OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses
Akm Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 60

Showing 1-25 of 60 citing articles:

A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Harun Oz, Ahmet Arış, Albert Lévi, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-37
Open Access | Times Cited: 174

Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey
Arup Barua, Md Abdullah Al Alamin, Md. Shohrab Hossain, et al.
IEEE Open Journal of the Communications Society (2022) Vol. 3, pp. 251-281
Open Access | Times Cited: 82

G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2020), pp. 376-385
Open Access | Times Cited: 108

A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100

A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches
Shilan S. Hameed, Wan Haslina Hassan, Liza Abdul Latiff, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e414-e414
Open Access | Times Cited: 86

Man-in-the-Middle Attack Mitigation in Internet of Medical Things
Osman Salem, Khalid Alsubhi, Aymen Shaafi, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 3, pp. 2053-2062
Closed Access | Times Cited: 70

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 63

A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare
Antonio López Martínez, Manuel Gil Pérez, Antonio Ruiz‐Martínez
ACM Computing Surveys (2022) Vol. 55, Iss. 12, pp. 1-38
Open Access | Times Cited: 52

A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions
Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 386-424
Open Access | Times Cited: 45

A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection
L. Dhanya, R. Chitra
Expert Systems with Applications (2023) Vol. 237, pp. 121618-121618
Closed Access | Times Cited: 25

Dynamic Behavioural Analysis of Privacy-Breaching and Data Theft Ransomware
Mehmet Ozturk, Ayse Demir, Zeynep Arslan, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 11

Innovations in AI and ML for Medical Imaging
Aparna Pandey, Arvind Tiwari, Harsha Nishad, et al.
(2025), pp. 127-155
Closed Access | Times Cited: 1

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68

Adversarial Machine Learning: A Multilayer Review of the State-of-the-Art and Challenges for Wireless and Mobile Systems
Jinxin Liu, Michele Nogueira, Johan Fernandes, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 24, Iss. 1, pp. 123-159
Closed Access | Times Cited: 53

Compliance and Regulatory Challenges in Cloud Computing: A Sector-Wise Analysis
Dhruv Seth, Madhavi Najana, Piyush Ranjan
(2024)
Open Access | Times Cited: 5

Real-time Analysis of Privacy-(un)aware IoT Applications
Leonardo Babun, Z. Berkay Celik, Patrick McDaniel, et al.
Proceedings on Privacy Enhancing Technologies (2020) Vol. 2021, Iss. 1, pp. 145-166
Open Access | Times Cited: 40

Fog Computing Security Concerns in Healthcare Using IoT and Blockchain
Ruchi Mittal, Shikha Gupta, Shefali Arora
(2025), pp. 231-252
Closed Access

A survey on security issues in modern Implantable Devices: Solutions and future issues
Emmanuel Kwarteng, Mumin Cebe
Smart Health (2022) Vol. 25, pp. 100295-100295
Open Access | Times Cited: 20

Novel Detection of Hospital Malware Using Network Pattern Analysis
郝品量, Jancy Ling Liu, Wang Lian
(2024)
Open Access | Times Cited: 2

Big Picture on Privacy Enhancing Technologies in e-Health: A Holistic Personal Privacy Workflow
Stefan Becher, Armin Gerl, Bianca Meier, et al.
Information (2020) Vol. 11, Iss. 7, pp. 356-356
Open Access | Times Cited: 17

Medicolite-Machine Learning-Based Patient Care Model
Rijwan Khan, Akhilesh Kumar Srivastava, Mahima Gupta, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 9

The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, et al.
(2022)
Open Access | Times Cited: 9

Test-Driven Requirements Engineering
Christof Ebert, Ruschil Ray
IEEE Software (2020) Vol. 38, Iss. 1, pp. 16-24
Closed Access | Times Cited: 14

Page 1 - Next Page

Scroll to top