
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Security and Privacy Concerns in the Internet of Things (IoT)
Muhammad Aqeel, Fahad Ali, Muhammad Waseem Iqbal, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 41
Muhammad Aqeel, Fahad Ali, Muhammad Waseem Iqbal, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES
Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 606-615
Open Access | Times Cited: 52
Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 606-615
Open Access | Times Cited: 52
DIGITAL MARKETING IN THE AGE OF IOT: A REVIEW OF TRENDS AND IMPACTS
Gold Nmesoma Okorie, Chioma Ann Udeh, Ejuma Martha Adaga, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 1, pp. 104-131
Open Access | Times Cited: 21
Gold Nmesoma Okorie, Chioma Ann Udeh, Ejuma Martha Adaga, et al.
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 1, pp. 104-131
Open Access | Times Cited: 21
Intelligent Machine Learning Solutions for Cybersecurity
Bhupinder Singh, Christian Kaunert
Advances in computational intelligence and robotics book series (2024), pp. 359-386
Closed Access | Times Cited: 11
Bhupinder Singh, Christian Kaunert
Advances in computational intelligence and robotics book series (2024), pp. 359-386
Closed Access | Times Cited: 11
A forensic framework to improve digital image evidence administration in IIoT✰
Deepti Rani, Nasib Singh Gill, Preeti Gulia
Journal of Industrial Information Integration (2024) Vol. 38, pp. 100568-100568
Closed Access | Times Cited: 4
Deepti Rani, Nasib Singh Gill, Preeti Gulia
Journal of Industrial Information Integration (2024) Vol. 38, pp. 100568-100568
Closed Access | Times Cited: 4
Appreciating Machine Learning Intelligence Combating Cyber Threats
Bhupinder Singh
IGI Global eBooks (2025), pp. 259-284
Closed Access
Bhupinder Singh
IGI Global eBooks (2025), pp. 259-284
Closed Access
Exploring the Societal, Ethical, and Privacy Consequences of IoT Technology’s Ubiquitous Integration into Everyday Life
Palaniandi Mahalingam, S. Mahalakshmi, Samrat Roy Choudry
Lecture notes in networks and systems (2025), pp. 1-13
Closed Access
Palaniandi Mahalingam, S. Mahalakshmi, Samrat Roy Choudry
Lecture notes in networks and systems (2025), pp. 1-13
Closed Access
Security risk assessment in IoT environments: A taxonomy and survey
Mofareh Waqdan, Habib Louafi, Malek Mouhoub
Computers & Security (2025), pp. 104456-104456
Open Access
Mofareh Waqdan, Habib Louafi, Malek Mouhoub
Computers & Security (2025), pp. 104456-104456
Open Access
Relishing Machine Learning Intelligence Combating Cyber Threats
Bhupinder Singh, Christian Kaunert, Saurabh Chandra
IGI Global eBooks (2025), pp. 129-150
Closed Access
Bhupinder Singh, Christian Kaunert, Saurabh Chandra
IGI Global eBooks (2025), pp. 129-150
Closed Access
A Survey on Edge Computing (EC) Security Challenges: Classification, Threats, and Mitigation Strategies
Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, et al.
Future Internet (2025) Vol. 17, Iss. 4, pp. 175-175
Open Access
Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, et al.
Future Internet (2025) Vol. 17, Iss. 4, pp. 175-175
Open Access
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 3
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 3
Comprehensive Examination of Version Number Attacks in IoT Networks: Nodes Hyperactivity as Specific Criterion
Hichem Sid Ahmed Belkhira, Mohammed Belkheir, Mehdi Rouissat, et al.
Open Information Science (2024) Vol. 8, Iss. 1
Open Access | Times Cited: 2
Hichem Sid Ahmed Belkhira, Mohammed Belkheir, Mehdi Rouissat, et al.
Open Information Science (2024) Vol. 8, Iss. 1
Open Access | Times Cited: 2
Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster
Ionut-Catalin Donca, Ovidiu Stan, Marius Misaroş, et al.
Electronics (2024) Vol. 13, Iss. 9, pp. 1613-1613
Open Access | Times Cited: 2
Ionut-Catalin Donca, Ovidiu Stan, Marius Misaroş, et al.
Electronics (2024) Vol. 13, Iss. 9, pp. 1613-1613
Open Access | Times Cited: 2
Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury, et al.
