
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Cloud-Based Method for Detecting Intrusions in PROFINET Communication Networks Based on Anomaly Detection
Afonso Celso Turcato, Luisa Helena Bartocci Liboni Negri, André Luís Dias, et al.
Journal of Control Automation and Electrical Systems (2021) Vol. 32, Iss. 5, pp. 1177-1188
Closed Access | Times Cited: 8
Afonso Celso Turcato, Luisa Helena Bartocci Liboni Negri, André Luís Dias, et al.
Journal of Control Automation and Electrical Systems (2021) Vol. 32, Iss. 5, pp. 1177-1188
Closed Access | Times Cited: 8
Showing 8 citing articles:
Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing
Sahaya Stalin Jose. G, G. Sugitha, Ayshwarya Lakshmi S, et al.
Computers & Security (2024) Vol. 140, pp. 103773-103773
Closed Access | Times Cited: 2
Sahaya Stalin Jose. G, G. Sugitha, Ayshwarya Lakshmi S, et al.
Computers & Security (2024) Vol. 140, pp. 103773-103773
Closed Access | Times Cited: 2
Developing and Evaluating the Context-Aware Performance of Synchronization Control in the Real-Time Network Protocol for the Connected Vehicle
Thanh Phương Nguyễn, Hung T. Nguyen, Ha Quang Thinh Ngo
Mobile Networks and Applications (2023)
Closed Access | Times Cited: 6
Thanh Phương Nguyễn, Hung T. Nguyen, Ha Quang Thinh Ngo
Mobile Networks and Applications (2023)
Closed Access | Times Cited: 6
Anomaly Detection with Convolutional Autoencoder for Predictive Maintenance
Ruiqi Tian, Luisa Helena Bartocci Liboni, Miriam A. M. Capretz
(2022), pp. 241-245
Closed Access | Times Cited: 3
Ruiqi Tian, Luisa Helena Bartocci Liboni, Miriam A. M. Capretz
(2022), pp. 241-245
Closed Access | Times Cited: 3
Digital Twin Concept and its Applications: A Review
Tao Ji, Norzalilah Mohamad Nor
Journal of Engineering Science and Technology Review (2024) Vol. 17, Iss. 2, pp. 203-214
Open Access
Tao Ji, Norzalilah Mohamad Nor
Journal of Engineering Science and Technology Review (2024) Vol. 17, Iss. 2, pp. 203-214
Open Access
General Evaluation of EtherCAT-Based Techniques in Various Industrial Systems: Review and Applications
The Tri Bui, Jin‐Ho Shin, Ha Quang Thinh Ngo
(2024), pp. 126-138
Closed Access
The Tri Bui, Jin‐Ho Shin, Ha Quang Thinh Ngo
(2024), pp. 126-138
Closed Access
A Dynamic Event-Triggered Secure Monitoring and Control for a Class of Discrete-Time Markovian Jump Systems: A Plug-and-Play Architecture
Yi Gao, Yunji Li, Ziyan Hua, et al.
Information (2024) Vol. 15, Iss. 10, pp. 649-649
Open Access
Yi Gao, Yunji Li, Ziyan Hua, et al.
Information (2024) Vol. 15, Iss. 10, pp. 649-649
Open Access
Optimal Trained Deep Maxout Model for Intrusion Detection in Cloud
Meble Varghese, M. Victor Jose
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (2022), pp. 1220-1227
Closed Access
Meble Varghese, M. Victor Jose
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (2022), pp. 1220-1227
Closed Access
Design of Electric Vehicle Charging Station Based on PROFINET Bus Technology Considering Safety Issues
Yang Han, Wenyu Wang, Bin Song
2021 International Conference on Power System Technology (POWERCON) (2021), pp. 814-819
Closed Access
Yang Han, Wenyu Wang, Bin Song
2021 International Conference on Power System Technology (POWERCON) (2021), pp. 814-819
Closed Access