
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches
Shilan S. Hameed, Wan Haslina Hassan, Liza Abdul Latiff, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e414-e414
Open Access | Times Cited: 86
Shilan S. Hameed, Wan Haslina Hassan, Liza Abdul Latiff, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e414-e414
Open Access | Times Cited: 86
Showing 1-25 of 86 citing articles:
Internet of Medical Things Privacy and Security: Challenges, Solutions, and Future Trends from a New Perspective
Firuz Kamalov, Behrouz Pourghebleh, Mehdi Gheisari, et al.
Sustainability (2023) Vol. 15, Iss. 4, pp. 3317-3317
Open Access | Times Cited: 93
Firuz Kamalov, Behrouz Pourghebleh, Mehdi Gheisari, et al.
Sustainability (2023) Vol. 15, Iss. 4, pp. 3317-3317
Open Access | Times Cited: 93
Survey of Machine Learning based intrusion detection methods for Internet of Medical Things
Ayoub Si-Ahmed, Mohammed Ali Al-Garadi, Narhimène Boustia
Applied Soft Computing (2023) Vol. 140, pp. 110227-110227
Open Access | Times Cited: 74
Ayoub Si-Ahmed, Mohammed Ali Al-Garadi, Narhimène Boustia
Applied Soft Computing (2023) Vol. 140, pp. 110227-110227
Open Access | Times Cited: 74
Wireless Battery-free and Fully Implantable Organ Interfaces
A. K. Bhatia, Jessica Hanna, Tucker Stuart, et al.
Chemical Reviews (2024) Vol. 124, Iss. 5, pp. 2205-2280
Closed Access | Times Cited: 15
A. K. Bhatia, Jessica Hanna, Tucker Stuart, et al.
Chemical Reviews (2024) Vol. 124, Iss. 5, pp. 2205-2280
Closed Access | Times Cited: 15
Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems
Preeti Prasada, Srinivas Prasad
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 14
Preeti Prasada, Srinivas Prasad
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 14
A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1
Arezou Naghib, Farhad Soleimanian Gharehchopogh, Azadeh Zamanifar
Artificial Intelligence Review (2025) Vol. 58, Iss. 4
Open Access | Times Cited: 1
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis
Rachida Hireche, Houssem Mansouri, Al‐Sakib Khan Pathan
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 640-661
Open Access | Times Cited: 59
Rachida Hireche, Houssem Mansouri, Al‐Sakib Khan Pathan
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 3, pp. 640-661
Open Access | Times Cited: 59
A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects
Tanzeela Shakeel, Shaista Habib, Wadii Boulila, et al.
Complex & Intelligent Systems (2022) Vol. 9, Iss. 1, pp. 1027-1058
Open Access | Times Cited: 58
Tanzeela Shakeel, Shaista Habib, Wadii Boulila, et al.
Complex & Intelligent Systems (2022) Vol. 9, Iss. 1, pp. 1027-1058
Open Access | Times Cited: 58
Machine Learning and Deep Learning Methods for Intrusion Detection Systems in IoMT: A survey
Yahya Rbah, Mohammed Mahfoudi, Younes Balboul, et al.
2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2022)
Closed Access | Times Cited: 53
Yahya Rbah, Mohammed Mahfoudi, Younes Balboul, et al.
2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2022)
Closed Access | Times Cited: 53
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network
Adel Binbusayyis, Haya Alaskar, Thavavel Vaiyapuri, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 15, pp. 17403-17422
Open Access | Times Cited: 43
Adel Binbusayyis, Haya Alaskar, Thavavel Vaiyapuri, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 15, pp. 17403-17422
Open Access | Times Cited: 43
Swarm Intelligence in Internet of Medical Things: A Review
Roohallah Alizadehsani, Mohamad Roshanzamir, Navid Hoseini Izadi, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1466-1466
Open Access | Times Cited: 30
Roohallah Alizadehsani, Mohamad Roshanzamir, Navid Hoseini Izadi, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1466-1466
Open Access | Times Cited: 30
IoT Health Devices: Exploring Security Risks in the Connected Landscape
Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, et al.
IoT (2023) Vol. 4, Iss. 2, pp. 150-182
Open Access | Times Cited: 22
Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, et al.
