OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Threat modeling of industrial control systems: A systematic literature review
Shaymaa Mamdouh Khalil, Hayretdin Bahşi, Tarmo Korõtko
Computers & Security (2023) Vol. 136, pp. 103543-103543
Open Access | Times Cited: 19

Showing 19 citing articles:

Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
Abebe Diro, Shahriar Kaisar, Athanasios V. Vasilakos, et al.
Computers & Security (2024) Vol. 139, pp. 103705-103705
Open Access | Times Cited: 19

Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions
Abdinasir Hirsi, Lukman Audah‏, Adeb Salh, et al.
IEEE Access (2024) Vol. 12, pp. 69941-69980
Open Access | Times Cited: 12

Communications Security in Industry X: A Survey
Ijaz Ahmad, Felipe Rodríguez, Tanesh Kumar, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 982-1025
Open Access | Times Cited: 5

Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
Yaser Baseri, Vikas Chouhan, Abdelhakim Hafid
Computers & Security (2024) Vol. 142, pp. 103883-103883
Open Access | Times Cited: 5

A Network Attack Surface Evaluation Method Based on Optimal Attack Strategy
Peng Xie, Lin Zhang, Zhichao Lian, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 274-274
Open Access

Cybersecurity threats of remote autonomous ships while approaching ports
Hristos Karahalios
Journal of Transportation Security (2025) Vol. 18, Iss. 1
Closed Access

Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks
Junbeom Park, Taehoon Eom, Hyun-geun Kim, et al.
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2751-2751
Open Access

Systematic literature review of threat modeling and risk assessment in ship cybersecurity
Muhammed Erbas, Shaymaa Mamdouh Khalil, Leonidas Tsiopoulos
Ocean Engineering (2024) Vol. 306, pp. 118059-118059
Open Access | Times Cited: 4

Threat Modeling of Smart Grid Control Architectures
Lars Halvdan Flå, Jonatan Ralf Axel Klemets, Martin Gilje Jaatun
Electronics (2025) Vol. 14, Iss. 6, pp. 1068-1068
Open Access

Systematic Cyber Threat Modeling for Maritime Operations: Attack Trees for Shipboard Systems
Omer F. Keskin, Karl Lubja, Hayretdin Bahşi, et al.
Journal of Marine Science and Engineering (2025) Vol. 13, Iss. 4, pp. 645-645
Open Access

Image Processing Using Shepard Local Approximation Operators Defined in Riesz MV-Algebras
Dan-Cătălin Noje, Ovidiu-Gheorghe Moldovan, Dan-Ioan Ţarcă, et al.
(2024), pp. 260-264
Closed Access | Times Cited: 1

Legacy ICS Cybersecurity Assessment Using Hybrid Threat Modeling—An Oil and Gas Sector Case Study
Mohamed Badawy, Nada Sherief, Ayman Abdel-Hamid
Applied Sciences (2024) Vol. 14, Iss. 18, pp. 8398-8398
Open Access | Times Cited: 1

Assessment of Communication Resource Allocation by the Transmission Control Protocol for the Target Virtual Connection under Competitive Conditions
Viacheslav Kovtun, Оксана Ковтун, Krzysztof Grochla, et al.
Electronics (2024) Vol. 13, Iss. 7, pp. 1180-1180
Open Access

A Methodology to Measure the “Cost” of CPS Attacks: Not all CPS Networks are Created Equal
Martin Rosso, Luca Allodi, Emmanuele Zambon, et al.
(2024), pp. 112-129
Closed Access

Modelling Tool Extension for Vulnerability Management
Avi Shaked, Nan Messe, Tom Melham
(2024), pp. 56-60
Open Access

Improving IIoT security: Unveiling threats through advanced side-channel analysis
Dalin He, Huanyu Wang, Tuo Deng, et al.
Computers & Security (2024), pp. 104135-104135
Closed Access

Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios
Sara Abbaspour Asadollah, Shamoona Imtiaz, Alireza Dehlaghi-Ghadim, et al.
Journal of Cybersecurity and Privacy (2024) Vol. 4, Iss. 4, pp. 823-852
Open Access

ICS-LTU2022: A dataset for ICS vulnerabilities
Manar Alanazi, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
Computers & Security (2024) Vol. 148, pp. 104143-104143
Open Access

An Integrated Cyber-Physical Framework for Worst-Case Attacks in Industrial Control Systems
Navid Aftabi, Dan Li, Thomas C. Sharkey
IISE Transactions (2024), pp. 1-26
Closed Access

Page 1

Scroll to top