
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Side channel attacks on smart home systems: A short overview
Mohammad Ali Nassiri Abrishamchi, Abdul Hanan Abdullah, Adrian David Cheok, et al.
IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society (2017) Vol. 93, pp. 8144-8149
Open Access | Times Cited: 29
Mohammad Ali Nassiri Abrishamchi, Abdul Hanan Abdullah, Adrian David Cheok, et al.
IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society (2017) Vol. 93, pp. 8144-8149
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
IoT in Smart Cities: A Survey of Technologies, Practices and Challenges
Abbas Shah Syed, Daniel Sierra-Sosa, Anup Kumar, et al.
Smart Cities (2021) Vol. 4, Iss. 2, pp. 429-475
Open Access | Times Cited: 358
Abbas Shah Syed, Daniel Sierra-Sosa, Anup Kumar, et al.
Smart Cities (2021) Vol. 4, Iss. 2, pp. 429-475
Open Access | Times Cited: 358
Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 65
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 65
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 32
Zhibo Wang, Defang Liu, Yunan Sun, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2292-2328
Closed Access | Times Cited: 32
MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment
Dajiang Chen, Zihao Zhao, Xue Qin, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 18, Iss. 1, pp. 467-476
Closed Access | Times Cited: 37
Dajiang Chen, Zihao Zhao, Xue Qin, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 18, Iss. 1, pp. 467-476
Closed Access | Times Cited: 37
Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems
Jian Mao, Shishi Zhu, Xuan Dai, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 9, pp. 8025-8035
Closed Access | Times Cited: 34
Jian Mao, Shishi Zhu, Xuan Dai, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 9, pp. 8025-8035
Closed Access | Times Cited: 34
A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
Nandita Pattnaik, Shujun Li, Jason R. C. Nurse
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-38
Open Access | Times Cited: 17
Nandita Pattnaik, Shujun Li, Jason R. C. Nurse
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-38
Open Access | Times Cited: 17
Integrating Artificial Intelligence into Cybersecurity Curriculum: New Perspectives
AHMET ARIS, Luis Puche Rondon, Daniel Ortiz, et al.
(2024)
Open Access | Times Cited: 3
AHMET ARIS, Luis Puche Rondon, Daniel Ortiz, et al.
(2024)
Open Access | Times Cited: 3
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets
Asanka Sayakkara, Nhien‐An Le‐Khac
IEEE Access (2021) Vol. 9, pp. 113585-113598
Open Access | Times Cited: 15
Asanka Sayakkara, Nhien‐An Le‐Khac
IEEE Access (2021) Vol. 9, pp. 113585-113598
Open Access | Times Cited: 15
A survey on social-physical sensing: An emerging sensing paradigm that explores the collective intelligence of humans and machines
Md Tahmid Rashid, Na Wei, Dong Wang
Collective Intelligence (2023) Vol. 2, Iss. 2, pp. 263391372311708-263391372311708
Open Access | Times Cited: 5
Md Tahmid Rashid, Na Wei, Dong Wang
Collective Intelligence (2023) Vol. 2, Iss. 2, pp. 263391372311708-263391372311708
Open Access | Times Cited: 5
Survey on power analysis attacks and its impact on intelligent sensor networks
Shanthi Rekha Shanmugham, P. Saravanan
IET Wireless Sensor Systems (2018) Vol. 8, Iss. 6, pp. 295-304
Closed Access | Times Cited: 16
Shanthi Rekha Shanmugham, P. Saravanan
IET Wireless Sensor Systems (2018) Vol. 8, Iss. 6, pp. 295-304
Closed Access | Times Cited: 16
Moving Target Defense Mechanism for Side-Channel Attacks
Satyanarayana Vuppala, Alie El‐Din Mady, Adam Kuenzi
IEEE Systems Journal (2019) Vol. 14, Iss. 2, pp. 1810-1819
Closed Access | Times Cited: 14
Satyanarayana Vuppala, Alie El‐Din Mady, Adam Kuenzi
IEEE Systems Journal (2019) Vol. 14, Iss. 2, pp. 1810-1819
Closed Access | Times Cited: 14
PoisonIvy
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
(2020), pp. 130-139
Closed Access | Times Cited: 12
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
(2020), pp. 130-139
Closed Access | Times Cited: 12
Secure authentication scheme in 6G‐enabled mobile Internet of things for online English education
Jiming Yin, Jie Cui
IET Networks (2022) Vol. 11, Iss. 5, pp. 182-194
Open Access | Times Cited: 5
Jiming Yin, Jie Cui
IET Networks (2022) Vol. 11, Iss. 5, pp. 182-194
Open Access | Times Cited: 5
A Survey on Social-Physical Sensing.
