
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33
Showing 26-50 of 33 citing articles:
Detecting Adversarial Attacks in IoT-Enabled Predictive Maintenance with Time-Series Data Augmentation
Flora Amato, Egidia Cirillo, Mattia Fonisto, et al.
Information (2024) Vol. 15, Iss. 11, pp. 740-740
Open Access | Times Cited: 1
Flora Amato, Egidia Cirillo, Mattia Fonisto, et al.
Information (2024) Vol. 15, Iss. 11, pp. 740-740
Open Access | Times Cited: 1
Graph Representation Federated Learning for Malware Detection in Internet of Health Things
Mohamed Amjath, Shagufta Henna
(2024)
Closed Access
Mohamed Amjath, Shagufta Henna
(2024)
Closed Access
A Hybrid LSTM-Autoencoder Based Approach for Network Anomaly Detection System in IoT Environments
Lyna Touileb, Kaouthar Zekri, Abbas Bradai, et al.
(2024), pp. 125-130
Closed Access
Lyna Touileb, Kaouthar Zekri, Abbas Bradai, et al.
(2024), pp. 125-130
Closed Access
Enhancing IOT Security: Leveraging Artificial Intelligence
E S Chithra, P H Arathi, P Pranitha, et al.
(2024), pp. 32-50
Closed Access
E S Chithra, P H Arathi, P Pranitha, et al.
(2024), pp. 32-50
Closed Access
Log Poisoning Attacks in IoT: Methodologies, Evasion, Detection, Mitigation, and Criticality Analysis
Haitham Ameen Noman, Osama M. F. Abu-Sharkh, Sinan Ameen Noman
IEEE Access (2024) Vol. 12, pp. 118295-118314
Open Access
Haitham Ameen Noman, Osama M. F. Abu-Sharkh, Sinan Ameen Noman
IEEE Access (2024) Vol. 12, pp. 118295-118314
Open Access
Smart Home Innovations – A Mini Review
Oluwasogo L. Ogundipe, Valentine U. Nwafor, Ayomide A. Ajuwon, et al.
(2024), pp. 1-6
Closed Access
Oluwasogo L. Ogundipe, Valentine U. Nwafor, Ayomide A. Ajuwon, et al.
(2024), pp. 1-6
Closed Access
Healthcare System and Infra-Security
Dilli Prasad Sharma, Arash Habibi Lashkari, Mona Parizadeh
Progress in IS (2024), pp. 97-120
Closed Access
Dilli Prasad Sharma, Arash Habibi Lashkari, Mona Parizadeh
Progress in IS (2024), pp. 97-120
Closed Access
Distributed Ledger-Based Authentication and Authorization of IoT Devices in Federated Environments
Michał Jarosz, Konrad Wrona, Zbigniew Zieliński
Electronics (2024) Vol. 13, Iss. 19, pp. 3932-3932
Open Access
Michał Jarosz, Konrad Wrona, Zbigniew Zieliński
Electronics (2024) Vol. 13, Iss. 19, pp. 3932-3932
Open Access
The Role of Data Science in Enhancing Web Security
Ahmad Sanmorino
JEECS (Journal of Electrical Engineering and Computer Sciences) (2024) Vol. 9, Iss. 2, pp. 119-116
Open Access
Ahmad Sanmorino
JEECS (Journal of Electrical Engineering and Computer Sciences) (2024) Vol. 9, Iss. 2, pp. 119-116
Open Access
To Enhance Cyber Security for IoT
Anubha Gauba, Ravneet Preet Singh Bedi
Advances in information security, privacy, and ethics book series (2024), pp. 271-308
Closed Access
Anubha Gauba, Ravneet Preet Singh Bedi
Advances in information security, privacy, and ethics book series (2024), pp. 271-308
Closed Access