
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security and Internet of Things: Benefits, Challenges, and Future Perspectives
Hamed Taherdoost
Electronics (2023) Vol. 12, Iss. 8, pp. 1901-1901
Open Access | Times Cited: 39
Hamed Taherdoost
Electronics (2023) Vol. 12, Iss. 8, pp. 1901-1901
Open Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
An intelligent optimization framework to predict the vulnerable range of tumor cells using Internet of things
Venkata Ashok K Gorantla, Shiva Kumar Sriramulugari, Amit Hasmukhbhai Mewada, et al.
(2023)
Closed Access | Times Cited: 55
Venkata Ashok K Gorantla, Shiva Kumar Sriramulugari, Amit Hasmukhbhai Mewada, et al.
(2023)
Closed Access | Times Cited: 55
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 44
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 44
Real-Time Remote Patient Monitoring: A Review of Biosensors Integrated with Multi-Hop IoT Systems via Cloud Connectivity
Raihan Uddin, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1876-1876
Open Access | Times Cited: 21
Raihan Uddin, Insoo Koo
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1876-1876
Open Access | Times Cited: 21
A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories
Hannelore Sebestyen, Daniela Elena Popescu, Doina Zmaranda
Computers (2025) Vol. 14, Iss. 2, pp. 61-61
Open Access | Times Cited: 1
Hannelore Sebestyen, Daniela Elena Popescu, Doina Zmaranda
Computers (2025) Vol. 14, Iss. 2, pp. 61-61
Open Access | Times Cited: 1
Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework
Nouf Saeed Alotaibi, Hassan I. Ahmed, Samah Osama M. Kamel, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1638-1638
Open Access | Times Cited: 7
Nouf Saeed Alotaibi, Hassan I. Ahmed, Samah Osama M. Kamel, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1638-1638
Open Access | Times Cited: 7
Exploring the Impact of Security Technologies on Mental Health: A Comprehensive Review
Adwait S Malik, Sourya Acharya, Sonal Humane
Cureus (2024)
Open Access | Times Cited: 4
Adwait S Malik, Sourya Acharya, Sonal Humane
Cureus (2024)
Open Access | Times Cited: 4
PictureGuard: Enhancing Software-Defined Networking–Internet of Things Security with Novel Image-Based Authentication and Artificial Intelligence-Powered Two-Stage Intrusion Detection
Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, Said S. Saloum, et al.
Technologies (2025) Vol. 13, Iss. 2, pp. 55-55
Open Access
Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, Said S. Saloum, et al.
Technologies (2025) Vol. 13, Iss. 2, pp. 55-55
Open Access
Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access
Lightweight Novel Approach for Collaborative Packet-Based Mitigation of Blackhole Attacks in RPL-Based IoT
Mohammed Belkheir, Mehdi Rouissat, Allel Mokaddem, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Mohammed Belkheir, Mehdi Rouissat, Allel Mokaddem, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access
Comprehensive Study of IoT Vulnerabilities and Countermeasures
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access
Harnessing artificial intelligence to address diseases attributable to unsafe drinking water: challenges, potentials, and recommendations
Adamu Muhammad Ibrahim, Olalekan John Okesanya, Bonaventure Michael Ukoaka, et al.
Discover Water (2025) Vol. 5, Iss. 1
Open Access
Adamu Muhammad Ibrahim, Olalekan John Okesanya, Bonaventure Michael Ukoaka, et al.
Discover Water (2025) Vol. 5, Iss. 1
Open Access
Cyber Security Risk Analysis of IoT Ecosystem
Manish Kumar Srivastava, Ujjaval Patel
(2025), pp. 1-6
Closed Access
Manish Kumar Srivastava, Ujjaval Patel
(2025), pp. 1-6
Closed Access
Recent Developments in IoT Security and Privacy: A Review of Best Practices with Challenges and Emerging Solutions
Sunita Dixit, Dinesh Yadav
(2025), pp. 1888-1894
Closed Access
Sunita Dixit, Dinesh Yadav
(2025), pp. 1888-1894
Closed Access
Insights into Cybercrime Detection and Response: A Review of Time Factor
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
Hamed Taherdoost
Information (2024) Vol. 15, Iss. 5, pp. 273-273
Open Access | Times Cited: 3
Cost-Effective Signcryption for Securing IoT: A Novel Signcryption Algorithm Based on Hyperelliptic Curves
Junaid Khan, Congxu Zhu, W. Khairuddin W. Ali, et al.
