
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Showing 26-50 of 54 citing articles:
A Novel Intelligent Network Forensics Enabled By AI/ML Algorithms and Time Series Analysis in Edge computing
D Preethi, Ratish Sharma, Vishnu Prasad Shrivastava
(2024), pp. 1-7
Closed Access | Times Cited: 1
D Preethi, Ratish Sharma, Vishnu Prasad Shrivastava
(2024), pp. 1-7
Closed Access | Times Cited: 1
Unveiling the Dynamic Landscape of Malware Sandboxing: A Comprehensive Review
Elhaam Abdulrahman Debas, Norah Alhumam, Khaled Riad
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 1
Elhaam Abdulrahman Debas, Norah Alhumam, Khaled Riad
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access | Times Cited: 1
Next-Generation Threat Detection and Mitigation in 6G Wireless Networks Using IAM, ZTNA and Advanced Security Mechanisms
S. Sankar Ganesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2078-2085
Open Access | Times Cited: 1
S. Sankar Ganesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2078-2085
Open Access | Times Cited: 1
Machine Learning-Based Anomaly Detection on Seawater Temperature Data with Oversampling
Hangoo Kang, Dongil Kim, Sungsu Lim
Journal of Marine Science and Engineering (2024) Vol. 12, Iss. 5, pp. 807-807
Open Access | Times Cited: 1
Hangoo Kang, Dongil Kim, Sungsu Lim
Journal of Marine Science and Engineering (2024) Vol. 12, Iss. 5, pp. 807-807
Open Access | Times Cited: 1
Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers
Laraib Sana, Mohsin Nazir, Jing Yang, et al.
IEEE Access (2024) Vol. 12, pp. 82443-82468
Open Access | Times Cited: 1
Laraib Sana, Mohsin Nazir, Jing Yang, et al.
IEEE Access (2024) Vol. 12, pp. 82443-82468
Open Access | Times Cited: 1
The Effectiveness of a Comprehensive threat Mitigation Framework in NETWORKING: A Multi-Layered Approach to Cyber Security
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Research Journal of Computer Science (2024) Vol. 11, Iss. 06, pp. 529-538
Open Access | Times Cited: 1
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Research Journal of Computer Science (2024) Vol. 11, Iss. 06, pp. 529-538
Open Access | Times Cited: 1
Neural networks in closed-loop systems: Verification using interval arithmetic and formal prover
Federico Rossi, Cinzia Bernardeschi, Marco Cococcioni
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109238-109238
Open Access | Times Cited: 1
Federico Rossi, Cinzia Bernardeschi, Marco Cococcioni
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109238-109238
Open Access | Times Cited: 1
Adversarial Attacks on Generative AI Anomaly Detection in the Quantum Era
A Jenefa, V. Ebenezer, A Joshua Isaac, et al.
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1833-1840
Closed Access | Times Cited: 3
A Jenefa, V. Ebenezer, A Joshua Isaac, et al.
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) (2023), pp. 1833-1840
Closed Access | Times Cited: 3
Training Neural Networks in Cyber-Physical Systems using Design Space Exploration and Co-Simulation
Cinzia Bernardeschi, Marco Cococcioni, Maurizio Palmieri, et al.
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2023), pp. 1-6
Closed Access | Times Cited: 2
Cinzia Bernardeschi, Marco Cococcioni, Maurizio Palmieri, et al.
2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE) (2023), pp. 1-6
Closed Access | Times Cited: 2
Improved Intrusion Detection System using Machine Learning Techniques
Deepak Singh, R. Uma Mageswari, Shanmugasundaram Hariharan
(2024), pp. 828-832
Closed Access
Deepak Singh, R. Uma Mageswari, Shanmugasundaram Hariharan
(2024), pp. 828-832
Closed Access
An Ensemble Framework for Network Anomaly Detection Using Isolation Forest and Autoencoders
G. Uma Maheswari, Alaparthi Vinith, A. Sathyanarayanan, et al.
(2024), pp. 1-6
Closed Access
G. Uma Maheswari, Alaparthi Vinith, A. Sathyanarayanan, et al.
(2024), pp. 1-6
Closed Access
Neural Networks in Closed-Loop Systems: Verification Using Interval Arithmetic and Formal Prover
Federico Rossi, Cinzia Bernardeschi, Marco Cococcioni
(2024)
Closed Access
Federico Rossi, Cinzia Bernardeschi, Marco Cococcioni
(2024)
Closed Access
Deep Learning-based Enhanced Security in Cyber- Physical Systems: A Multi-Attack Perspective
Sandeep Singh Bindra, Alankrita Aggarwal
(2024), pp. 347-352
Closed Access
Sandeep Singh Bindra, Alankrita Aggarwal
(2024), pp. 347-352
Closed Access
Edge Computing Enabled Anomaly Detection in IoT Environments Using Federated Learning
Vipashi Kansal, Saif O. Husain, Rakesh Kumar, et al.
