OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

ICSSIM — A framework for building industrial control systems security testbeds
Alireza Dehlaghi-Ghadim, Ali Balador, Mahshid Helali Moghadam, et al.
Computers in Industry (2023) Vol. 148, pp. 103906-103906
Open Access | Times Cited: 23

Showing 23 citing articles:

Anomaly Detection Dataset for Industrial Control Systems
Alireza Dehlaghi-Ghadim, Mahshid Helali Moghadam, Ali Balador, et al.
IEEE Access (2023) Vol. 11, pp. 107982-107996
Open Access | Times Cited: 23

ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
Alexandria Engineering Journal (2025) Vol. 121, pp. 248-262
Closed Access

The Westermo network traffic data set
Per Erik Strandberg, David Söderman, Alireza Dehlaghi-Ghadim, et al.
Data in Brief (2023) Vol. 50, pp. 109512-109512
Open Access | Times Cited: 7

Industrial Control Systems Security Validation Based on MITRE Adversarial Tactics, Techniques, and Common Knowledge Framework
Divine S. Afenu, Mohammed Asiri, Neetesh Saxena
Electronics (2024) Vol. 13, Iss. 5, pp. 917-917
Open Access | Times Cited: 2

Networked Industrial Control Device Asset Identification Method Based on Improved Decision Tree
Wei Yang, Yushan Fang, Xiaoming Zhou, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 2
Closed Access | Times Cited: 2

CyberGrid: an IEC61850 protocol-based substation automation virtual cyber range for cybersecurity research in the smart grid
John E. Efiong, Abiodun Akinwale, Bodunde Odunola Akinyemi, et al.
Cyber-Physical Systems (2024), pp. 1-20
Closed Access | Times Cited: 2

An extensive survey of smart agriculture technologies: Current security posture
Martin Otieno
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 1207-1231
Open Access | Times Cited: 5

On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe, et al.
Wireless Networks (2024)
Open Access | Times Cited: 1

An improved autoencoder-based approach for anomaly detection in industrial control systems
Muhammad Muzamil Aslam, Ali Tufail, Liyanage C. De Silva, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 1

Exploration of Quantum Cryptography Security Applications for Industrial Control Systems
Hengyu Li, Yun Dong, Yusheng Zhang, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access | Times Cited: 1

Enhancing Cybersecurity in SCADA IoT Systems: A Novel Machine Learning-Based Approach for Man-in-the-Middle Attack Detection
Ala Mughaid, Mohammad F. Al–Jamal, Issa Al-Aiash, et al.
(2023), pp. 74-79
Closed Access | Times Cited: 3

Survey on Application of Trusted Computing in Industrial Control Systems
Jing Bai, Xiao Zhang, Longyun Qi, et al.
Electronics (2023) Vol. 12, Iss. 19, pp. 4182-4182
Open Access | Times Cited: 2

Risk assessment for industrial control systems based on asymmetric connection cloud and Choquet integral
Feng Li, Mozhong Zhu, Ling Lin
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 3, pp. 6589-6605
Closed Access

InSecTT Technologies for the Enhancement of Industrial Security and Safety
Sasikumar Punnekkat, Tijana Markovic, Miguel León, et al.
Studies in computational intelligence (2024), pp. 83-104
Open Access

Explainable Intrusion Detection in Industrial Control Systems
Reham Eltomy, Wassila Lalouani
(2024), pp. 1-8
Closed Access

Network Intrusion Detection using Machine Learning on Resource-Constrained Edge Devices
Pontus Lidholm, Tijana Markovic, Miguel León, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 2, pp. 1-8
Closed Access

Deep Learning-Based Anomaly Detection in Industrial Control System Network Traffic
Mubarak Majid Al-Naimi, Abdelhak Belhi
Smart innovation, systems and technologies (2024), pp. 119-128
Closed Access

SIRT: A Distinctive and Smart Invasion Recognition Tool (SIRT) for Defending IoT Integrated ICS from Cyber-Attacks
M.S. Kavitha, G. Sumathy, B. Sarala, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 47, pp. 100720-100720
Closed Access

Robust Automated Event Detection from Machine-Learning Analysis of Network Data
Matthew Rodda, Alexander Chambers, Alexander Rohl
Procedia Computer Science (2024) Vol. 246, pp. 1619-1629
Open Access

Federated Learning for Network Anomaly Detection in a Distributed Industrial Environment
Alireza Dehlaghi-Ghadim, Tijana Markovic, Miguel León, et al.
(2023), pp. 218-225
Closed Access | Times Cited: 1

Page 1

Scroll to top