Information (2024) Vol. 15, Iss. 5, pp. 282-282
Open Access | Times Cited: 3
Junaid Khan, Congxu Zhu, W. Khairuddin W. Ali, et al.
Information (2024) Vol. 15, Iss. 5, pp. 282-282
Open Access | Times Cited: 3
Network Traffic Visualization Coupled With Convolutional Neural Networks for Enhanced IoT Botnet Detection
David Arnold, M. Gromov, Jafar Saniie
IEEE Access (2024) Vol. 12, pp. 73547-73560
Open Access | Times Cited: 3
David Arnold, M. Gromov, Jafar Saniie
IEEE Access (2024) Vol. 12, pp. 73547-73560
Open Access | Times Cited: 3
Evaluating the Integration of Edge Computing and Serverless Architectures for Enhancing Scalability and Sustainability in Cloud-based Big Data Management
Favour Amarachi Ezeugwa
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 7, pp. 347-365
Open Access | Times Cited: 3
Favour Amarachi Ezeugwa
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 7, pp. 347-365
Open Access | Times Cited: 3
Smart Contract-Based Access Control Framework for Internet of Things Devices
Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, et al.
Computers (2023) Vol. 12, Iss. 11, pp. 240-240
Open Access | Times Cited: 7
Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, et al.
Computers (2023) Vol. 12, Iss. 11, pp. 240-240
Open Access | Times Cited: 7
Using Machine Learning Algorithms in Intrusion Detection Systems: A Review
Mazin S. Mohammed, Hasanien Ali Talib
Tikrit Journal of Pure Science (2024) Vol. 29, Iss. 3, pp. 63-74
Open Access | Times Cited: 2
Mazin S. Mohammed, Hasanien Ali Talib
Tikrit Journal of Pure Science (2024) Vol. 29, Iss. 3, pp. 63-74
Open Access | Times Cited: 2
Dual-Q network deep reinforcement learning-based computation offloading method for industrial internet of things
Ruizhong Du, Jinru Wu, Yan Gao
The Journal of Supercomputing (2024) Vol. 80, Iss. 17, pp. 25590-25615
Closed Access | Times Cited: 2
Ruizhong Du, Jinru Wu, Yan Gao
The Journal of Supercomputing (2024) Vol. 80, Iss. 17, pp. 25590-25615
Closed Access | Times Cited: 2
A Novel Deep Learning Approach for Real-Time Critical Assessment in Smart Urban Infrastructure Systems
Abdulaziz Almaleh
Electronics (2024) Vol. 13, Iss. 16, pp. 3286-3286
Open Access | Times Cited: 2
Abdulaziz Almaleh
Electronics (2024) Vol. 13, Iss. 16, pp. 3286-3286
Open Access | Times Cited: 2
Security Challenges in Internet of Things
Purva Joshi, Seema Joshi
Advances in information security, privacy, and ethics book series (2024), pp. 355-392
Closed Access | Times Cited: 2
Purva Joshi, Seema Joshi
Advances in information security, privacy, and ethics book series (2024), pp. 355-392
Closed Access | Times Cited: 2
Authentication schemes in wireless internet of things sensor networks: a survey and comparison
Pendukeni Phalaagae, Adamu Murtala Zungeru, Boyce Sigweni, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1876-1876
Open Access | Times Cited: 1
Pendukeni Phalaagae, Adamu Murtala Zungeru, Boyce Sigweni, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1876-1876
Open Access | Times Cited: 1
Including GRC Principles in IoT Security: A Comparison of Current Approaches and Future Prospects
Umal Nanumura, Isuranga Nipun Kumara
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2159-2163
Open Access | Times Cited: 1
Umal Nanumura, Isuranga Nipun Kumara
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2159-2163
Open Access | Times Cited: 1
IoT Security, Future Challenges, and Open Issues
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3