
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors
Abiodun Ayodeji, Mokhtar Mohamed, Li Li, et al.
Progress in Nuclear Energy (2023) Vol. 161, pp. 104738-104738
Open Access | Times Cited: 23
Abiodun Ayodeji, Mokhtar Mohamed, Li Li, et al.
Progress in Nuclear Energy (2023) Vol. 161, pp. 104738-104738
Open Access | Times Cited: 23
Showing 23 citing articles:
Artificial Intelligence
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 73
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 73
Discrete-time integral terminal sliding mode load following controller coupled with disturbance observer for a modular high-temperature gas-cooled reactor
Jiuwu Hui
Energy (2024) Vol. 292, pp. 130479-130479
Closed Access | Times Cited: 14
Jiuwu Hui
Energy (2024) Vol. 292, pp. 130479-130479
Closed Access | Times Cited: 14
Application of artificial intelligence technologies and big data computing for nuclear power plants control: a review
Derjew Ayele Ejigu, Yanjie Tuo, Xiaojing Liu
Frontiers in Nuclear Engineering (2024) Vol. 3
Open Access | Times Cited: 7
Derjew Ayele Ejigu, Yanjie Tuo, Xiaojing Liu
Frontiers in Nuclear Engineering (2024) Vol. 3
Open Access | Times Cited: 7
Unraveling the nuclear isotope tapestry: Applications, challenges, and future horizons in a dynamic landscape
Hang Yang, Qi Feng, Weixiang Xu, et al.
Eco-Environment & Health (2024) Vol. 3, Iss. 2, pp. 208-226
Open Access | Times Cited: 6
Hang Yang, Qi Feng, Weixiang Xu, et al.
Eco-Environment & Health (2024) Vol. 3, Iss. 2, pp. 208-226
Open Access | Times Cited: 6
Advancing nuclear safety
Enrico Zio
Frontiers in Nuclear Engineering (2024) Vol. 2
Closed Access | Times Cited: 4
Enrico Zio
Frontiers in Nuclear Engineering (2024) Vol. 2
Closed Access | Times Cited: 4
Energy Supply Chains in the Digital Age: A Review of Current Research and Trends
Agnieszka Tubis, Honorata Poturaj
Energies (2025) Vol. 18, Iss. 2, pp. 430-430
Open Access
Agnieszka Tubis, Honorata Poturaj
Energies (2025) Vol. 18, Iss. 2, pp. 430-430
Open Access
Human Factors in Cybersecurity
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Walaa R. Ayyad, Qasem Abu Al‐Haija, Hussein M. K. Al‐Masri
Advances in information security, privacy, and ethics book series (2024), pp. 235-256
Closed Access | Times Cited: 2
Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
Design Procedure for Real-Time Cyber–Physical Systems Tolerant to Cyberattacks
Carlos M. Paredes, Diego Martínez Castro, Apolinar González, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 684-684
Open Access | Times Cited: 1
Carlos M. Paredes, Diego Martínez Castro, Apolinar González, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 684-684
Open Access | Times Cited: 1
Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry
Anita Khadka, Saurav Sthapit, Gregory Epiphaniou, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 9, pp. 1-29
Open Access | Times Cited: 1
Anita Khadka, Saurav Sthapit, Gregory Epiphaniou, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 9, pp. 1-29
Open Access | Times Cited: 1
Wavy-attention network for real-time cyber-attack detection in a small modular pressurized water reactor digital control system
Abiodun Ayodeji, Antonio Di Buono, I. Pierce, et al.
Nuclear Engineering and Design (2024) Vol. 424, pp. 113277-113277
Open Access | Times Cited: 1
Abiodun Ayodeji, Antonio Di Buono, I. Pierce, et al.
Nuclear Engineering and Design (2024) Vol. 424, pp. 113277-113277
Open Access | Times Cited: 1
A Survey of Artificial Intelligence Applications in Nuclear Power Plants
Chaima Jendoubi, Arghavan Asad
(2024)
Open Access | Times Cited: 1
Chaima Jendoubi, Arghavan Asad
(2024)
Open Access | Times Cited: 1
Assessing the risk management-based impact relation map of nuclear energy system investments using the golden cut and bipolar q-ROF hybrid decision making model
Hasan Dınçer, Serhat Yüksel
Progress in Nuclear Energy (2023) Vol. 165, pp. 104911-104911
Closed Access | Times Cited: 2
Hasan Dınçer, Serhat Yüksel
Progress in Nuclear Energy (2023) Vol. 165, pp. 104911-104911
Closed Access | Times Cited: 2
A blockchain based scheme for distributed storage of nuclear power plant images
Kalivaraprasanna Babu Goru, Thiyagarajan Paramasivan, Saranya Rajiakodi
Kerntechnik (2024) Vol. 89, Iss. 1, pp. 67-76
Closed Access
Kalivaraprasanna Babu Goru, Thiyagarajan Paramasivan, Saranya Rajiakodi
Kerntechnik (2024) Vol. 89, Iss. 1, pp. 67-76
Closed Access
Cyber Threat Detection and System State Estimation Based on Dbn in Level 1 I&C Systems in Npps
Kwang Seop Son, Jaehwan Kim, Jae-gu Song, et al.
