
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, et al.
Sustainability (2021) Vol. 13, Iss. 16, pp. 9463-9463
Open Access | Times Cited: 59
Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, et al.
Sustainability (2021) Vol. 13, Iss. 16, pp. 9463-9463
Open Access | Times Cited: 59
Showing 1-25 of 59 citing articles:
Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Electronics (2022) Vol. 11, Iss. 20, pp. 3330-3330
Open Access | Times Cited: 53
Esra Altulaihan, Mohammed Amin Almaiah, Ahmed Aljughaiman
Electronics (2022) Vol. 11, Iss. 20, pp. 3330-3330
Open Access | Times Cited: 53
Emerging technologies and design aspects of next generation cyber physical system with a smart city application perspective
Ayaskanta Mishra, Amitkumar V. Jha, Bhargav Appasani, et al.
International Journal of Systems Assurance Engineering and Management (2022) Vol. 14, Iss. S3, pp. 699-721
Closed Access | Times Cited: 44
Ayaskanta Mishra, Amitkumar V. Jha, Bhargav Appasani, et al.
International Journal of Systems Assurance Engineering and Management (2022) Vol. 14, Iss. S3, pp. 699-721
Closed Access | Times Cited: 44
Blockchain-Enabled Smart Grid Applications: Architecture, Challenges, and Solutions
Bhargav Appasani, Sunil Kumar Mishra, Amitkumar V. Jha, et al.
Sustainability (2022) Vol. 14, Iss. 14, pp. 8801-8801
Open Access | Times Cited: 39
Bhargav Appasani, Sunil Kumar Mishra, Amitkumar V. Jha, et al.
Sustainability (2022) Vol. 14, Iss. 14, pp. 8801-8801
Open Access | Times Cited: 39
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
Princy Victor, Arash Habibi Lashkari, Rongxing Lu, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1380-1431
Open Access | Times Cited: 31
Princy Victor, Arash Habibi Lashkari, Rongxing Lu, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1380-1431
Open Access | Times Cited: 31
Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques
Mohammed Aziz Al Kabir, Wael Elmedany, Mhd Saeed Sharif
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 4, pp. 199-223
Open Access | Times Cited: 28
Mohammed Aziz Al Kabir, Wael Elmedany, Mhd Saeed Sharif
Journal of Cyber Security Technology (2023) Vol. 7, Iss. 4, pp. 199-223
Open Access | Times Cited: 28
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 24
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 24
Securing internet of things using machine and deep learning methods: a survey
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 8
Ali Ghaffari, Nasim Jelodari, Samira pouralish, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9065-9089
Open Access | Times Cited: 8
A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
Mumin Adam, Mohammad Hammoudeh, Rana Alrawashdeh, et al.
IEEE Access (2024) Vol. 12, pp. 57128-57149
Open Access | Times Cited: 7
Mumin Adam, Mohammad Hammoudeh, Rana Alrawashdeh, et al.
IEEE Access (2024) Vol. 12, pp. 57128-57149
Open Access | Times Cited: 7
IoT Access Control Model Based on Blockchain and Trusted Execution Environment
Weijin Jiang, En Li, Wenying Zhou, et al.
Processes (2023) Vol. 11, Iss. 3, pp. 723-723
Open Access | Times Cited: 17
Weijin Jiang, En Li, Wenying Zhou, et al.
Processes (2023) Vol. 11, Iss. 3, pp. 723-723
Open Access | Times Cited: 17
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication
Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan
Computer Communications (2024) Vol. 216, pp. 307-323
Closed Access | Times Cited: 6
Jiby J. Puthiyidam, Shelbi Joseph, Bharat Bhushan
Computer Communications (2024) Vol. 216, pp. 307-323
Closed Access | Times Cited: 6
Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems
Bassey Isong, Otshepeng Kgote, Adnan M. Abu‐Mahfouz
Electronics (2024) Vol. 13, Iss. 12, pp. 2370-2370
Open Access | Times Cited: 6
Bassey Isong, Otshepeng Kgote, Adnan M. Abu‐Mahfouz
Electronics (2024) Vol. 13, Iss. 12, pp. 2370-2370
Open Access | Times Cited: 6
Deep learning algorithms for IoT security(survey)
Hiba Hameed Ali, Jolan Rokan Naif, Waleed Rasheed Humood
AIP conference proceedings (2024)
Closed Access | Times Cited: 5
Hiba Hameed Ali, Jolan Rokan Naif, Waleed Rasheed Humood
AIP conference proceedings (2024)
Closed Access | Times Cited: 5
Towards Robust Cyber Attack Taxonomies: A Survey with Requirements, Structures, and Assessment
Paulo Roberto dos Santos, Paulo Angelo Alves Resende, João José Costa Gondim, et al.