(2024), pp. 1622-1627
Closed Access
Vipashi Kansal, Saif O. Husain, Rakesh Kumar, et al.
(2024), pp. 1622-1627
Closed Access
AI Enhanced Cyber Security Methods for Anomaly Detection
Abdul Subhahan Shaik, Amjan Shaik
Learning and analytics in intelligent systems (2024), pp. 348-359
Closed Access
Abdul Subhahan Shaik, Amjan Shaik
Learning and analytics in intelligent systems (2024), pp. 348-359
Closed Access
Real-time temperature anomaly detection in vaccine refrigeration systems using deep learning on a resource-constrained microcontroller
Mokhtar Harrabi, Abdelaziz Hamdi, Bouraoui Ouni, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access
Mokhtar Harrabi, Abdelaziz Hamdi, Bouraoui Ouni, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access
General process detection through side channel characterization
Michael A. Taylor, Aviraj Sinha, Eric C. Larson, et al.
Journal of Cyber Security Technology (2024), pp. 1-41
Closed Access
Michael A. Taylor, Aviraj Sinha, Eric C. Larson, et al.
Journal of Cyber Security Technology (2024), pp. 1-41
Closed Access
Optimizing Electric Vehicle Charging Infrastructure through Hybrid Machine Learning Techniques for Smart Energy Management
N. S. Usha, K. Sudharson, S. Gunasundari, et al.
International Journal of Electrical and Electronics Engineering (2024) Vol. 11, Iss. 7, pp. 148-158
Open Access
N. S. Usha, K. Sudharson, S. Gunasundari, et al.
International Journal of Electrical and Electronics Engineering (2024) Vol. 11, Iss. 7, pp. 148-158
Open Access
Unraveling trust management in cybersecurity: insights from a systematic literature review
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
APT Attack Detection Using Packet Flow and Optimized Ensemble Machine Learning with Low Time Complexity
Kalaivani Selvaraj, Manmeet Mahinderjit Singh
(2024), pp. 229-234
Closed Access
Kalaivani Selvaraj, Manmeet Mahinderjit Singh
(2024), pp. 229-234
Closed Access
Abnormal behavior detection in industrial control systems based on CNN
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
ENHANCED AI SECURITY WITH DWT WATERMARKING AND HYBRID ANOMALY DETECTION FRAMEWORK (HADF)
Swati Thakur, Mukta Bhatele, Akhilesh A. Waoo
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 5
Closed Access
Swati Thakur, Mukta Bhatele, Akhilesh A. Waoo
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 5
Closed Access
AI-Powered Threat Detection in Business Environments
Muhammad Tayyab, Khizar Hameed, Majid Mumtaz, et al.
Advances in web technologies and engineering book series (2024), pp. 379-436
Closed Access
Muhammad Tayyab, Khizar Hameed, Majid Mumtaz, et al.
Advances in web technologies and engineering book series (2024), pp. 379-436
Closed Access
Review of Authentication, Blockchain, Driver ID Systems, Economic Aspects, and Communication Technologies in DWC for EVs in Smart Cities Applications
R. Narayanamoorthi, Pradeep Vishnuram, A. Dominic Savio, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3121-3164
Open Access
R. Narayanamoorthi, Pradeep Vishnuram, A. Dominic Savio, et al.
Smart Cities (2024) Vol. 7, Iss. 6, pp. 3121-3164
Open Access
Anomaly detection for Aviation Cyber-Physical System: Opportunities and Challenges
Qurrat Ul Ain, Atif Aftab Ahmed Jilani, Nigar Azhar Butt, et al.
IEEE Access (2024) Vol. 12, pp. 175905-175925
Open Access
Qurrat Ul Ain, Atif Aftab Ahmed Jilani, Nigar Azhar Butt, et al.
IEEE Access (2024) Vol. 12, pp. 175905-175925
Open Access