
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
A Comprehensive Study on Additive Manufacturing Techniques, Machine Learning Integration, and Internet of Things-Driven Sustainability Opportunities
Santosh Kumar, Rakesh Kumar
Journal of Materials Engineering and Performance (2025)
Closed Access | Times Cited: 3
Santosh Kumar, Rakesh Kumar
Journal of Materials Engineering and Performance (2025)
Closed Access | Times Cited: 3
Enhancing Internet of Things security using performance gradient boosting for network intrusion detection systems
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access | Times Cited: 2
Muhammad Ahmed, Yasser AbdelSatar, Raed Alotaibi, et al.
Alexandria Engineering Journal (2025) Vol. 116, pp. 472-482
Closed Access | Times Cited: 2
Enhancing Data Security and Privacy in Energy Applications: Integrating IoT and Blockchain Technologies
Hari Mohan, Kaustubh Kumar Shukla, Lilia Tightiz, et al.
Heliyon (2024) Vol. 10, Iss. 19, pp. e38917-e38917
Open Access | Times Cited: 10
Hari Mohan, Kaustubh Kumar Shukla, Lilia Tightiz, et al.
Heliyon (2024) Vol. 10, Iss. 19, pp. e38917-e38917
Open Access | Times Cited: 10
A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control
Chung‐Yen Wu, Kuo‐Hsuan Huang, Chih‐Yao Hsu
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3890-3890
Open Access | Times Cited: 1
Chung‐Yen Wu, Kuo‐Hsuan Huang, Chih‐Yao Hsu
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3890-3890
Open Access | Times Cited: 1
Deep-Learning and Blockchain-Empowered Secure Data Sharing for Smart Grid Infrastructure
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16155-16168
Closed Access | Times Cited: 4
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 12, pp. 16155-16168
Closed Access | Times Cited: 4
Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Eman Karkawi Kareem, Mehdi Ebady Manaa
Communications in computer and information science (2025), pp. 186-200
Closed Access
Factors affecting the adoption of RFID in the food supply chain: a systematic literature review
Fundiswa Masekwana, Osden Jokonya
Frontiers in Sustainable Food Systems (2025) Vol. 8
Open Access
Fundiswa Masekwana, Osden Jokonya
Frontiers in Sustainable Food Systems (2025) Vol. 8
Open Access
IoT security best practices
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 277-298
Closed Access
Yacine Atif, Sujith Samuel Mathew
Elsevier eBooks (2025), pp. 277-298
Closed Access
LWSEE: Lightweight Secured Software-Based Execution Environment
José Cecílio, Alan Oliveira de Sá, Georg Jäger, et al.
Internet of Things (2025), pp. 101513-101513
Open Access
José Cecílio, Alan Oliveira de Sá, Georg Jäger, et al.
Internet of Things (2025), pp. 101513-101513
Open Access
Securing the 6G–IoT Environment: A Framework for Enhancing Transparency in Artificial Intelligence Decision-Making Through Explainable Artificial Intelligence
Navneet Kaur, Lav Gupta
Sensors (2025) Vol. 25, Iss. 3, pp. 854-854
Open Access
Navneet Kaur, Lav Gupta
Sensors (2025) Vol. 25, Iss. 3, pp. 854-854
Open Access
Go-X: Gain Ratio and Optuna Driven Optimization for Extreme Gradient Boosting (Xgboost) in Malware Detection
Randi Rizal, Haris Fikri Fadilah, Siti Rahayu Selamat, et al.
(2025)
Closed Access
Randi Rizal, Haris Fikri Fadilah, Siti Rahayu Selamat, et al.
(2025)
Closed Access
Smearing Machine Learning and Deep Learning in E-Commerce Transactions for Monetary Justice
Bhupinder Singh, Anjali Raghav, Saquib Ahmed, et al.
Advances in computational intelligence and robotics book series (2025), pp. 303-320
Closed Access
Bhupinder Singh, Anjali Raghav, Saquib Ahmed, et al.
Advances in computational intelligence and robotics book series (2025), pp. 303-320
Closed Access
Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts
Dominic Too, Louise Axon, Ioannis Agrafiotis, et al.
Computers & Security (2025), pp. 104433-104433
Closed Access
Dominic Too, Louise Axon, Ioannis Agrafiotis, et al.
