
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 132, pp. 107150-107150
Open Access | Times Cited: 48
Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 132, pp. 107150-107150
Open Access | Times Cited: 48
Showing 26-50 of 48 citing articles:
A comprehensive survey on deep learning‐based intrusion detection systems in Internet of Things (IoT )
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
Qasem Abu Al‐Haija, Ayat Droos
Expert Systems (2024)
Closed Access | Times Cited: 1
Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 11
Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 11
Security assessment and impact analysis of cyberattacks in integrated T&D power systems
Ioannis Zografopoulos, Charalambos Konstantinou, Nektarios Georgios Tsoutsos, et al.
(2021), pp. 1-7
Open Access | Times Cited: 10
Ioannis Zografopoulos, Charalambos Konstantinou, Nektarios Georgios Tsoutsos, et al.
(2021), pp. 1-7
Open Access | Times Cited: 10
A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
Pablo Pessoa do Nascimento, Paulo Pereira, Jr Marco Mialaret, et al.
Computers & Security (2021) Vol. 110, pp. 102434-102434
Closed Access | Times Cited: 7
Pablo Pessoa do Nascimento, Paulo Pereira, Jr Marco Mialaret, et al.
Computers & Security (2021) Vol. 110, pp. 102434-102434
Closed Access | Times Cited: 7
Exploring Ransomware Attacks on Smart Inverters
Bohyun Ahn, Alycia Jenkins, Taesic Kim, et al.
2022 IEEE Energy Conversion Congress and Exposition (ECCE) (2023), pp. 1567-1573
Closed Access | Times Cited: 2
Bohyun Ahn, Alycia Jenkins, Taesic Kim, et al.
2022 IEEE Energy Conversion Congress and Exposition (ECCE) (2023), pp. 1567-1573
Closed Access | Times Cited: 2
Hardware Performance Counters: Ready-Made vs Tailor-Made
Abraham Peedikayil Kuruvila, Anushree Mahapatra, Ramesh Karri, et al.
ACM Transactions on Embedded Computing Systems (2021) Vol. 20, Iss. 5s, pp. 1-26
Closed Access | Times Cited: 5
Abraham Peedikayil Kuruvila, Anushree Mahapatra, Ramesh Karri, et al.
ACM Transactions on Embedded Computing Systems (2021) Vol. 20, Iss. 5s, pp. 1-26
Closed Access | Times Cited: 5
Design Hands-on Lab Exercises for Cyber-physical Systems Security Education
Hongmei Chi, Jinwei Liu, Weifeng Xu, et al.
Journal of The Colloquium for Information Systems Security Education (2022) Vol. 9, Iss. 1, pp. 8-8
Open Access | Times Cited: 3
Hongmei Chi, Jinwei Liu, Weifeng Xu, et al.
Journal of The Colloquium for Information Systems Security Education (2022) Vol. 9, Iss. 1, pp. 8-8
Open Access | Times Cited: 3
Firmware Vulnerability Detection Algorithm Based on Matching Pattern-Specific Numerical Features With Structural Features
Peng Liu, Yinhai Cao, Yujun Yan, et al.
IEEE Access (2024) Vol. 12, pp. 42317-42328
Open Access
Peng Liu, Yinhai Cao, Yujun Yan, et al.
IEEE Access (2024) Vol. 12, pp. 42317-42328
Open Access
Hardware-based Detection of Malicious Firmware Modification in Microgrids
Amisha Srivastava, Sneha Thakur, Abraham Peedikayil Kuruvila, et al.
(2024), pp. 186-191
Closed Access
Amisha Srivastava, Sneha Thakur, Abraham Peedikayil Kuruvila, et al.