MethodsX (2024) Vol. 12, pp. 102747-102747
Open Access | Times Cited: 2
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury, et al.
MethodsX (2024) Vol. 12, pp. 102747-102747
Open Access | Times Cited: 2
Security Issues on the European Continent in Conditions of Russia’s Aggression Against Ukraine
Віталій Коцур, Тетяна Купрій, Inna Semenets-Orlova, et al.
Revista de Gestão Social e Ambiental (2023) Vol. 17, Iss. 6, pp. e03578-e03578
Open Access | Times Cited: 6
Віталій Коцур, Тетяна Купрій, Inna Semenets-Orlova, et al.
Revista de Gestão Social e Ambiental (2023) Vol. 17, Iss. 6, pp. e03578-e03578
Open Access | Times Cited: 6
A Comprehensive Survey on Internet of Things Security: Challenges and Solutions
Nilima Karankar, Anita Seth
Lecture notes on data engineering and communications technologies (2023), pp. 711-728
Closed Access | Times Cited: 4
Nilima Karankar, Anita Seth
Lecture notes on data engineering and communications technologies (2023), pp. 711-728
Closed Access | Times Cited: 4
Security, Privacy, Trust, and Other Issues in Industries 4.0
Ambeshwar Kumar, R. Manikandan, M. Manjula, et al.
(2024), pp. 223-237
Closed Access | Times Cited: 1
Ambeshwar Kumar, R. Manikandan, M. Manjula, et al.
(2024), pp. 223-237
Closed Access | Times Cited: 1
A Survey of Blockchain Integration with IoT: Benefits, Challenges and Future Directions
Yassine Maadallah, Nassira KASSIMI, Younès El Bouzekri El Idrissi, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 565-582
Open Access | Times Cited: 1
Yassine Maadallah, Nassira KASSIMI, Younès El Bouzekri El Idrissi, et al.
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 565-582
Open Access | Times Cited: 1
Towards Inclusive Societies: Leveraging IoT for Community Development and Education
Sudip Shuklabaidya
Novel Insights. (2024) Vol. 1, Iss. 1, pp. 40-51
Open Access | Times Cited: 1
Sudip Shuklabaidya
Novel Insights. (2024) Vol. 1, Iss. 1, pp. 40-51
Open Access | Times Cited: 1
Machine learning solutions for mobile internet of things security: A literature review and research agenda
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 10
Closed Access | Times Cited: 1
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 10
Closed Access | Times Cited: 1
IoT Security, Future Challenges, and Open Issues
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, et al.
Advances in logistics, operations, and management science book series (2023), pp. 116-140
Closed Access | Times Cited: 3
Survey on Wireless Information Energy Transfer (WIET) and related applications in 6G Internet of NanoThings (IoNT)
Pragati Sharma, Rahul Jashvantbhai Pandya, Sridhar Iyer, et al.
DELETED (2023) Vol. 89, Iss. 4, pp. 777-801
Open Access | Times Cited: 2
Pragati Sharma, Rahul Jashvantbhai Pandya, Sridhar Iyer, et al.
DELETED (2023) Vol. 89, Iss. 4, pp. 777-801
Open Access | Times Cited: 2
Privacy and security issues in smart grids: A survey
Ogweno Jeremiah Okeyo
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 182-202
Open Access | Times Cited: 2
Ogweno Jeremiah Okeyo
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 182-202
Open Access | Times Cited: 2
An efficient cloud-integrated distributed deep neural network framework for IoT malware classification
Mohammad Mosleh, Saeed Sharifian
Future Generation Computer Systems (2024) Vol. 157, pp. 603-617
Closed Access
Mohammad Mosleh, Saeed Sharifian
Future Generation Computer Systems (2024) Vol. 157, pp. 603-617
Closed Access
5G Network Implementation
Sharma Ji, Abhishek Mishra
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 62-88
Closed Access
Sharma Ji, Abhishek Mishra
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 62-88
Closed Access
Local differential privacy for data security in key value pair data
Vipin Vijayachandran, R Suchithra
Journal of Computational Methods in Sciences and Engineering (2024) Vol. 24, Iss. 3, pp. 1955-1970
Closed Access
Vipin Vijayachandran, R Suchithra
Journal of Computational Methods in Sciences and Engineering (2024) Vol. 24, Iss. 3, pp. 1955-1970
Closed Access