ACM Computing Surveys (2025) Vol. 57, Iss. 8, pp. 1-36
Closed Access
Paulo Roberto dos Santos, Paulo Angelo Alves Resende, João José Costa Gondim, et al.
ACM Computing Surveys (2025) Vol. 57, Iss. 8, pp. 1-36
Closed Access
Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts
Dominic Too, Louise Axon, Ioannis Agrafiotis, et al.
Computers & Security (2025), pp. 104433-104433
Closed Access
Dominic Too, Louise Axon, Ioannis Agrafiotis, et al.
Computers & Security (2025), pp. 104433-104433
Closed Access
IoT Vulnerabilities and Attacks: SILEX Malware Case Study
Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1978-1978
Open Access | Times Cited: 14
Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1978-1978
Open Access | Times Cited: 14
Performance Evaluation of Machine Learning Algorithms for IoT-Based Intrusion Detection
Siddhant Sheshrao Bharade, Sanskar Sahebrao Ghongade, Amol Ramji Paratkar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 274-281
Open Access
Siddhant Sheshrao Bharade, Sanskar Sahebrao Ghongade, Amol Ramji Paratkar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 274-281
Open Access
A Cyber-Physical Risk Assessment Approach for Internet of Things Enabled Transportation Infrastructure
Konstantinos Ntafloukas, Daniel McCrum, Liliana Pasquale
Applied Sciences (2022) Vol. 12, Iss. 18, pp. 9241-9241
Open Access | Times Cited: 21
Konstantinos Ntafloukas, Daniel McCrum, Liliana Pasquale
Applied Sciences (2022) Vol. 12, Iss. 18, pp. 9241-9241
Open Access | Times Cited: 21
Survey and classification of Dos and DDos attack detection and validation approaches for IoT environments
Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben‐Othman, et al.
Internet of Things (2023) Vol. 25, pp. 101021-101021
Closed Access | Times Cited: 11
Mohamed Riadh Kadri, Abdelkrim Abdelli, Jalel Ben‐Othman, et al.
Internet of Things (2023) Vol. 25, pp. 101021-101021
Closed Access | Times Cited: 11
Privacy Prevention of Big Data Applications: A Systematic Literature Review
Fatima Rafiq, Mazhar Javed Awan, Awais Yasin, et al.
SAGE Open (2022) Vol. 12, Iss. 2
Open Access | Times Cited: 18
Fatima Rafiq, Mazhar Javed Awan, Awais Yasin, et al.
SAGE Open (2022) Vol. 12, Iss. 2
Open Access | Times Cited: 18
Blockchain-Based Decentralized Storage Design for Data Confidence Over Cloud-Native Edge Infrastructure
Hannie Zang, Ho Kim, JongWon Kim
IEEE Access (2024) Vol. 12, pp. 50083-50099
Open Access | Times Cited: 2
Hannie Zang, Ho Kim, JongWon Kim
IEEE Access (2024) Vol. 12, pp. 50083-50099
Open Access | Times Cited: 2
Transfer Learning Approach for Detecting Keylogging Attack on the Internet of Things
Yahya Alhaj Maz, Mohamad Anbar, Selvakumar Manickam, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
Yahya Alhaj Maz, Mohamad Anbar, Selvakumar Manickam, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 2
A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks
Mehdi Rouissat, Mohammed Belkheir, Hicham Sid Ahmed Belkhira, et al.
JUCS - Journal of Universal Computer Science (2023) Vol. 29, Iss. 2, pp. 118-151
Open Access | Times Cited: 6
Mehdi Rouissat, Mohammed Belkheir, Hicham Sid Ahmed Belkhira, et al.
JUCS - Journal of Universal Computer Science (2023) Vol. 29, Iss. 2, pp. 118-151
Open Access | Times Cited: 6
Digital Twin for Wireless Networks: Security Attacks and Solutions
Weizheng Wang, Yaoqi Yang, Latif U. Khan, et al.
IEEE Wireless Communications (2023) Vol. 31, Iss. 3, pp. 278-285
Closed Access | Times Cited: 4
Weizheng Wang, Yaoqi Yang, Latif U. Khan, et al.
IEEE Wireless Communications (2023) Vol. 31, Iss. 3, pp. 278-285
Closed Access | Times Cited: 4
Security Assessment Framework for DDOS Attack Detection via Deep Learning
J. Caroline Misbha, T. Ajith Bosco Raj, G. Wiselin Jiji
IETE Journal of Research (2024), pp. 1-14
Closed Access | Times Cited: 1
J. Caroline Misbha, T. Ajith Bosco Raj, G. Wiselin Jiji
IETE Journal of Research (2024), pp. 1-14
Closed Access | Times Cited: 1
An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2024)
Open Access | Times Cited: 1
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2024)
Open Access | Times Cited: 1