OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detecting and classifying man-in-the-middle attacks in the private area network of smart grids
Mohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, et al.
Sustainable Energy Grids and Networks (2023) Vol. 36, pp. 101167-101167
Closed Access | Times Cited: 12

Showing 12 citing articles:

Harnessing advanced hybrid deep learning model for real-time detection and prevention of man-in-the-middle cyber attacks
Vijayalakshmi Kandasamy, A. Ameelia Roseline
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 3

Analyzing complexities of integrating Renewable Energy Sources into Smart Grid: A comprehensive review
Habib Asadi Aghajari, Taher Niknam, Mokhtar Shasadeghi, et al.
Applied Energy (2025) Vol. 383, pp. 125317-125317
Closed Access | Times Cited: 3

Enhancing Security: Federated Learning against Man-In-The-Middle Threats with Gradient Boosting Machines and LSTM
Suneeta Satpathy, Pratik Kumar Swain, Sachi Nandan Mohanty, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 6

ENDEMIC: End-to-End Network Disruptions - Examining Middleboxes, Issues, and Countermeasures - A Survey
Iliès Benhabbour, Marc Daciér
ACM Computing Surveys (2025)
Closed Access

Unified Random Forest and Hybrid Bat Optimization Based Man-in-the-Middle Attack Detection in Advanced Metering Infrastructure
D. Jim Solomon Raja, R. Sriranjani, Parvathy Arulmozhi, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-12
Closed Access | Times Cited: 2

Rule-Based With Machine Learning IDS for DDoS Attack Detection in Cyber-Physical Production Systems (CPPS)
Ayaz Hussain, Eva Marín Tordera, Xavi Masip‐Bruin, et al.
IEEE Access (2024) Vol. 12, pp. 114894-114911
Open Access | Times Cited: 2

Modeling and detection of false data injection attacks in cyber-physical distribution system with load aggregator interaction
Xinrui Liu, Shubo Sun, Yating Wang, et al.
Sustainable Energy Grids and Networks (2024) Vol. 40, pp. 101533-101533
Closed Access | Times Cited: 1

A Review and Analysis of Attack and Countermeasure Approaches for Enhancing Smart Grid Cybersecurity
Amir Meydani, Hossein Shahinzadeh, Ali Ramezani, et al.
(2024), pp. 1-19
Closed Access

Mitigate the Man-in-the-Middle attack by the use of Machine Learning Techniques: A Review
Edson Bernardo Da Conceicao Mahangue, Vivek Sharma, Keshav Gupta
(2024), pp. 232-238
Closed Access

Enhanced Abnormality Detection via PSO-Driven Adaptive Ensemble Weighting for Energy AIoT Device Security
Qazi Waqas Khan, Anam Nawaz Khan, Rashid Ahmad, et al.
IEEE Access (2024) Vol. 12, pp. 138483-138500
Open Access

Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access

PORTABLE BIOMETRIC MODULE SOFTWARE FOR MILITARY AVIATION SUPPORT SYSTEM
Mariusz Zieja, Karol Kawka, Konrad Wojtowicz, et al.
Aviation and Security Issues (2023) Vol. 4, Iss. 2, pp. 235-252
Closed Access | Times Cited: 1

Page 1

Scroll to top