(2024), pp. 186-191
Closed Access
Cyber–physical event reasoning for distributed energy resources
Nils Müller, Kaibin Bao, Kai Heussen
Sustainable Energy Grids and Networks (2024) Vol. 39, pp. 101400-101400
Open Access
Nils Müller, Kaibin Bao, Kai Heussen
Sustainable Energy Grids and Networks (2024) Vol. 39, pp. 101400-101400
Open Access
Modeling Agent Behavior in Interacting Microgrids
Igor Bychkov, Alexander Feoktistov, Mikhail Chekan
(2024), pp. 1-5
Closed Access
Igor Bychkov, Alexander Feoktistov, Mikhail Chekan
(2024), pp. 1-5
Closed Access
Machine Learning Models for Detecting Software Vulnerabilities
Imdad Ali Shah, N. Z. Jhanjhi, Sarfraz Nawaz Brohi
Advances in web technologies and engineering book series (2024), pp. 1-40
Closed Access
Imdad Ali Shah, N. Z. Jhanjhi, Sarfraz Nawaz Brohi
Advances in web technologies and engineering book series (2024), pp. 1-40
Closed Access
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
Seyed Mohammad Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
International Journal of Critical Infrastructure Protection (2024), pp. 100729-100729
Closed Access
Seyed Mohammad Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
International Journal of Critical Infrastructure Protection (2024), pp. 100729-100729
Closed Access
Stealthy Rootkit Attacks on Cyber-Physical Microgrids
Suman Rath, Ioannis Zografopoulos, Charalambos Konstantinou
(2021), pp. 294-295
Closed Access | Times Cited: 4
Suman Rath, Ioannis Zografopoulos, Charalambos Konstantinou
(2021), pp. 294-295
Closed Access | Times Cited: 4
Toward accurate and intelligent detection of malware
Asad Arfeen, Zunair Ahmed Khan, Riaz Uddin, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 4
Closed Access | Times Cited: 4
Asad Arfeen, Zunair Ahmed Khan, Riaz Uddin, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 4
Closed Access | Times Cited: 4
Ransomware Security Threat Modeling for Photovoltaic Systems
Su Ying, Bohyun Ahn, Syed Raqueed Bin Alvee, et al.
2019 4th IEEE Workshop on the Electronic Grid (eGRID) (2021), pp. 01-05
Open Access | Times Cited: 4
Su Ying, Bohyun Ahn, Syed Raqueed Bin Alvee, et al.
2019 4th IEEE Workshop on the Electronic Grid (eGRID) (2021), pp. 01-05
Open Access | Times Cited: 4
Quantum Convolutional Neural Network-based Online Malware File Detection for Smart Grid Devices
Alve Rahman Akash, Bohyun Ahn, Alycia Jenkins, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
Alve Rahman Akash, Bohyun Ahn, Alycia Jenkins, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
Holistic Performance Benchmarking in Power Systems with Distributed Control under Disruptive Cyberattacks
Payam Ramezani Badr, Behnaz Papari, Austin Robison, et al.
(2022), pp. 640-646
Closed Access | Times Cited: 2
Payam Ramezani Badr, Behnaz Papari, Austin Robison, et al.
(2022), pp. 640-646
Closed Access | Times Cited: 2
The Energy 4.0 Concept and Its Relationship with the S3 Framework
Pedro Ponce, Omar Mata, Sergio Castellanos, et al.
Lecture notes in computer science (2022), pp. 215-227
Closed Access | Times Cited: 2
Pedro Ponce, Omar Mata, Sergio Castellanos, et al.
Lecture notes in computer science (2022), pp. 215-227
Closed Access | Times Cited: 2
Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations
Ioannis Zografopoulos, Nikos Hatziargyriou, Charalambos Konstantinou
arXiv (Cornell University) (2022)
Open Access | Times Cited: 1
Ioannis Zografopoulos, Nikos Hatziargyriou, Charalambos Konstantinou
arXiv (Cornell University) (2022)
Open Access | Times Cited: 1
Cyber-Physical Event Reasoning for Distributed Energy Resources on the Case of a Pv-Battery System
Nils Müller, Kaibin Bao, Kai Heussen
(2023)
Closed Access
Nils Müller, Kaibin Bao, Kai Heussen
(2023)
Closed Access
Differential Duffing Oscillator-Based Cyberattack Detection for Inverters
Zimin Jiang, Peng Zhang, Yifan Zhou
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 1, pp. 1192-1195
Closed Access
Zimin Jiang, Peng Zhang, Yifan Zhou
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 1, pp. 1192-1195
Closed Access