journal of Network and Computer Applications (2023) Vol. 215, pp. 103637-103637
Closed Access | Times Cited: 46
Mudhafar Nuaimi, Lamia Chaari Fourati, Bassem Ben Hamed
Journal of Network and Computer Applications (2023) Vol. 215, pp. 103637-103637
Closed Access | Times Cited: 46
Secure Blockchain Middleware for Decentralized IIoT towards Industry 5.0: A Review of Architecture, Enablers, Challenges, and Directions
Jiewu Leng, Ziying Chen, Zhiqiang Huang, et al.
Machines (2022) Vol. 10, Iss. 10, pp. 858-858
Open Access | Times Cited: 44
Jiewu Leng, Ziying Chen, Zhiqiang Huang, et al.
Machines (2022) Vol. 10, Iss. 10, pp. 858-858
Open Access | Times Cited: 44
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence
Tanzila Saba, Amjad Rehman, Khalid Haseeb, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 2921-2931
Open Access | Times Cited: 37
Tanzila Saba, Amjad Rehman, Khalid Haseeb, et al.
Cluster Computing (2023) Vol. 26, Iss. 5, pp. 2921-2931
Open Access | Times Cited: 37
Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques
Mohammed Aziz Al Kabir, Wael Elmedany, Mhd Saeed Sharif
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 4, pp. 199-223
Open Access | Times Cited: 28
Mohammed Aziz Al Kabir, Wael Elmedany, Mhd Saeed Sharif
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 4, pp. 199-223
Open Access | Times Cited: 28
Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions
Rawan Bukhowah, Ahmed Aljughaiman, M. M. Hafizur Rahman
Electronics (2024) Vol. 13, Iss. 6, pp. 1031-1031
Open Access | Times Cited: 8
Rawan Bukhowah, Ahmed Aljughaiman, M. M. Hafizur Rahman
Electronics (2024) Vol. 13, Iss. 6, pp. 1031-1031
Open Access | Times Cited: 8
Intrusion detection for Industrial Internet of Things based on deep learning
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 16
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 16
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103786-103786
Open Access | Times Cited: 7
Poopak Alaeifar, Shantanu Pal, Zahra Jadidi, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103786-103786
Open Access | Times Cited: 7
A Lightweight Specific Emitter Identification Model for IIoT Devices Based on Adaptive Broad Learning
Zhengwei Xu, Guangjie Han, Li Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 5, pp. 7066-7075
Closed Access | Times Cited: 26
Zhengwei Xu, Guangjie Han, Li Liu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 5, pp. 7066-7075
Closed Access | Times Cited: 26
Industrial IoT (IIOT): Security Threats and Countermeasures
Rakesh Kumar, Bipin Kandpal, Vasim Ahmad
(2023), pp. 829-833
Closed Access | Times Cited: 14
Rakesh Kumar, Bipin Kandpal, Vasim Ahmad
(2023), pp. 829-833
Closed Access | Times Cited: 14
A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare
Mehdi Hosseinzadeh, Joon Yoo, Saqib Ali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 12
Mehdi Hosseinzadeh, Joon Yoo, Saqib Ali, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 12
Leveraging the Industrial Internet of Things (IIoT) for Real-Time CO2 Monitoring, Measurement and Visualization: Technologies, Applications and Future Directions
Michael Christensen
Communications in computer and information science (2025), pp. 35-59
Open Access
Michael Christensen
Communications in computer and information science (2025), pp. 35-59
Open Access
A Cluster-Tree-Based Secure Routing Protocol Using Dragonfly Algorithm (DA) in the Internet of Things (IoT) for Smart Agriculture
Mehdi Hosseinzadeh, Jawad Tanveer, Amir Masoud Rahmani, et al.
Mathematics (2022) Vol. 11, Iss. 1, pp. 80-80
Open Access | Times Cited: 19
Mehdi Hosseinzadeh, Jawad Tanveer, Amir Masoud Rahmani, et al.
Mathematics (2022) Vol. 11, Iss. 1, pp. 80-80
Open Access | Times Cited: 19
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Hani Attar
Journal of Data and Information Quality (2023) Vol. 15, Iss. 3, pp. 1-26
Closed Access | Times Cited: 11
Blockchain meets edge-AI for food supply chain traceability and provenance
Volkan Dedeoglu, Sidra Malik, Gowri Sankar Ramachandran, et al.