Computers & Security (2025), pp. 104433-104433
Closed Access
Performance Evaluation of Machine Learning Algorithms for IoT-Based Intrusion Detection
Siddhant Sheshrao Bharade, Sanskar Sahebrao Ghongade, Amol Ramji Paratkar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 274-281
Open Access
Siddhant Sheshrao Bharade, Sanskar Sahebrao Ghongade, Amol Ramji Paratkar, et al.
International Journal of Advanced Research in Science Communication and Technology (2025), pp. 274-281
Open Access
A Lightweight Intrusion Detection System for Internet of Things: Clustering and Monte Carlo Cross-Entropy Approach
Abdulmohsen Almalawi
Sensors (2025) Vol. 25, Iss. 7, pp. 2235-2235
Open Access
Abdulmohsen Almalawi
Sensors (2025) Vol. 25, Iss. 7, pp. 2235-2235
Open Access
Energy Consumption Analysis of ISO/IEC 29192-2 Standard Lightweight Ciphers
Bora Aslan
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3928-3928
Open Access
Bora Aslan
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3928-3928
Open Access
The Spatio-Temporal Data-Centric Detection in Geographic-Homogeneous Unmanned Cluster
X. H. Fu, Yadong Yin, Weijie Zhu, et al.
Lecture notes in electrical engineering (2025), pp. 538-550
Closed Access
X. H. Fu, Yadong Yin, Weijie Zhu, et al.
Lecture notes in electrical engineering (2025), pp. 538-550
Closed Access
"Watch My Health, Not My Data": Understanding Perceptions, Barriers, Emotional Impact, & Coping Strategies Pertaining to IoT Privacy and Security in Health Monitoring for Older Adults
Suleiman Saka, Sanchari Das
(2025), pp. 1-18
Closed Access
Suleiman Saka, Sanchari Das
(2025), pp. 1-18
Closed Access
AIoT-Enabled Smart Homes Solution to Security, Comfort, and Energy Efficiency
Anubha Anubha, Daviender Narang, Ankit Raj
Advances in computational intelligence and robotics book series (2025), pp. 239-268
Closed Access
Anubha Anubha, Daviender Narang, Ankit Raj
Advances in computational intelligence and robotics book series (2025), pp. 239-268
Closed Access
Integrating AI With Blockchains for Securing Cloud-Based IoT Networks
Mohamadi Begum Y., Anurag Nishad, Harshavardhan Vilas Kurtkoti
Advances in computational intelligence and robotics book series (2025), pp. 103-134
Closed Access
Mohamadi Begum Y., Anurag Nishad, Harshavardhan Vilas Kurtkoti
Advances in computational intelligence and robotics book series (2025), pp. 103-134
Closed Access
Cyberattacks and defenses for Autonomous Navigation Systems: A systematic literature review
Jorrit Olthuis, Savio Sciancalepore, Nicola Zannone
Computer Networks (2025), pp. 111331-111331
Open Access
Jorrit Olthuis, Savio Sciancalepore, Nicola Zannone
Computer Networks (2025), pp. 111331-111331
Open Access
Ethical Dilemmas in Oil & Gas Procurement: A Systematic Literature Review
Rand Derar Alathamneh, Joao Garrott Marques Negreiros
Open Journal of Business and Management (2025) Vol. 13, Iss. 03, pp. 1724-1742
Open Access
Rand Derar Alathamneh, Joao Garrott Marques Negreiros
Open Journal of Business and Management (2025) Vol. 13, Iss. 03, pp. 1724-1742
Open Access
Advanced Persistent Threats (APT) Attribution Using Deep Reinforcement Learning
Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, et al.
Digital Threats Research and Practice (2025)
Open Access
Animesh Singh Basnet, Mohamed Chahine Ghanem, Dipo Dunsin, et al.
Digital Threats Research and Practice (2025)
Open Access
An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2024)
Open Access | Times Cited: 3
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2024)
Open Access | Times Cited: 3
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
Umang Garg, Santosh Kumar, Aniket Mahanti
Future Internet (2024) Vol. 16, Iss. 6, pp. 212-212
Open Access | Times Cited: 2
Umang Garg, Santosh Kumar, Aniket Mahanti
Future Internet (2024) Vol. 16, Iss. 6, pp. 212-212
Open Access | Times Cited: 2