
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
Showing 20 citing articles:
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2123-2137
Closed Access | Times Cited: 11
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2123-2137
Closed Access | Times Cited: 11
A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems
Shivani Gaba, Ishan Budhiraja, Vimal Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 6017-6035
Open Access | Times Cited: 10
Shivani Gaba, Ishan Budhiraja, Vimal Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 6017-6035
Open Access | Times Cited: 10
Safeguarding supply chains from cyber-physical system attacks frameworks and strategies
Motunrayo Oluremi Ibiyemi, David Olanrewaju Olutimehin
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 6, pp. 2015-2023
Open Access | Times Cited: 8
Motunrayo Oluremi Ibiyemi, David Olanrewaju Olutimehin
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 6, pp. 2015-2023
Open Access | Times Cited: 8
Cybersecurity maturity model: Systematic literature review and a proposed model
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access
Trust-Based Detection and Mitigation of Cyber Attacks in Distributed Cooperative Control of Islanded AC Microgrids
Md Abu Taher, Mohd Tariq, Arif I. Sarwat
Electronics (2024) Vol. 13, Iss. 18, pp. 3692-3692
Open Access | Times Cited: 3
Md Abu Taher, Mohd Tariq, Arif I. Sarwat
Electronics (2024) Vol. 13, Iss. 18, pp. 3692-3692
Open Access | Times Cited: 3
Addressing Cybersecurity Challenges in 5G-enabled IoT and Critical Infrastructures: A Comprehensive Overview
Haya Altaleb, Zoltán Rajnai
(2023), pp. 000131-000136
Closed Access | Times Cited: 6
Haya Altaleb, Zoltán Rajnai
(2023), pp. 000131-000136
Closed Access | Times Cited: 6
A Linear Probabilistic Resilience Model for Securing Critical Infrastructure in Industry 5.0
Khaled Ali Abuhasel
IEEE Access (2023) Vol. 11, pp. 80863-80873
Open Access | Times Cited: 4
Khaled Ali Abuhasel
IEEE Access (2023) Vol. 11, pp. 80863-80873
Open Access | Times Cited: 4
SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2675-2691
Closed Access | Times Cited: 1
S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2675-2691
Closed Access | Times Cited: 1
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Sensors (2023) Vol. 23, Iss. 12, pp. 5459-5459
Open Access | Times Cited: 3
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Sensors (2023) Vol. 23, Iss. 12, pp. 5459-5459
Open Access | Times Cited: 3
Development complexity of cyber-physical systems: theoretical and practical benefits from Pre-Integrated Architectures
Philippe Gougeon, Etienne Hamelin
Journal of Smart Environments and Green Computing (2023) Vol. 3, Iss. 1, pp. 3-17
Open Access | Times Cited: 2
Philippe Gougeon, Etienne Hamelin
Journal of Smart Environments and Green Computing (2023) Vol. 3, Iss. 1, pp. 3-17
Open Access | Times Cited: 2
Linear System Identification-Oriented Optimal Tampering Attack Strategy and Implementation Based on Information Entropy with Multiple Binary Observations
Zhongwei Bai, Peng Yu, Yan Liu, et al.
Algorithms (2024) Vol. 17, Iss. 6, pp. 239-239
Open Access
Zhongwei Bai, Peng Yu, Yan Liu, et al.
Algorithms (2024) Vol. 17, Iss. 6, pp. 239-239
Open Access
Efficient Vanilla Split Learning for Privacy-Preserving Collaboration in Resource-Constrained Cyber-Physical Systems
Nabila Azeri, Ouided Hioual, Ouassila Hioual
Informatica (2024) Vol. 48, Iss. 11
Open Access
Nabila Azeri, Ouided Hioual, Ouassila Hioual
Informatica (2024) Vol. 48, Iss. 11
Open Access
Review of Cyber-Physical System-Based Security Datasets for Learning-Based Intrusion Detection Systems
Zakir Ahmad Sheikh, Yashwant Singh
Lecture notes in electrical engineering (2024), pp. 291-305
Closed Access
Zakir Ahmad Sheikh, Yashwant Singh
Lecture notes in electrical engineering (2024), pp. 291-305
Closed Access
Secure adaptive fuzzy tracking control for a class of nonlinear systems under actuator and sensor faults and denial‐of‐service attacks based on event‐triggered mechanism
Hamidreza Baghi, Farzaneh Abdollahi, Heidar Ali Talebi
IET Control Theory and Applications (2024)
Open Access
Hamidreza Baghi, Farzaneh Abdollahi, Heidar Ali Talebi
IET Control Theory and Applications (2024)
Open Access
Optimal Tampering Attack Strategy for FIR System Identification With Multi‐Level Quantized Observations
Wenke Liu, Fengwei Jing, Yinghui Wang, et al.
International Journal of Robust and Nonlinear Control (2024)
Closed Access
Wenke Liu, Fengwei Jing, Yinghui Wang, et al.
International Journal of Robust and Nonlinear Control (2024)
Closed Access
Leveraging Machine Learning to Enhance Occupational Safety and Health in Hospital
Saydrine Conica, Nikova Browne, Robert Danyll
Safety and Health For Medical Workers (2024) Vol. 1, Iss. 2, pp. 78-94
Closed Access
Saydrine Conica, Nikova Browne, Robert Danyll
Safety and Health For Medical Workers (2024) Vol. 1, Iss. 2, pp. 78-94
Closed Access
Digital Twin-Based Security Orchestration, Automation and Response for IoT and CPS
Phu H. Nguyen, Ashish Rauniyar, Toni Valtteri Niemi
IFIP advances in information and communication technology (2024), pp. 243-260
Closed Access
Phu H. Nguyen, Ashish Rauniyar, Toni Valtteri Niemi
IFIP advances in information and communication technology (2024), pp. 243-260
Closed Access
Enhancing Access Control, Authorization, and Accountability in Cyber-Physical Systems Using Machine Learning
Isaac Adom, Muhammad Awais, Mohsin Raza, et al.
(2024), pp. 1-6
Closed Access
Isaac Adom, Muhammad Awais, Mohsin Raza, et al.
(2024), pp. 1-6
Closed Access
FeConDefense: Reversing adversarial attacks via feature consistency loss
Weijia Wang, Chao Zhou, Da Lin, et al.
Computer Communications (2023) Vol. 211, pp. 263-270
Closed Access | Times Cited: 1
Weijia Wang, Chao Zhou, Da Lin, et al.
Computer Communications (2023) Vol. 211, pp. 263-270
Closed Access | Times Cited: 1
A systematic literature review of mitigating cyber security risk
Syafila Kamarudin, Lian Tang, Jusang Bolong, et al.
Quality & Quantity (2023) Vol. 58, Iss. 4, pp. 3251-3273
Closed Access
Syafila Kamarudin, Lian Tang, Jusang Bolong, et al.
Quality & Quantity (2023) Vol. 58, Iss. 4, pp. 3251-3273
Closed Access