OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead
Vítor Pedreira, Daniel Barros, Pedro Pinto
Sensors (2021) Vol. 21, Iss. 15, pp. 5189-5189
Open Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

On Predictive Maintenance in Industry 4.0: Overview, Models, and Challenges
Mounia Achouch, Mariya Dimitrova, Khaled Ziane, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8081-8081
Open Access | Times Cited: 216

An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT)
Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, et al.
Electronics (2022) Vol. 11, Iss. 5, pp. 742-742
Open Access | Times Cited: 45

Beyond control over data: Conceptualizing data sovereignty from a social contract perspective
Antragama Ewa Abbas, Thomas van Velzen, Hosea Ofe, et al.
Electronic Markets (2024) Vol. 34, Iss. 1
Open Access | Times Cited: 16

Systematic Analysis of Risks in Industry 5.0 Architecture
Muhammad Ali Hassan, Shehnila Zardari, Muhammad Umer Farooq, et al.
Applied Sciences (2024) Vol. 14, Iss. 4, pp. 1466-1466
Open Access | Times Cited: 14

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities
Arun Kumar Sangaiah, Amir Javadpour, Forough Ja’fari, et al.
Microprocessors and Microsystems (2022) Vol. 90, pp. 104504-104504
Closed Access | Times Cited: 26

IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25

Cutting-Edge AI Approaches with MAS for PdM in Industry 4.0: Challenges and Future Directions
Shadia Yahya Baroud
Journal of Applied Data Sciences (2024) Vol. 5, Iss. 2, pp. 455-473
Open Access | Times Cited: 6

A Secure Network Model Against Bot Attacks in Edge-Enabled Industrial Internet of Things
Vasileios A. Memos, Kostas E. Psannis, Zhihan Lv
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 7998-8006
Closed Access | Times Cited: 21

Implementing Data Sovereignty: Requirements & Challenges from Practice
Malte Hellmeier, Julia Pampus, Haydar Qarawlus, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-9
Open Access | Times Cited: 13

Web Application Firewall Using Machine Learning and Features Engineering
Aref Shaheed, Mohamad-Bassam Kurdy
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 18

Sovereignty by design and human values in agriculture data spaces
Rosa Gil, Mark Ryan, Roberto Garcı́a
Agriculture and Human Values (2025)
Open Access

Security and Privacy for Internet of Things: Challenges and Solutions
Akshay Kumar, Gaurav Kumar, Edidiong, et al.
(2025) Vol. 6, Iss. 1, pp. 12-22
Closed Access

The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems
Johannes Lohmöller, Jan Pennekamp, Roman Matzutt, et al.
Data & Knowledge Engineering (2024) Vol. 151, pp. 102301-102301
Open Access | Times Cited: 3

Research collaboration data platform ensuring general data protection
Monica Toma, Caroline Bönisch, Benjamin Löhnhardt, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2

Current landscape of hospital information systems in gynecology and obstetrics in Germany: a survey of the commission Digital Medicine of the German Society for Gynecology and Obstetrics
André Pfob, Sebastian Griewing, Katharina Seitz, et al.
Archives of Gynecology and Obstetrics (2023) Vol. 308, Iss. 6, pp. 1823-1830
Open Access | Times Cited: 4

A Hardware Security-Monitoring Architecture Based on Data Integrity and Control Flow Integrity for Embedded Systems
Qiang Hao, Zhun Zhang, Dongdong Xu, et al.
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7750-7750
Open Access | Times Cited: 7

A robust malware traffic classifier to combat security breaches in industry 4.0 applications
Mangayarkarasi Ramaiah, C. Vanmathi, Vinayakumar Ravi
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 3

CYBERSECURITY ANALYSIS OF WEB-ORIENTED INDUSTRIAL IOT-SYSTEMS
Eugene Merzlikin, Eugene Babeshko
Innovative technologies and scientific solutions for industries (2023), Iss. 2 (24), pp. 131-144
Open Access | Times Cited: 2

Intrusion Detection System for AI Box Based on Machine Learning
Jiann-Liang Chen, Zheng-Zhun Chen, Youg-Sheng Chang, et al.
2022 24th International Conference on Advanced Communication Technology (ICACT) (2023) Vol. 45, pp. 111-116
Closed Access | Times Cited: 1

Deep Learning for Attack Detection in Industrial IoT Edge Devices
Suraj Yatish, Viji Vinod, Soumitra Subodh Pande, et al.
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2023), pp. 539-544
Closed Access | Times Cited: 1

Cybersecurity in Industry 4.0 and Internet of Things: Challenges and Opportunities
Henrique Teixeira, Cláudia Ascenção, João Gonçalves, et al.
Springer proceedings in earth and environmental sciences (2024), pp. 69-83
Closed Access

A Model for Detection of Malwares on Edge Devices
C .B. Nwagwu, O. E. Taylor, Nuka Nwiabu
International Journal Of Engineering And Computer Science (2024) Vol. 13, Iss. 07, pp. 26274-26283
Open Access

Categorizing IoT Software Systems Security Vulnerabilities Through Literature Studies
Clinton Hudson Moreira Pessoa, Guilherme Horta Travassos
(2024), pp. 169-180
Closed Access

Enhanced Security and Privacy from Industry 4.0 and 5.0 Vision
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, et al.
(2024), pp. 133-158
Closed Access

Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption
Ingrid Huso, Giuseppe Piro, Gennaro Boggia
(2022), pp. 122-130
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top