Md Tahmid Rashid, Na Wei, Dong Wang
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 6
Md Tahmid Rashid, Na Wei, Dong Wang
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 6
SECURITY PROBLEMS IN SMART HOME SYSTEMS
Yurii Hasiuk, Andrianna Yovbak, Mykhaylo Melnyk, et al.
Computer Design Systems Theory and Practice (2023) Vol. 5, Iss. 1, pp. 71-81
Open Access | Times Cited: 2
Yurii Hasiuk, Andrianna Yovbak, Mykhaylo Melnyk, et al.
Computer Design Systems Theory and Practice (2023) Vol. 5, Iss. 1, pp. 71-81
Open Access | Times Cited: 2
Ivycide: Smart Intrusion Detection System Against E-IoT Driver Threats
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8533-8546
Closed Access | Times Cited: 4
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 8533-8546
Closed Access | Times Cited: 4
Privacy and Security of Smart Systems
K. Suresh Kumar, D. Prabakaran, R. Senthil Kumaran, et al.
(2022), pp. 291-315
Closed Access | Times Cited: 4
K. Suresh Kumar, D. Prabakaran, R. Senthil Kumaran, et al.
(2022), pp. 291-315
Closed Access | Times Cited: 4
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5
Emerging Technology IoT and OT: Overview, Security Threats, Attacks and Countermeasures
Aman Srivastava, Ankita Agarwal
International Journal of Engineering Research and (2021) Vol. 10, Iss. 7
Closed Access | Times Cited: 5
Aman Srivastava, Ankita Agarwal
International Journal of Engineering Research and (2021) Vol. 10, Iss. 7
Closed Access | Times Cited: 5
libOblivious: A C++ Library for Oblivious Data Structures and Algorithms
Scott Constable, Steve J. Chapin
(2018)
Closed Access | Times Cited: 4
Scott Constable, Steve J. Chapin
(2018)
Closed Access | Times Cited: 4
A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks
Khalid Alemerien, Sadeq Al-Suhemat, Fadi Mohammad Alsuhimat, et al.
2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (2024), pp. 505-510
Closed Access
Khalid Alemerien, Sadeq Al-Suhemat, Fadi Mohammad Alsuhimat, et al.
2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (2024), pp. 505-510
Closed Access
In-Home Surveillance Systems and Privacy Considerations for Malaysians: A Survey
Mohammad Ali Nassiri Abrishamchi, Adrian David Cheok, Abdul Hanan Abdullah, et al.
International Journal of Innovative Computing (2018) Vol. 8, Iss. 3
Closed Access | Times Cited: 1
Mohammad Ali Nassiri Abrishamchi, Adrian David Cheok, Abdul Hanan Abdullah, et al.
International Journal of Innovative Computing (2018) Vol. 8, Iss. 3
Closed Access | Times Cited: 1
Investigation of reliability and security of the 3D packaging structure
Chunsheng Zhu, Yingjian Yan, Pengfei Guo
(2020), pp. 1-4
Closed Access | Times Cited: 1
Chunsheng Zhu, Yingjian Yan, Pengfei Guo
(2020), pp. 1-4
Closed Access | Times Cited: 1
PoisonIvy: (In)secure Practices of Enterprise IoT Systems in Smart Buildings
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 1
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 1