Comprehensive analytical chemistry (2023), pp. 251-275
Closed Access | Times Cited: 9
Volkan Dedeoglu, Sidra Malik, Gowri Sankar Ramachandran, et al.
Comprehensive analytical chemistry (2023), pp. 251-275
Closed Access | Times Cited: 9
Correlation-Based Anomaly Detection in Industrial Control Systems
Zahra Jadidi, Shantanu Pal, Mukhtar Hussain, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1561-1561
Open Access | Times Cited: 7
Zahra Jadidi, Shantanu Pal, Mukhtar Hussain, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1561-1561
Open Access | Times Cited: 7
Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network
Yongsheng Deng
Journal of Cyber Security and Mobility (2024), pp. 327-348
Open Access | Times Cited: 2
Yongsheng Deng
Journal of Cyber Security and Mobility (2024), pp. 327-348
Open Access | Times Cited: 2
Balancing data privacy and sharing in IIoT: Introducing the GFL-LFF aggregation algorithm
R. Regan, R. Josphineleela, Mohammad Khamruddin, et al.
Computer Networks (2024) Vol. 247, pp. 110401-110401
Closed Access | Times Cited: 2
R. Regan, R. Josphineleela, Mohammad Khamruddin, et al.
Computer Networks (2024) Vol. 247, pp. 110401-110401
Closed Access | Times Cited: 2
Recent Privacy and Security Issues in Internet of Things Network Layer: A Systematic Review
Malik Zaib Alam, Faheem Ahmad Reegu, Arshad Ahmad Dar, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2022), pp. 1025-1031
Closed Access | Times Cited: 9
Malik Zaib Alam, Faheem Ahmad Reegu, Arshad Ahmad Dar, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2022), pp. 1025-1031
Closed Access | Times Cited: 9
Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
Zahra Jadidi, Shantanu Pal, Nithesh Nayak K, et al.
(2022), pp. 1-7
Open Access | Times Cited: 8
Zahra Jadidi, Shantanu Pal, Nithesh Nayak K, et al.
(2022), pp. 1-7
Open Access | Times Cited: 8
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things
Na Li, Maode Ma, Hui Wang
Sensors (2024) Vol. 24, Iss. 4, pp. 1243-1243
Open Access | Times Cited: 1
Na Li, Maode Ma, Hui Wang
Sensors (2024) Vol. 24, Iss. 4, pp. 1243-1243
Open Access | Times Cited: 1
Cyberatttack Detection and Classification in IIoT systems using XGBoost and Gaussian Naïve Bayes: A Comparative Study
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1
Mordi Alenazi, Shailendra Mishra
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 4, pp. 15074-15082
Open Access | Times Cited: 1
Dependability of Embedded Systems in the Industrial Internet of Things: Information Security and Reliability of the Communication Cluster
Andrii Yarmilko, Інна Розломій, S. Naumenko
Lecture notes on data engineering and communications technologies (2024), pp. 235-249
Closed Access | Times Cited: 1
Andrii Yarmilko, Інна Розломій, S. Naumenko
Lecture notes on data engineering and communications technologies (2024), pp. 235-249
Closed Access | Times Cited: 1
Evolutionized Industry With the Internet of Things
Sangeetha Rangasamy, Kavitha Rajamohan, V. S. Lavan, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 407-434
Closed Access | Times Cited: 3
Sangeetha Rangasamy, Kavitha Rajamohan, V. S. Lavan, et al.
Advances in systems analysis, software engineering, and high performance computing book series (2023), pp. 407-434
Closed Access | Times Cited: 3
Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT
Anamika Singh, Rajesh Kumar Dhanaraj, Md. Akkas Ali, et al.
Alexandria Engineering Journal (2023) Vol. 81, pp. 449-459
Open Access | Times Cited: 3
Anamika Singh, Rajesh Kumar Dhanaraj, Md. Akkas Ali, et al.
Alexandria Engineering Journal (2023) Vol. 81, pp. 449-459
Open Access | Times Cited: 3