OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A survey on attack detection, estimation and control of industrial cyber–physical systems
Dan Zhang, Qing‐Guo Wang, Gang Feng, et al.
ISA Transactions (2021) Vol. 116, pp. 1-16
Closed Access | Times Cited: 219

Showing 1-25 of 219 citing articles:

A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
Wenli Duo, MengChu Zhou, Abdullah Abusorrah
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 9, Iss. 5, pp. 784-800
Closed Access | Times Cited: 284

A3C-Based Intelligent Event-Triggering Control of Networked Nonlinear Unmanned Marine Vehicles Subject to Hybrid Attacks
Zehua Ye, Dan Zhang, Zheng‐Guang Wu, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 8, pp. 12921-12934
Closed Access | Times Cited: 110

Dynamic Event-Triggered Output Feedback Control for Load Frequency Control in Power Systems With Multiple Cyber Attacks
Pengcheng Chen, Dan Zhang, Li Yu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 52, Iss. 10, pp. 6246-6258
Closed Access | Times Cited: 105

Event-Triggering and Quantized Sliding Mode Control of UMV Systems Under DoS Attack
Zehua Ye, Dan Zhang, Jun Cheng, et al.
IEEE Transactions on Vehicular Technology (2022) Vol. 71, Iss. 8, pp. 8199-8211
Closed Access | Times Cited: 85

A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems
Dajun Du, Minggao Zhu, Xue Li, et al.
Journal of Modern Power Systems and Clean Energy (2023) Vol. 11, Iss. 3, pp. 727-743
Open Access | Times Cited: 66

Machine learning and metaheuristic optimization algorithms for feature selection and botnet attack detection
Mahdieh Maazalahi, Soodeh Hosseini
Knowledge and Information Systems (2025)
Closed Access | Times Cited: 1

Intelligent Event-Based Fuzzy Dynamic Positioning Control of Nonlinear Unmanned Marine Vehicles Under DoS Attack
Dan Zhang, Zehua Ye, Gang Feng, et al.
IEEE Transactions on Cybernetics (2021) Vol. 52, Iss. 12, pp. 13486-13499
Closed Access | Times Cited: 97

Bipartite Average Tracking for Multi-Agent Systems With Disturbances: Finite-Time and Fixed-Time Convergence
Tao Han, Zhi‐Hong Guan, Bo Xiao, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2021) Vol. 68, Iss. 10, pp. 4393-4402
Open Access | Times Cited: 74

Security of networked control systems subject to deception attacks: a survey
Zhong‐Hua Pang, Lan-Zhi Fan, Haibin Guo, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 16, pp. 3577-3598
Closed Access | Times Cited: 64

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 63

Advancements in Industrial Cyber-Physical Systems: An Overview and Perspectives
Kunwu Zhang, Yang Shi, Stamatis Karnouskos, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 716-729
Closed Access | Times Cited: 49

Event-based security tracking control for networked control systems against stochastic cyber-attacks
Jinliang Liu, Dong Yan-hui, Lijuan Zha, et al.
Information Sciences (2022) Vol. 612, pp. 306-321
Closed Access | Times Cited: 40

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 40

Securing healthcare data in industrial cyber-physical systems using combining deep learning and blockchain technology
Mazin Abed Mohammed, Abdullah Lakhan, Dilovan Asaad Zebari, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 129, pp. 107612-107612
Open Access | Times Cited: 30

Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25

Indirect adaptive neural tracking control of USVs under injection and deception attacks
Chen Wu, Guibing Zhu, Jinshu Lu
Ocean Engineering (2023) Vol. 270, pp. 113641-113641
Closed Access | Times Cited: 22

WKN-OC: A New Deep Learning Method for Anomaly Detection in Intelligent Vehicles
Zhitao He, Yongyi Chen, Hui Zhang, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 8, Iss. 3, pp. 2162-2172
Closed Access | Times Cited: 22

Event-Based Secure Filtering Under Two-Channel Stochastic Attacks and Switching Topologies Over Wireless Sensor Networks
Abdul Basit, Muhammad Tufail, Muhammad Rehan, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 4, pp. 3704-3717
Closed Access | Times Cited: 11

A holistic review on Cyber-Physical Power System (CPPS) testbeds for secure and sustainable electric power grid – Part – I: Background on CPPS and necessity of CPPS testbeds
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Rishi Pugazhendhi, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 136, pp. 107718-107718
Closed Access | Times Cited: 47

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)
Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, et al.
IEEE Access (2022) Vol. 10, pp. 52922-52954
Open Access | Times Cited: 35

Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems
Steven X. Ding, Linlin Li, Dong Zhao, et al.
Automatica (2022) Vol. 142, pp. 110352-110352
Open Access | Times Cited: 32

Future era of techno-economic analysis: Insights from review
Slyvester Yew Wang Chai, Frederick Jit Fook Phang, Lip Siang Yeo, et al.
Frontiers in Sustainability (2022) Vol. 3
Open Access | Times Cited: 30

Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-wide Survey
Neha Agrawal, Rohit Kumar
ISA Transactions (2022) Vol. 130, pp. 10-24
Closed Access | Times Cited: 28

Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey
Vinícius de Miranda Rios, Pedro R. M. Inácio, Damien Magoni, et al.
IEEE Access (2022) Vol. 10, pp. 76648-76668
Open Access | Times Cited: 28

Secure Sampled-Data Observer-Based Control for Wind Turbine Oscillation Under Cyber Attacks
Amir Amini, Mohsen Ghafouri, Arash Mohammadi, et al.
IEEE Transactions on Smart Grid (2022) Vol. 13, Iss. 4, pp. 3188-3202
Closed Access | Times Cited: 27

Page 1 - Next Page

Scroll to top