
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Abdullah Alnajim, Shabana Habib, Muhammad Islam, et al.
Technologies (2023) Vol. 11, Iss. 6, pp. 161-161
Open Access | Times Cited: 15
Showing 15 citing articles:
Secured IIoT against trust deficit - A flexi cryptic approach
V. M. Padmapriya, K. Thenmozhi, M. Hemalatha, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 19
V. M. Padmapriya, K. Thenmozhi, M. Hemalatha, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 19
Intelligent Machine Learning Solutions for Cybersecurity
Bhupinder Singh, Christian Kaunert
Advances in computational intelligence and robotics book series (2024), pp. 359-386
Closed Access | Times Cited: 11
Bhupinder Singh, Christian Kaunert
Advances in computational intelligence and robotics book series (2024), pp. 359-386
Closed Access | Times Cited: 11
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 8
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 8
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Balancing Innovation and Integrity by Ethical Considerations in the Assimilation of AI Within Democratic Processes
Bhupinder Singh, Kittisak Jermsittiparsert, Anjali Raghav
IGI Global eBooks (2025), pp. 187-202
Closed Access
Bhupinder Singh, Kittisak Jermsittiparsert, Anjali Raghav
IGI Global eBooks (2025), pp. 187-202
Closed Access
Appreciating Machine Learning Intelligence Combating Cyber Threats
Bhupinder Singh
IGI Global eBooks (2025), pp. 259-284
Closed Access
Bhupinder Singh
IGI Global eBooks (2025), pp. 259-284
Closed Access
Exploring the Landscape of IoT Ransomware Prediction Through Machine Learning Techniques: A Comprehensive Survey
Ines Gharbi, Mohamed Belaoued, Abdelouahid Derhab, et al.
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Ines Gharbi, Mohamed Belaoued, Abdelouahid Derhab, et al.
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks
Jehad Ali, Sushil Kumar Singh, Weiwei Jiang, et al.
Computer Communications (2024) Vol. 229, pp. 108000-108000
Closed Access | Times Cited: 3
Jehad Ali, Sushil Kumar Singh, Weiwei Jiang, et al.
Computer Communications (2024) Vol. 229, pp. 108000-108000
Closed Access | Times Cited: 3
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
Hamza Alkofahi, Heba Alawneh, Anthony Skjellum
Computers & Security (2024) Vol. 140, pp. 103810-103810
Closed Access | Times Cited: 2
Hamza Alkofahi, Heba Alawneh, Anthony Skjellum
Computers & Security (2024) Vol. 140, pp. 103810-103810
Closed Access | Times Cited: 2
Lightweight Crypto-Ransomware Detection in Android Based on Reactive Honeyfile Monitoring
José-Antonio Gómez-Hernández, Pedro Garcı́a-Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
José-Antonio Gómez-Hernández, Pedro Garcı́a-Teodoro
Sensors (2024) Vol. 24, Iss. 9, pp. 2679-2679
Open Access | Times Cited: 1
Muscles of Deep Learning (DL) and Internet of Things (IoT) in Cyber Crimes Investigation
Bhupinder Singh, Christian Kaunert, Rishabha Malviya
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 399-420
Closed Access
Bhupinder Singh, Christian Kaunert, Rishabha Malviya
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 399-420
Closed Access
Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and Prospects
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Ricardo Emmanuel Reyes-Acosta, Carlos-Alberto Domínguez-Báez, Ricardo Mendoza-González, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Supply Chain Challenges in Wartime: LLC “Raben Ukraine” Key Study
Antoniia Bieliatynska, Kristina Čižiūnienė, Іryna Кlymenko, et al.
Studies in systems, decision and control (2024), pp. 433-483
Closed Access
Antoniia Bieliatynska, Kristina Čižiūnienė, Іryna Кlymenko, et al.
Studies in systems, decision and control (2024), pp. 433-483
Closed Access
Cyber attack detection in IOT-WSN devices with threat intelligence using hidden and connected layer based architectures
S. Nandhini, A. Rajeswari, N. R. Shanker
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
S. Nandhini, A. Rajeswari, N. R. Shanker
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access