
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 22
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 22
Showing 22 citing articles:
Advanced informatic technologies for intelligent construction: A review
Limao Zhang, Yongsheng Li, Yue Pan, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109104-109104
Closed Access | Times Cited: 28
Limao Zhang, Yongsheng Li, Yue Pan, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109104-109104
Closed Access | Times Cited: 28
PENGETAHUAN DASAR IDENTIFIKASI DINI DETEKSI SERANGAN KEJAHATAN SIBER UNTUK MENCEGAH PEMBOBOLAN DATA PERUSAHAAN
Tri Ginanjar Laksana, Sri Mulyani
Jurnal Ilmiah Multidisiplin (2024) Vol. 3, Iss. 01, pp. 109-122
Open Access | Times Cited: 5
Tri Ginanjar Laksana, Sri Mulyani
Jurnal Ilmiah Multidisiplin (2024) Vol. 3, Iss. 01, pp. 109-122
Open Access | Times Cited: 5
Exploring digital solutions for sustainable production: academic insights and practical applications
Angélica Pigola, Priscila Rezende da Costa, Gustavo Hermínio Salati Marcondes de Moraes, et al.
International Journal of Sustainable Engineering (2025) Vol. 18, Iss. 1
Open Access
Angélica Pigola, Priscila Rezende da Costa, Gustavo Hermínio Salati Marcondes de Moraes, et al.
International Journal of Sustainable Engineering (2025) Vol. 18, Iss. 1
Open Access
An anomaly-based approach for cyber-physical threat detection using network and sensor data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
Empowered Cyber-Physical Systems security using both network and physical data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computers & Security (2025), pp. 104382-104382
Open Access
A Systematic Literature Review of Current Research Trends in Operational and Related Technology Threats, Threat Detection, and Security Insurance
Nikolaj Goranin, Dainius Čeponis, Antanas Čenys
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2316-2316
Open Access
Nikolaj Goranin, Dainius Čeponis, Antanas Čenys
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2316-2316
Open Access
Changes in Sustainable Development in Manufacturing in Cases of Unexpected Occurrences—A Systematic Review
Justyna Patalas‐Maliszewska, Hanna Łosyk
Sustainability (2024) Vol. 16, Iss. 2, pp. 717-717
Open Access | Times Cited: 4
Justyna Patalas‐Maliszewska, Hanna Łosyk
Sustainability (2024) Vol. 16, Iss. 2, pp. 717-717
Open Access | Times Cited: 4
Digital twins for sustainable design and management of smart city buildings and municipal infrastructure
Zhiwei Tan, Z. Li
Sustainable Energy Technologies and Assessments (2024) Vol. 64, pp. 103682-103682
Closed Access | Times Cited: 3
Zhiwei Tan, Z. Li
Sustainable Energy Technologies and Assessments (2024) Vol. 64, pp. 103682-103682
Closed Access | Times Cited: 3
A Bibliometric Analysis of Data-driven Technologies in Digital Supply Chains
Hamed Baziyad, Vahid Kayvanfar, Aseem Kinra
Supply Chain Analytics (2024) Vol. 6, pp. 100067-100067
Open Access | Times Cited: 3
Hamed Baziyad, Vahid Kayvanfar, Aseem Kinra
Supply Chain Analytics (2024) Vol. 6, pp. 100067-100067
Open Access | Times Cited: 3
False Data Injection Attack Detection for Smart Grid Based on Square Root Unscented Kalman Filtering Estimate with Long Short Term Memory Correction
Jing Zhang, Dong-Ming Ma
Journal of Electrical Engineering and Technology (2024) Vol. 19, Iss. 6, pp. 3809-3824
Closed Access | Times Cited: 1
Jing Zhang, Dong-Ming Ma
Journal of Electrical Engineering and Technology (2024) Vol. 19, Iss. 6, pp. 3809-3824
Closed Access | Times Cited: 1
Joint safety and security risk analysis in industrial cyber‐physical systems: A survey