IoT (2023) Vol. 4, Iss. 2, pp. 150-182
Open Access | Times Cited: 22
Edge AI for Internet of Medical Things: A literature review
Atslands R. da Rocha, Matheus Monteiro, César Mattos, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109202-109202
Closed Access | Times Cited: 12
Atslands R. da Rocha, Matheus Monteiro, César Mattos, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109202-109202
Closed Access | Times Cited: 12
A Comparative Study of Anomaly Detection Techniques for IoT Security Using Adaptive Machine Learning for IoT Threats
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 10
Dheyaaldin Alsalman
IEEE Access (2024) Vol. 12, pp. 14719-14730
Open Access | Times Cited: 10
Navigating the nexus of AI and IoT: A comprehensive review of data analytics and privacy paradigms
Agostino Marengo
Internet of Things (2024) Vol. 27, pp. 101318-101318
Open Access | Times Cited: 7
Agostino Marengo
Internet of Things (2024) Vol. 27, pp. 101318-101318
Open Access | Times Cited: 7
Internet of medical things and trending converged technologies: A comprehensive review on real-time applications
Shiraz Ali Wagan, Jahwan Koo, Isma Farah Siddiqui, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9228-9251
Open Access | Times Cited: 34
Shiraz Ali Wagan, Jahwan Koo, Isma Farah Siddiqui, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9228-9251
Open Access | Times Cited: 34
Towards Cognitive Authentication for Smart Healthcare Applications
Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad
Sensors (2022) Vol. 22, Iss. 6, pp. 2101-2101
Open Access | Times Cited: 29
Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad
Sensors (2022) Vol. 22, Iss. 6, pp. 2101-2101
Open Access | Times Cited: 29
An IoT-Based Smart System with an MQTT Broker for Individual Patient Vital Sign Monitoring in Potential Emergency or Prehospital Applications
Yung-Chung Tsao, Fu‐Jen Cheng, Yi-Hua Li, et al.
Emergency Medicine International (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 27
Yung-Chung Tsao, Fu‐Jen Cheng, Yi-Hua Li, et al.
Emergency Medicine International (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 27
Predicting medical device failure: a promise to reduce healthcare facilities cost through smart healthcare management
Noorul Husna Abd Rahman, Muhammad Hazim Mohamad Zaki, Khairunnisa Hasikin, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1279-e1279
Open Access | Times Cited: 15
Noorul Husna Abd Rahman, Muhammad Hazim Mohamad Zaki, Khairunnisa Hasikin, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1279-e1279
Open Access | Times Cited: 15
Innovative Applications of Large Language Models for Medical Record Access Audits
陳文意, 黃兆明
(2024)
Open Access | Times Cited: 5
陳文意, 黃兆明
(2024)
Open Access | Times Cited: 5
Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
Abubakar Wakili, Sara Bakkali
Clinical eHealth (2024) Vol. 7, pp. 92-105
Open Access | Times Cited: 5
Abubakar Wakili, Sara Bakkali
Clinical eHealth (2024) Vol. 7, pp. 92-105
Open Access | Times Cited: 5
Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access
Merve Pınar, A. Aktas, Eyüp Emre Ülkü
Computers in Biology and Medicine (2025) Vol. 186, pp. 109603-109603
Closed Access
Strengthening Security in the Internet of Medical Things: Fgsm-Driven Adversarial Training for Hybrid Lr-Bilstm Intrusion Detection Systems
Sukumarn Sankeawthong, Yuqing Zhang, Xudong Cao
(2025)
Closed Access
Sukumarn Sankeawthong, Yuqing Zhang, Xudong Cao
(2025)
Closed Access
Study of various AI based security model for threat analysis in communication and IoT network
Shrikant S. Goje, Sanjay M. Asutkar, G. M. Asutkar
AIP conference proceedings (2025) Vol. 3255, pp. 020015-020015
Closed Access
Shrikant S. Goje, Sanjay M. Asutkar, G. M. Asutkar
AIP conference proceedings (2025) Vol. 3255, pp. 020015-020015
Closed Access
Heartbeat Hackers
Manas Kumar Yogi, Atti MangaDevi, Yamuna Mundru
Advances in healthcare information systems and administration book series (2025), pp. 133-170
Closed Access
Manas Kumar Yogi, Atti MangaDevi, Yamuna Mundru
Advances in healthcare information systems and administration book series (2025), pp. 133-170
Closed Access
Challenges and Ethical Considerations in Technological Interventions in the Management of Tropical Diseases
Matthew Chidozie Ogwu, Sylvester Chibueze Izah
Health information science (2025), pp. 309-327
Closed Access
Matthew Chidozie Ogwu, Sylvester Chibueze Izah
Health information science (2025), pp. 309-327
Closed Access