OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps
Alyaa A. Hamza, Islam Tharwat Abdel Halim, Mohamed Sobh, et al.
Sensors (2022) Vol. 22, Iss. 3, pp. 1079-1079
Open Access | Times Cited: 13

Showing 13 citing articles:

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27

An Evaluation of Current Malware Trends and Defense Techniques: A Scoping Review with Empirical Case Studies
Azaabi Cletus, Alex Akwasi Opoku, Benjamin Asubam Weyori
Journal of Advances in Information Technology (2024), pp. 649-671
Open Access | Times Cited: 4

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
Rahman Ali, Asmat Ali, Farkhund Iqbal, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-31
Open Access | Times Cited: 20

Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach
Omar Alshamsi, Khaled Shaalan, Usman Javed Butt
Information (2024) Vol. 15, Iss. 10, pp. 631-631
Open Access | Times Cited: 3

DEMD-IoT: a deep ensemble model for IoT malware detection using CNNs and network traffic
Mehrnoosh Nobakht, Reza Javidan, Alireza Pourebrahimi
Evolving Systems (2022) Vol. 14, Iss. 3, pp. 461-477
Closed Access | Times Cited: 13

A Survey on Conflict Detection in IoT-based Smart Homes
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6

Dependable and Non-Dependable Multi-Authentication Access Constraints to Regulate Third-Party Libraries and Plug-Ins across Platforms
Santosh Kumar Henge, G. Uma Maheswari, Rajakumar Ramalingam, et al.
Systems (2023) Vol. 11, Iss. 5, pp. 262-262
Open Access | Times Cited: 3

Security Assessment Framework for IOT via Glove Optimized CNN-BiLSTM
Vanishri Arun, S. Ramesh, Carmel Sobia M, et al.
International journal of electrical and computer engineering systems (2024) Vol. 15, Iss. 5, pp. 387-394
Open Access

Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network
B Swathi, Soma Sekhar Kolisetty, G. V. Sivanarayana, et al.
Cluster Computing (2024) Vol. 27, Iss. 8, pp. 10653-10670
Closed Access

Integrating of rule based secure parameters for analyzing third-party applications and libraries in cross platform development
Santosh Kumar Henge, Pooja Dhiman
AIP conference proceedings (2023) Vol. 2804, pp. 020074-020074
Closed Access

Correctness of IoT-based systems: From a DSL to a mechanised analysis
Christian Attiogbé, Jérôme Rocheteau
Journal of Computer Languages (2023) Vol. 77, pp. 101239-101239
Closed Access

Color Inspection Label Checking System for Aimar Printer Model at PT. Indonesia Epson Industry (IEI)
Eri Mardiani, Ferdan Akbar Ramadhan
Jurnal Sains dan Teknologi Industri (2023) Vol. 20, Iss. 2, pp. 928-928
Open Access

Architectural Invariants and Correctness of IoT-Based Systems
Christian Attiogbé, Jérôme Rocheteau
Communications in computer and information science (2022), pp. 75-88
Closed Access

Page 1

Scroll to top