
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A hybrid behavior- and Bayesian network-based framework for cyber–physical anomaly detection
Luca Faramondi, Francesco Flammini, Simone Guarino, et al.
Computers & Electrical Engineering (2023) Vol. 112, pp. 108988-108988
Open Access | Times Cited: 10
Luca Faramondi, Francesco Flammini, Simone Guarino, et al.
Computers & Electrical Engineering (2023) Vol. 112, pp. 108988-108988
Open Access | Times Cited: 10
Showing 10 citing articles:
Multiple-Bayesian-Network-Based Risk Assessment Methodology for Industrial Control Systems
Simone Guarino, Silvia Ansaldi, Roberto Setola
IFIP advances in information and communication technology (2025), pp. 113-130
Closed Access
Simone Guarino, Silvia Ansaldi, Roberto Setola
IFIP advances in information and communication technology (2025), pp. 113-130
Closed Access
MP-GUARD: A novel multi-pronged intrusion detection and mitigation framework for scalable SD-IoT networks using cooperative monitoring, ensemble learning, and new P4-extracted feature set
Ameer El-Sayed, Wael Said, Amr Tolba, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109484-109484
Closed Access | Times Cited: 4
Ameer El-Sayed, Wael Said, Amr Tolba, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109484-109484
Closed Access | Times Cited: 4
Uncertain Analytic Hierarchy Process for Risk Assessment in Cyber-Physical Systems
Martina Nobili, Simone Guarino, Luca Faramondi, et al.
Lecture notes in computer science (2025), pp. 418-433
Closed Access
Martina Nobili, Simone Guarino, Luca Faramondi, et al.
Lecture notes in computer science (2025), pp. 418-433
Closed Access
Combining Physical and Network Data for Attack Detection in Water Distribution Networks
Côme Frappé - - Vialatoux, Pierre Parrend
(2024) Vol. 80, pp. 118-118
Open Access
Côme Frappé - - Vialatoux, Pierre Parrend
(2024) Vol. 80, pp. 118-118
Open Access
Anomaly Detection in Cyber-Physical Systems Based on Genetic Algorithm with Dynamic Thresholding Detection
Javeyon Vaughn, Yaa Takyiwaa Acquaah, Kaushik Roy
(2024), pp. 1-8
Closed Access
Javeyon Vaughn, Yaa Takyiwaa Acquaah, Kaushik Roy
(2024), pp. 1-8
Closed Access
HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms
S. Abinash, V. S. Shankar Sriram, Kannan Krithivasan, et al.
Communications in computer and information science (2024), pp. 171-182
Closed Access
S. Abinash, V. S. Shankar Sriram, Kannan Krithivasan, et al.
Communications in computer and information science (2024), pp. 171-182
Closed Access
Detection of node associations in multiplex networked industrial chains
Fulin Chen, Kai Di, Yuanshuang Jiang, et al.
Computers & Electrical Engineering (2024) Vol. 114, pp. 109096-109096
Closed Access
Fulin Chen, Kai Di, Yuanshuang Jiang, et al.
Computers & Electrical Engineering (2024) Vol. 114, pp. 109096-109096
Closed Access
Introducing Multi-Layer Concatenation as a Scheme to Combine Information in Water Distribution Cyber-Physical Systems
Côme Frappé-Vialatoux, Pierre Parrend
Procedia Computer Science (2024) Vol. 246, pp. 1840-1854
Open Access
Côme Frappé-Vialatoux, Pierre Parrend
Procedia Computer Science (2024) Vol. 246, pp. 1840-1854
Open Access
Holistic Risk Assessment in Industrial Control Systems: Combining Multiple Bayesian Networks with Multi-Criteria Decision Making
Simone Guarino, Luca Faramondi, Gabriele Oliva, et al.
(2024), pp. 37-42
Closed Access
Simone Guarino, Luca Faramondi, Gabriele Oliva, et al.
(2024), pp. 37-42
Closed Access
Actuator and Sensor Attacks Detection Method based on Attack Reconstruction
Dinh Duy Kha Nguyen, Cédric Escudero, Emil Dumitrescu, et al.
(2024), pp. 736-743
Closed Access
Dinh Duy Kha Nguyen, Cédric Escudero, Emil Dumitrescu, et al.
(2024), pp. 736-743
Closed Access