OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A network attack path prediction method using attack graph
Xuguang Liu
Journal of Ambient Intelligence and Humanized Computing (2020)
Closed Access | Times Cited: 21

Showing 21 citing articles:

A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Omar Almazrouei, Pritheega Magalingam, Mohammad Kamrul Hasan, et al.
IEEE Access (2023) Vol. 11, pp. 44350-44376
Open Access | Times Cited: 16

Comparative Analysis of Machine Learning Methods in Vulnerability Categories Prediction Based on Configuration Similarity
Dmitry Levshun
Studies in computational intelligence (2024), pp. 70-81
Closed Access | Times Cited: 1

CL-AP2: A composite learning approach to attack prediction via attack portraying
Yingze Liu, Yuanbo Guo
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103963-103963
Closed Access | Times Cited: 1

Vulnerability Categorization for Fast Multistep Attack Modelling
Dmitry Levshun, Andrey Chechulin
(2023), pp. 169-175
Closed Access | Times Cited: 2

Network Attack Path Selection and Evaluation Based on Q-Learning
Runze Wu, Jinxin Gong, Weiyue Tong, et al.
Applied Sciences (2020) Vol. 11, Iss. 1, pp. 285-285
Open Access | Times Cited: 6

A Review of CPS Design and Vulnerability Analysis
Andrea Vilán, Peter Walker
Journal of Computing and Natural Science (2022), pp. 110-119
Open Access | Times Cited: 3

Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
Shenjian Qiu, Zhipeng Shao, Jian Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6189-6189
Open Access

Research on Software Isomerization Technology Based on Diversified Compilation
He Chuan, Bo Zhang, Zesheng Xi, et al.
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 1445-1450
Closed Access

PWAGAT: Potential Web attacker detection based on graph attention network
Yijia Xu, Yong Fang, Zhonglin Liu, et al.
Neurocomputing (2023) Vol. 557, pp. 126725-126725
Closed Access | Times Cited: 1

Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness
Md Ariful Haque, Sachin Shetty, Charles Kamhoua, et al.
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 464-469
Closed Access | Times Cited: 2

A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems
Zibo Wang, Yaofang Zhang, Zhiyao Liu, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 1

Attribute attack graph generation method based on attack stage
ShuChen Teng, Bin Wu
2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT) (2021), pp. 286-291
Closed Access | Times Cited: 1

Comparative Analysis of Machine Learning Methods in Vulnerability Metrics Transformation
Dmitry Levshun
Lecture notes in networks and systems (2023), pp. 60-70
Closed Access

An intelligent method for building attack paths based on Bayesian attack graphs
Yanfang Fu, Cheng Wang, Fang Wang, et al.
(2022), pp. 20-20
Closed Access

Attack Graphs for Standalone Non-Public 5G Networks
Arpit Tripathi, Abhishek Thakur, Bheemarjuna Reddy Tamma
(2022), pp. 158-163
Open Access

A Markov Game Model for AI-based Cyber Security Attack Mitigation.
Hooman Alavizadeh, Julian Jang‐Jaccard, Tansu Alpcan, et al.
arXiv (Cornell University) (2021)
Closed Access

An Attack Path Prediction Method based on The Attack-Defense Game Theory in CBTC
Naiyue Chen, Hongwei Wang, Lingshuai Meng, et al.
2021 China Automation Congress (CAC) (2021), pp. 1824-1829
Closed Access

Protecting Resources Against Volumetric and Non-volumetric Network Attacks
Rajorshi Biswas, Jie Wu
(2021), pp. 387-395
Closed Access

Page 1

Scroll to top