OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions
Azmera Chandu Naik, Lalit Kumar Awasthi, Priyanka Rathee, et al.
Computer Networks (2025), pp. 111045-111045
Closed Access | Times Cited: 1

Design Particularities of Quadrature Chaos Shift Keying Communication System with Enhanced Noise Immunity for IoT Applications
Darja Cirjulina, Ruslans Babajans, Deniss Kolosovs
Entropy (2025) Vol. 27, Iss. 3, pp. 296-296
Open Access | Times Cited: 1

A Lightweight and Federated Machine Learning Based Intrusion Detection System for Multi Attack Detection in IoT Networks
P.K Mani, D Arthi, K. Periyakaruppan, et al.
Journal of Machine and Computing (2025), pp. 421-429
Closed Access

A novel real-time quality control system for 3D printing: A deep learning approach using data efficient image transformers
Manveer Singh, P. C. Sharma, Satish Kumar Sharma, et al.
Expert Systems with Applications (2025), pp. 126863-126863
Closed Access

A diversity-aware incentive mechanism for cross-silo federated learning with budget constraint
Xiaohong Wu, Yujun Lin, Zhongsheng Hua, et al.
Knowledge-Based Systems (2025), pp. 113212-113212
Closed Access

RPFL: A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection
Mohammed Yahya Asiri, Maher Khemakhem, Reemah Alhebshi, et al.
Electronics (2025) Vol. 14, Iss. 6, pp. 1089-1089
Open Access

Comprehensive Study of IoT Vulnerabilities and Countermeasures
Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3036-3036
Open Access

Transformer-based knowledge distillation for explainable intrusion detection system
Nadiah AL-Nomasy, Abdulelah Alamri, Ahamed Aljuhani, et al.
Computers & Security (2025), pp. 104417-104417
Open Access

Ensuring Trustworthy and Secure IoT: Fundamentals, Threats, Solutions, and Future Hotspots
Ming‐Feng Huang, Qing-Lin Peng, Xiaoyu Zhu, et al.
Computer Networks (2025), pp. 111218-111218
Closed Access

Cyber Security Risk Analysis of IoT Ecosystem
Manish Kumar Srivastava, Ujjaval Patel
(2025), pp. 1-6
Closed Access

A Decentralised Multi-Authority Attribute-Based Encryption for Secure and Scalable IoT Access Control
Chung‐Yen Wu, Kuo‐Hsuan Huang, Chih‐Yao Hsu
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3890-3890
Open Access

Resource-Constrained Specific Emitter Identification Based on Efficient Design and Network Compression
M. G. Wang, Shengliang Fang, Youchen Fan, et al.
Sensors (2025) Vol. 25, Iss. 7, pp. 2293-2293
Open Access

Jointly Achieving Smart Homes Security and Privacy through Bidirectional Trust
Osman Abul, Melike Burakgazi Bilgen
EURASIP Journal on Information Security (2025) Vol. 2025, Iss. 1
Open Access

Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3

Enhancing IoT Healthcare with Federated Learning and Variational Autoencoder
Dost Muhammad Saqib Bhatti, Bong Jun Choi
Sensors (2024) Vol. 24, Iss. 11, pp. 3632-3632
Open Access | Times Cited: 3

Blockchain Technology for IoT Security and Trust: A Comprehensive SLR
Seetah Almarri, Ahmed Aljughaiman
Sustainability (2024) Vol. 16, Iss. 23, pp. 10177-10177
Open Access | Times Cited: 2

Security Challenges in Internet of Things
Purva Joshi, Seema Joshi
Advances in information security, privacy, and ethics book series (2024), pp. 355-392
Closed Access | Times Cited: 2

Enhancing IoT Security With Trust Management Using Ensemble XGBoost and AdaBoost Techniques
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
IEEE Access (2024) Vol. 12, pp. 116609-116621
Open Access | Times Cited: 1

Federated Deep Learning Models for Intrusion Detection in IoT
El Mahfoud Ennaji, Salah El Hajla, Yassine Maleh, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

A Conceptual Blockchain-Based Framework for Secure Industrial IoT Remote Monitoring: Proof of Concept
Mohammad Reza Ghaderi, Ali Eghbali Ghahyazi
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1

Maximizing VANETs Secrecy Data Rate Using Dueling Double Deep Q-Networks
Huibin Xu, Long Fang, Huanhuan Lv, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 74, Iss. 1, pp. 1267-1279
Closed Access

Applying Pattern Language to Enhance IIoT System Design and Integration: From Theory to Practice
Hasanain Hazim Azeez, Mohammadreza Sharbaf, Bahman Zamani, et al.
Information (2024) Vol. 15, Iss. 10, pp. 595-595
Open Access

Ghost-Weight protocol: a highly efficient blockchain consensus for IoT
Zhen Xiao, Youliang Tian, Changgen Peng, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

Conceptual Framework for Designing Hippocratic APIs
Sarmad Rezayat, Gerrit Burmester, Hui Ma, et al.
Lecture notes in computer science (2024), pp. 355-376
Closed Access

Page 1 - Next Page

Scroll to top