OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20

Showing 20 citing articles:

Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2123-2137
Closed Access | Times Cited: 11

A Systematic Analysis of Enhancing Cyber Security Using Deep Learning for Cyber Physical Systems
Shivani Gaba, Ishan Budhiraja, Vimal Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 6017-6035
Open Access | Times Cited: 10

Safeguarding supply chains from cyber-physical system attacks frameworks and strategies
Motunrayo Oluremi Ibiyemi, David Olanrewaju Olutimehin
International Journal of Management & Entrepreneurship Research (2024) Vol. 6, Iss. 6, pp. 2015-2023
Open Access | Times Cited: 8

Cybersecurity maturity model: Systematic literature review and a proposed model
Gülçin Büyüközkan, Merve Güler
Technological Forecasting and Social Change (2025) Vol. 213, pp. 123996-123996
Closed Access

Trust-Based Detection and Mitigation of Cyber Attacks in Distributed Cooperative Control of Islanded AC Microgrids
Md Abu Taher, Mohd Tariq, Arif I. Sarwat
Electronics (2024) Vol. 13, Iss. 18, pp. 3692-3692
Open Access | Times Cited: 3

Addressing Cybersecurity Challenges in 5G-enabled IoT and Critical Infrastructures: A Comprehensive Overview
Haya Altaleb, Zoltán Rajnai
(2023), pp. 000131-000136
Closed Access | Times Cited: 6

A Linear Probabilistic Resilience Model for Securing Critical Infrastructure in Industry 5.0
Khaled Ali Abuhasel
IEEE Access (2023) Vol. 11, pp. 80863-80873
Open Access | Times Cited: 4

SLAKA_CPS: Secured lightweight authentication and key agreement protocol for reliable communication among heterogenous devices in cyber-physical system framework
S. Ramya, Manivannan Doraipandian, Rengarajan Amirtharajan
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2675-2691
Closed Access | Times Cited: 1

Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS)
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Sensors (2023) Vol. 23, Iss. 12, pp. 5459-5459
Open Access | Times Cited: 3

Development complexity of cyber-physical systems: theoretical and practical benefits from Pre-Integrated Architectures
Philippe Gougeon, Etienne Hamelin
Journal of Smart Environments and Green Computing (2023) Vol. 3, Iss. 1, pp. 3-17
Open Access | Times Cited: 2

Review of Cyber-Physical System-Based Security Datasets for Learning-Based Intrusion Detection Systems
Zakir Ahmad Sheikh, Yashwant Singh
Lecture notes in electrical engineering (2024), pp. 291-305
Closed Access

Optimal Tampering Attack Strategy for FIR System Identification With Multi‐Level Quantized Observations
Wenke Liu, Fengwei Jing, Yinghui Wang, et al.
International Journal of Robust and Nonlinear Control (2024)
Closed Access

Leveraging Machine Learning to Enhance Occupational Safety and Health in Hospital
Saydrine Conica, Nikova Browne, Robert Danyll
Safety and Health For Medical Workers (2024) Vol. 1, Iss. 2, pp. 78-94
Closed Access

Digital Twin-Based Security Orchestration, Automation and Response for IoT and CPS
Phu H. Nguyen, Ashish Rauniyar, Toni Valtteri Niemi
IFIP advances in information and communication technology (2024), pp. 243-260
Closed Access

Enhancing Access Control, Authorization, and Accountability in Cyber-Physical Systems Using Machine Learning
Isaac Adom, Muhammad Awais, Mohsin Raza, et al.
(2024), pp. 1-6
Closed Access

FeConDefense: Reversing adversarial attacks via feature consistency loss
Weijia Wang, Chao Zhou, Da Lin, et al.
Computer Communications (2023) Vol. 211, pp. 263-270
Closed Access | Times Cited: 1

A systematic literature review of mitigating cyber security risk
Syafila Kamarudin, Lian Tang, Jusang Bolong, et al.
Quality & Quantity (2023) Vol. 58, Iss. 4, pp. 3251-3273
Closed Access

Page 1

Scroll to top