Z. Y. Sun, Guang Chen, Yulong Ding, et al.
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access
Z. Y. Sun, Guang Chen, Yulong Ding, et al.
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access
Cybersecurity Challenges and Solutions in Industry 4.0, Telematics and Smart Cities
M. Zajicek, Tomáš Tichý, Zdeněk Lokaj, et al.
(2024) Vol. 7, pp. 1-7
Closed Access
M. Zajicek, Tomáš Tichý, Zdeněk Lokaj, et al.
(2024) Vol. 7, pp. 1-7
Closed Access
Event-triggered-based sequential fusion filters for CPSs with deception attacks and correlated noises
Baifu Zheng, Xuenan Zhang, Yuan Gao, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 4780-4785
Closed Access
Baifu Zheng, Xuenan Zhang, Yuan Gao, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 4780-4785
Closed Access
Securing electric transportation networks: A machine learning-driven cyber threat detection
Nikolai Vatin, Rama Sundari
MATEC Web of Conferences (2024) Vol. 392, pp. 01184-01184
Open Access
Nikolai Vatin, Rama Sundari
MATEC Web of Conferences (2024) Vol. 392, pp. 01184-01184
Open Access
Ltl-Based Runtime Verification Framework for Cyber-Attack Anomaly Prediction in Cyber-Physical Systems
Ayodeji James Akande, Ernest Foo, Zhé Hóu, et al.
(2024)
Closed Access
Ayodeji James Akande, Ernest Foo, Zhé Hóu, et al.
(2024)
Closed Access
Analysis Of Vulnerabilities In Communication Channels Using An Integrated Approach Based On Machine Learning And Statistical Methods
Sebastian–Alexandru Drăguşin, Nicu Bizon, Robert-Nicolae Boştinaru, et al.
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-12
Closed Access
Sebastian–Alexandru Drăguşin, Nicu Bizon, Robert-Nicolae Boştinaru, et al.
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-12
Closed Access
Anomaly Detection in Cyber-Physical Systems: A Case Study on Pump Health Monitoring
Giancarlo Sperlì, Andrea Vignali
(2024), pp. 361-364
Closed Access
Giancarlo Sperlì, Andrea Vignali
(2024), pp. 361-364
Closed Access
Explainable Intrusion Detection in Industrial Control Systems
Reham Eltomy, Wassila Lalouani
(2024), pp. 1-8
Closed Access
Reham Eltomy, Wassila Lalouani
(2024), pp. 1-8
Closed Access
Opportunities and barriers for the integration of Industry 4.0 into small and medium-sized enterprises in Tunisia: analysis with MICMAC and DEMATEL
Abdessalem Jerbi, Manel Elmsalmi
African Journal of Science Technology Innovation and Development (2024), pp. 1-25
Closed Access
Abdessalem Jerbi, Manel Elmsalmi
African Journal of Science Technology Innovation and Development (2024), pp. 1-25
Closed Access
Modelling smart machining process towards intelligent manufacturing - a case study
Dineshkumar Musalekar, Justyna Patalas‐Maliszewska
IFAC-PapersOnLine (2024) Vol. 58, Iss. 19, pp. 784-788
Open Access
Dineshkumar Musalekar, Justyna Patalas‐Maliszewska
IFAC-PapersOnLine (2024) Vol. 58, Iss. 19, pp. 784-788
Open Access
Leveraging Swarm Intelligence for Invariant Rule Generation and Anomaly Detection in Industrial Control Systems
Yu Song, Huihui Huang, Hongmin Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10705-10705
Open Access
Yu Song, Huihui Huang, Hongmin Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10705-10705
Open Access
Application of Deep Learning and Markov Chains Approaches Based Zero Trust Security for Smart Power Grid Systems
Nousseiba Guergouri, Nabil Sahli, Mohamed Benmohammed, et al.
(2023), pp. 1-6
Closed Access
Nousseiba Guergouri, Nabil Sahli, Mohamed Benmohammed, et al.
(2023), pp. 1-6
Closed Access