(2024)
Closed Access
Kwang Seop Son, Jaehwan Kim, Jae-gu Song, et al.
(2024)
Closed Access
Zero Trust for Cloud
H L Gururaj, M Spoorthi, Vinayakumar Ravi, et al.
SpringerBriefs in applied sciences and technology (2024), pp. 31-38
Closed Access
H L Gururaj, M Spoorthi, Vinayakumar Ravi, et al.
SpringerBriefs in applied sciences and technology (2024), pp. 31-38
Closed Access
CONDUCTING CYBERSECURITY REGULATORY INSPECTIONS AT NUCLEAR FACILITIES
Samo Tomažič, Trent Nelson, Tadej Šeruga
International Journal of Computer Applications (2024) Vol. 186, Iss. 12, pp. 17-24
Open Access
Samo Tomažič, Trent Nelson, Tadej Šeruga
International Journal of Computer Applications (2024) Vol. 186, Iss. 12, pp. 17-24
Open Access
Technical-Economic Protection of Small Modular Reactors (SMR) Considered Energy-Mining Objectives
Sorin Mihai Radu, Ioan Gâf-Deac, Alexandru A. Burian, et al.
Revista minelor (2024) Vol. 30, Iss. 3, pp. 118-128
Closed Access
Sorin Mihai Radu, Ioan Gâf-Deac, Alexandru A. Burian, et al.
Revista minelor (2024) Vol. 30, Iss. 3, pp. 118-128
Closed Access
An Overview of Probabilistic Safety Assessment for Nuclear Safety: What Has Been Done, and Where Do We Go from Here?
Adolphus Lye, Jathniel Chang, Sicong Xiao, et al.
Journal of Nuclear Engineering (2024) Vol. 5, Iss. 4, pp. 456-485
Open Access
Adolphus Lye, Jathniel Chang, Sicong Xiao, et al.
Journal of Nuclear Engineering (2024) Vol. 5, Iss. 4, pp. 456-485
Open Access
Enhancing radioactive waste management with cutting-edge digital technologies: a review
Abdel‐Mohsen O. Mohamed
Academia Engineering (2024) Vol. 3, Iss. 4
Open Access
Abdel‐Mohsen O. Mohamed
Academia Engineering (2024) Vol. 3, Iss. 4
Open Access
A Survey of Artificial Intelligence Applications in Nuclear Power Plants
Chaima Jendoubi, Arghavan Asad
IoT (2024) Vol. 5, Iss. 4, pp. 666-691
Open Access
Chaima Jendoubi, Arghavan Asad
IoT (2024) Vol. 5, Iss. 4, pp. 666-691
Open Access
Analyzing the Correlation Between Employee Security Awareness and Cyberattack Vulnerability: A Quantitative Study
Maryam Ahmadi, Mehdi Ramezankhani, Mohsen Kakavand, et al.
Lecture notes in networks and systems (2024), pp. 195-211
Closed Access
Maryam Ahmadi, Mehdi Ramezankhani, Mohsen Kakavand, et al.
Lecture notes in networks and systems (2024), pp. 195-211
Closed Access
A Hardware-in-the-Loop Framework for Remote Monitoring of Safety Critical Systems
Arslan Ahmed, Mert Comert, Hafiz Ahmed
(2024), pp. 279-284
Closed Access
Arslan Ahmed, Mert Comert, Hafiz Ahmed
(2024), pp. 279-284
Closed Access
Identifying Security Challenges in the Transition from Traditional to Smart Manufacturing Through IIoT Retrofitting
Mert Comert, Arslan Ahmed, Hafiz Ahmed
(2024), pp. 285-289
Closed Access
Mert Comert, Arslan Ahmed, Hafiz Ahmed
(2024), pp. 285-289
Closed Access
Nuclear Power Organizations as Learning Organizations Around Cybersecurity, Public Health, Public Safety, and Critical Infrastructure Protection
Tiffany Weitoish, Darrell Norman Burrell
Advances in business information systems and analytics book series (2023), pp. 333-355
Closed Access | Times Cited: 1
Tiffany Weitoish, Darrell Norman Burrell
Advances in business information systems and analytics book series (2023), pp. 333-355
Closed Access | Times Cited: 1