OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

A Comprehensive Study on Additive Manufacturing Techniques, Machine Learning Integration, and Internet of Things-Driven Sustainability Opportunities
Santosh Kumar, Rakesh Kumar
Journal of Materials Engineering and Performance (2025)
Closed Access | Times Cited: 3

Enhancing Internet of Things security using performance gradient boosting for network intrusion detection systems
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access | Times Cited: 2

Enhancing Data Security and Privacy in Energy Applications: Integrating IoT and Blockchain Technologies
Hari Mohan, Kaustubh Kumar Shukla, Lilia Tightiz, et al.
Heliyon (2024) Vol. 10, Iss. 19, pp. e38917-e38917
Open Access | Times Cited: 10

A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control
Chung‐Yen Wu, Kuo‐Hsuan Huang, Chih‐Yao Hsu
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3890-3890
Open Access | Times Cited: 1

Deep-Learning and Blockchain-Empowered Secure Data Sharing for Smart Grid Infrastructure
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16155-16168
Closed Access | Times Cited: 4

Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access

Factors affecting the adoption of RFID in the food supply chain: a systematic literature review
Fundiswa Masekwana, Osden Jokonya
Frontiers in Sustainable Food Systems (2025) Vol. 8
Open Access

IoT security best practices
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 277-298
Closed Access

LWSEE: Lightweight Secured Software-Based Execution Environment
José Cecílio, Alan Oliveira de Sá, Georg Jäger, et al.
Internet of Things (2025), pp. 101513-101513
Open Access

Go-X: Gain Ratio and Optuna Driven Optimization for Extreme Gradient Boosting (Xgboost) in Malware Detection
Randi Rizal, Haris Fikri Fadilah, Siti Rahayu Selamat, et al.
(2025)
Closed Access

Smearing Machine Learning and Deep Learning in E-Commerce Transactions for Monetary Justice
Bhupinder Singh, Anjali Raghav, Saquib Ahmed, et al.
Advances in computational intelligence and robotics book series (2025), pp. 303-320
Closed Access

Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts
Dominic Too, Louise Axon, Ioannis Agrafiotis, et al.
Computers & Security (2025), pp. 104433-104433
Closed Access

Performance Evaluation of Machine Learning Algorithms for IoT-Based Intrusion Detection
Siddhant Sheshrao Bharade, Sanskar Sahebrao Ghongade, Amol Ramji Paratkar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 274-281
Open Access

Energy Consumption Analysis of ISO/IEC 29192-2 Standard Lightweight Ciphers
Bora Aslan
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3928-3928
Open Access

The Spatio-Temporal Data-Centric Detection in Geographic-Homogeneous Unmanned Cluster
X. H. Fu, Yadong Yin, Weijie Zhu, et al.
Lecture notes in electrical engineering (2025), pp. 538-550
Closed Access

AIoT-Enabled Smart Homes Solution to Security, Comfort, and Energy Efficiency
Anubha Anubha, Daviender Narang, Ankit Raj
Advances in computational intelligence and robotics book series (2025), pp. 239-268
Closed Access

Integrating AI With Blockchains for Securing Cloud-Based IoT Networks
Mohamadi Begum Y., Anurag Nishad, Harshavardhan Vilas Kurtkoti
Advances in computational intelligence and robotics book series (2025), pp. 103-134
Closed Access

Cyberattacks and defenses for Autonomous Navigation Systems: A systematic literature review
Jorrit Olthuis, Savio Sciancalepore, Nicola Zannone
Computer Networks (2025), pp. 111331-111331
Open Access

Ethical Dilemmas in Oil & Gas Procurement: A Systematic Literature Review
Rand Derar Alathamneh, Joao Garrott Marques Negreiros
Open Journal of Business and Management (2025) Vol. 13, Iss. 03, pp. 1724-1742
Open Access

Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning
Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, et al.
Digital Threats Research and Practice (2025)
Open Access

An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2024)
Open Access | Times Cited: 3

IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
Umang Garg, Santosh Kumar, Aniket Mahanti
Future Internet (2024) Vol. 16, Iss. 6, pp. 212-212
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top