
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition
Shuaiyi Lu, Kai Wang, Liren Zhang, et al.
Pattern Recognition (2023) Vol. 141, pp. 109661-109661
Closed Access | Times Cited: 10
Shuaiyi Lu, Kai Wang, Liren Zhang, et al.
Pattern Recognition (2023) Vol. 141, pp. 109661-109661
Closed Access | Times Cited: 10
Showing 10 citing articles:
An anomaly-based approach for cyber-physical threat detection using network and sensor data
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
Roberto Canonico, Giovanni Esposito, Annalisa Navarro, et al.
Computer Communications (2025), pp. 108087-108087
Open Access
A Review of Pattern Recognition and Machine Learning
Teshome Adugna, Arulmurugan Ramu, Anandakumar Haldorai
Journal of Machine and Computing (2024), pp. 210-220
Open Access | Times Cited: 3
Teshome Adugna, Arulmurugan Ramu, Anandakumar Haldorai
Journal of Machine and Computing (2024), pp. 210-220
Open Access | Times Cited: 3
CGAAD: Centrality- and Graph-Aware Deep-Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24162-24182
Closed Access | Times Cited: 3
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24162-24182
Closed Access | Times Cited: 3
Deep one-class classification model assisted by radius constraint for anomaly detection of industrial control systems
Xiaogang Deng, J. Z. Li
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109357-109357
Closed Access | Times Cited: 3
Xiaogang Deng, J. Z. Li
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109357-109357
Closed Access | Times Cited: 3
GL-GNN: Graph learning via the network of graphs
Yixiang Shan, Jielong Yang, Yixing Gao
Knowledge-Based Systems (2024) Vol. 299, pp. 112107-112107
Closed Access | Times Cited: 2
Yixiang Shan, Jielong Yang, Yixing Gao
Knowledge-Based Systems (2024) Vol. 299, pp. 112107-112107
Closed Access | Times Cited: 2
Graph classification via discriminative edge feature learning
Yang Yi, Xuequan Lu, Shang Gao, et al.
Pattern Recognition (2023) Vol. 143, pp. 109799-109799
Open Access | Times Cited: 6
Yang Yi, Xuequan Lu, Shang Gao, et al.
Pattern Recognition (2023) Vol. 143, pp. 109799-109799
Open Access | Times Cited: 6
GNN-based Advanced Feature Integration for ICS Anomaly Detection
Shuaiyi Lu, Kai Wang, Yuliang Wei, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 14, Iss. 6, pp. 1-32
Closed Access | Times Cited: 4
Shuaiyi Lu, Kai Wang, Yuliang Wei, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 14, Iss. 6, pp. 1-32
Closed Access | Times Cited: 4
Fusing Design and Machine Learning for Anomaly Detection in Water Treatment Plants
Gauthama Raman, Aditya P. Mathur
Electronics (2024) Vol. 13, Iss. 12, pp. 2267-2267
Open Access | Times Cited: 1
Gauthama Raman, Aditya P. Mathur
Electronics (2024) Vol. 13, Iss. 12, pp. 2267-2267
Open Access | Times Cited: 1
Heterogeneous network representation learning based on role feature extraction
Yueheng Sun, Mengyu Jia, Chang Liu, et al.
Pattern Recognition (2023) Vol. 144, pp. 109870-109870
Closed Access | Times Cited: 2
Yueheng Sun, Mengyu Jia, Chang Liu, et al.
Pattern Recognition (2023) Vol. 144, pp. 109870-109870
Closed Access | Times Cited: 2
Anomaly detection for mobile computing based smart vertical approaches
Yingying Gao, Xuan Sun
International Journal of Systems Assurance Engineering and Management (2023)
Closed Access
Yingying Gao, Xuan Sun
International Journal of Systems Assurance Engineering and Management (2023)
Closed Access