
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 17
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 17
Showing 17 citing articles:
Comparative Analysis of Edge-based and Cloud-based Intrusion Detection Systems: A Systematic Literature Review
Sahar Ebadinezhad, Ali Hussein Abdulrazzaq Alsaroah
(2025), pp. 707-714
Closed Access
Sahar Ebadinezhad, Ali Hussein Abdulrazzaq Alsaroah
(2025), pp. 707-714
Closed Access
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 51176-51192
Open Access | Times Cited: 2
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 51176-51192
Open Access | Times Cited: 2
Crude oil industry remote monitoring and management based on Industrial Internet of things and edge computing integration: A comprehensive survey
Hazem Ramzey, Mahmoud Badawy, Adel A. Elbaset
Results in Engineering (2024) Vol. 24, pp. 103034-103034
Open Access | Times Cited: 1
Hazem Ramzey, Mahmoud Badawy, Adel A. Elbaset
Results in Engineering (2024) Vol. 24, pp. 103034-103034
Open Access | Times Cited: 1
Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 1
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 1
Chaotic Radio Frequency Fingerprint Masking Against Identity Attacks
Mingye Li, Xinyong Peng, Zhi Chai, et al.
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 9, pp. 2616-2619
Closed Access | Times Cited: 1
Mingye Li, Xinyong Peng, Zhi Chai, et al.
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 9, pp. 2616-2619
Closed Access | Times Cited: 1
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure
Maxim Kalinin, E. V. Zavadskii, Alexey Busygin
Sensors (2023) Vol. 23, Iss. 21, pp. 8724-8724
Open Access | Times Cited: 3
Maxim Kalinin, E. V. Zavadskii, Alexey Busygin
Sensors (2023) Vol. 23, Iss. 21, pp. 8724-8724
Open Access | Times Cited: 3
Isolation Forest Anomaly Detection in Vital Sign Monitoring for Healthcare
Kanchan Yadav, Upendra Singh Aswal, V. Saravanan, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3
Kanchan Yadav, Upendra Singh Aswal, V. Saravanan, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 3
Dynamic Cooperative Communications with Mutual Information Accumulation for Mobile Robots in Industrial Internet of Things
Daoyuan Sun, Zefan Liu, Xinming Zhang
Sensors (2024) Vol. 24, Iss. 13, pp. 4362-4362
Open Access
Daoyuan Sun, Zefan Liu, Xinming Zhang
Sensors (2024) Vol. 24, Iss. 13, pp. 4362-4362
Open Access
Smart Factory based on IIoT: Applications,Communication Networks and Cybersecurity
Yazen S. Sheet, Mohammed Younis Thanoun, Firas S. Alsharbaty
International Journal of Wireless and Microwave Technologies (2024) Vol. 14, Iss. 4, pp. 29-47
Open Access
Yazen S. Sheet, Mohammed Younis Thanoun, Firas S. Alsharbaty
International Journal of Wireless and Microwave Technologies (2024) Vol. 14, Iss. 4, pp. 29-47
Open Access
A Comprehensive Exploration of Digital Forensics Investigations in Embedded Systems, Ubiquitous Computing, Fog Computing, and Edge Computing
Norman Nelufule, Tanita Singano, Mfundo Masango
(2024), pp. 1-6
Closed Access
Norman Nelufule, Tanita Singano, Mfundo Masango
(2024), pp. 1-6
Closed Access
Improving the Privacy in Wireless-Enabled 5G Networks: A Lightweight Protocol for IIoT Communications
Mamoon M. Saeed, Rashid A. Saeed, Mohammed Elbashier, et al.
Asian Journal of Electrical and Electronic Engineering. (2024) Vol. 4, Iss. 2, pp. 1-17
Closed Access
Mamoon M. Saeed, Rashid A. Saeed, Mohammed Elbashier, et al.
Asian Journal of Electrical and Electronic Engineering. (2024) Vol. 4, Iss. 2, pp. 1-17
Closed Access
Exploring the Role of Artificial Intelligence in Internet of Things Systems: A Systematic Mapping Study
Umair Khadam, Paul Davidsson, Romina Spalazzese
Sensors (2024) Vol. 24, Iss. 20, pp. 6511-6511
Open Access
Umair Khadam, Paul Davidsson, Romina Spalazzese
Sensors (2024) Vol. 24, Iss. 20, pp. 6511-6511
Open Access
Dynamic Residual Graph Attention Network for Network Intrusion Detection System
Song Wang, Zhenming Zhang, Wei Li, et al.
(2024), pp. 53-56
Closed Access
Song Wang, Zhenming Zhang, Wei Li, et al.
(2024), pp. 53-56
Closed Access
A survey on various security protocols of edge computing
Tathagata Bhattacharya, Adithya Vardhan Peddi, Srikanth Ponaganti, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Tathagata Bhattacharya, Adithya Vardhan Peddi, Srikanth Ponaganti, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Chaotic Feature Masking Against Attacks on Emitter Identification
Mingye Li, Zhi Chai, Xinran Huang, et al.
(2024), pp. 1-3
Closed Access
Mingye Li, Zhi Chai, Xinran Huang, et al.
(2024), pp. 1-3
Closed Access
Lightweight intelligent fault diagnosis method based on a multi-stage pruning distillation interleaving network
Linlin Ren, Xiaoming Li, Hongbo Ma, et al.
Advances in Mechanical Engineering (2024) Vol. 16, Iss. 9
Open Access
Linlin Ren, Xiaoming Li, Hongbo Ma, et al.
Advances in Mechanical Engineering (2024) Vol. 16, Iss. 9
Open Access
Deep Guard-IoT: A Systematic Review of AI-Based Anomaly Detection Frameworks for Next-Generation IoT Security (2020-2024)
Asst. Prof. Alaa Abdul HUSSAIN Dleih Almowsawi
Wasit Journal of Pure sciences (2024) Vol. 3, Iss. 4, pp. 70-77
Open Access
Asst. Prof. Alaa Abdul HUSSAIN Dleih Almowsawi
Wasit Journal of Pure sciences (2024) Vol. 3, Iss. 4, pp. 70-77
Open Access