OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 26-50 of 240 citing articles:

A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1975-2002
Open Access | Times Cited: 9

A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
Nathalie Tan Yhe Huan, Zuriati Ahmad Zukarnain
IEEE Access (2024) Vol. 12, pp. 69765-69782
Open Access | Times Cited: 9

TARRP: Trust Aware RPL Routing Protocol for IoT
Mostafa Nazarian Parizi, Seyyed Hamid Ghafouri, Mohammad Sadegh Hajmohammadi
International Journal of Communication Systems (2025) Vol. 38, Iss. 4
Closed Access | Times Cited: 1

A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories
Hannelore Sebestyen, Daniela Elena Popescu, Doina Zmaranda
Computers (2025) Vol. 14, Iss. 2, pp. 61-61
Open Access | Times Cited: 1

Hybrid CNN–BiLSTM–DNN Approach for Detecting Cybersecurity Threats in IoT Networks
Bright Agbor Agbor, Bliss Utibe-Abasi Stephen, Philip Asuquo, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 58-58
Open Access | Times Cited: 1

Anomaly-based cyberattacks detection for smart homes: A systematic literature review
Juan Ignacio Iturbe Araya, Helena Rifà-Pous
Internet of Things (2023) Vol. 22, pp. 100792-100792
Open Access | Times Cited: 22

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT
Mohammed S. Alshehri, Jawad Ahmad, Sultan Almakdi, et al.
IEEE Access (2024) Vol. 12, pp. 35521-35538
Open Access | Times Cited: 8

A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems
Mumin Adam, Mohammad Hammoudeh, Rana Alrawashdeh, et al.
IEEE Access (2024) Vol. 12, pp. 57128-57149
Open Access | Times Cited: 8

Deep Ensemble Learning With Pruning for DDoS Attack Detection in IoT Networks
Makhduma F. Saiyedand, Irfan Al‐Anbagi
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 596-616
Open Access | Times Cited: 7

Performance Evaluation of Deep Learning Models for Classifying Cybersecurity Attacks in IoT Networks
Fray L. Becerra-Suarez, Víctor A. Tuesta-Monteza, Heber I. Mejía-Cabrera, et al.
Informatics (2024) Vol. 11, Iss. 2, pp. 32-32
Open Access | Times Cited: 7

Experimental Study on Colpitts Chaotic Oscillator-Based Communication System Application for the Internet of Things
Darja Cirjulina, Ruslans Babajans, Filips Capligins, et al.
Applied Sciences (2024) Vol. 14, Iss. 3, pp. 1180-1180
Open Access | Times Cited: 6

A novel intrusion detection framework for optimizing IoT security
Abdul Qaddos, Muhammad Usman Yaseen, Ahmad Sami Al-Shamayleh, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6

A Survey on Cross-Architectural IoT Malware Threat Hunting
Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, et al.
IEEE Access (2021) Vol. 9, pp. 91686-91709
Open Access | Times Cited: 38

A Comparative Study of Chinese and Foreign Research on the Internet of Things in Education: Bibliometric Analysis and Visualization
Zhicheng Dai, Qianqian Zhang, Xiaoliang Zhu, et al.
IEEE Access (2021) Vol. 9, pp. 130127-130140
Open Access | Times Cited: 37

Efficient Classification of Enciphered SCADA Network Traffic in Smart Factory Using Decision Tree Algorithm
Love Allen Chijioke Ahakonye, Cosmas Ifeanyi Nwakanma, Jae‐Min Lee, et al.
IEEE Access (2021) Vol. 9, pp. 154892-154901
Open Access | Times Cited: 36

Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
Palak Bagga, Ashok Kumar Das, Vinay Chamola, et al.
Telecommunication Systems (2022) Vol. 81, Iss. 1, pp. 125-173
Open Access | Times Cited: 27

A novel zero-trust network access control scheme based on the security profile of devices and users
Pedro Garcı́a-Teodoro, José Camacho, Gabriel Macía-Fernández, et al.
Computer Networks (2022) Vol. 212, pp. 109068-109068
Open Access | Times Cited: 23

Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques
R. Gayathri, Shola Usharani, Miroslav Mahdal, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1708-1708
Open Access | Times Cited: 15

Iot traffic-based DDoS attacks detection mechanisms: A comprehensive review
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
The Journal of Supercomputing (2023) Vol. 80, Iss. 7, pp. 9986-10043
Closed Access | Times Cited: 15

A distributed SDN-based intrusion detection system for IoT using optimized forests
Ke Luo
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0290694-e0290694
Open Access | Times Cited: 14

A Review on IoT Intrusion Detection Systems Using Supervised Machine Learning: Techniques, Datasets, and Algorithms
Azeez Rahman Abdulla, Noor Ghazi M. Jameel
UHD Journal of Science and Technology (2023) Vol. 7, Iss. 1, pp. 53-65
Open Access | Times Cited: 13

Towards the Integration of Security Practices in Agile Software Development: A Systematic Mapping Review
Yolanda Valdés, Jorge Hochstetter, Jaime Díaz, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4578-4578
Open Access | Times Cited: 13

A Detailed Comparative Study of AI-Based Intrusion Detection System for Smart Cities
Muhammad Rakha, Abdullah Akbar, Gunjan Chhabra, et al.
(2024), pp. 1783-1790
Closed Access | Times Cited: 5

A comprehensive survey on secure software‐defined network for the Internet of Things
Monzir Babiker Mohamed, Olasunkanmi Matthew Alofe, Muhammad Ajmal Azad, et al.
Transactions on Emerging Telecommunications Technologies (2021) Vol. 33, Iss. 1
Open Access | Times Cited: 31

A deep and systematic review of the intrusion detection systems in the fog environment
Yi Lizhi, Mei Yin, Mehdi Darbandi
Transactions on Emerging Telecommunications Technologies (2022) Vol. 34, Iss. 1
Closed Access | Times Cited: 21

Scroll to top