
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey of Network Attacks on Cyber-Physical Systems
Liwei Cao, Xiaoning Jiang, Yumei Zhao, et al.
IEEE Access (2020) Vol. 8, pp. 44219-44227
Open Access | Times Cited: 97
Liwei Cao, Xiaoning Jiang, Yumei Zhao, et al.
IEEE Access (2020) Vol. 8, pp. 44219-44227
Open Access | Times Cited: 97
Showing 1-25 of 97 citing articles:
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
Wenli Duo, MengChu Zhou, Abdullah Abusorrah
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 9, Iss. 5, pp. 784-800
Closed Access | Times Cited: 287
Wenli Duo, MengChu Zhou, Abdullah Abusorrah
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 9, Iss. 5, pp. 784-800
Closed Access | Times Cited: 287
A Survey on Network Security for Cyber–Physical Systems: From Threats to Resilient Design
Sangjun Kim, Kyung‐Joon Park, Chenyang Lu
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 3, pp. 1534-1573
Closed Access | Times Cited: 75
Sangjun Kim, Kyung‐Joon Park, Chenyang Lu
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 3, pp. 1534-1573
Closed Access | Times Cited: 75
A Survey on Cyber–Physical Systems Security
Zhenhua Yu, Hongxia Gao, Xuya Cong, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21670-21686
Open Access | Times Cited: 45
Zhenhua Yu, Hongxia Gao, Xuya Cong, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21670-21686
Open Access | Times Cited: 45
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 101
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 101
Security Risk Modeling in Smart Grid Critical Infrastructures in the Era of Big Data and Artificial Intelligence
Abdellah Chehri, I. Fofana, Xiaomin Yang
Sustainability (2021) Vol. 13, Iss. 6, pp. 3196-3196
Open Access | Times Cited: 92
Abdellah Chehri, I. Fofana, Xiaomin Yang
Sustainability (2021) Vol. 13, Iss. 6, pp. 3196-3196
Open Access | Times Cited: 92
Internet of Behaviors: A Survey
Jiayi Sun, Wensheng Gan, Han‐Chieh Chao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 13, pp. 11117-11134
Open Access | Times Cited: 36
Jiayi Sun, Wensheng Gan, Han‐Chieh Chao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 13, pp. 11117-11134
Open Access | Times Cited: 36
Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23
Integrating contextual intelligence with mixture of experts for signature and anomaly-based intrusion detection in CPS security
Kashif Rahim, Zia Ul Islam Nasir, Nassar Ikram, et al.
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
Kashif Rahim, Zia Ul Islam Nasir, Nassar Ikram, et al.
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
A specialized review on outlook of future Cyber-Physical Power System (CPPS) testbeds for securing electric power grid
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Rishi Pugazhendhi, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 136, pp. 107720-107720
Closed Access | Times Cited: 55
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Rishi Pugazhendhi, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 136, pp. 107720-107720
Closed Access | Times Cited: 55
CPS Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: A Review
Mahmoud M. Amin, Fayez F. M. El-Sousy, Ghada A. Abdel Aziz, et al.
IEEE Access (2021) Vol. 9, pp. 38571-38601
Open Access | Times Cited: 54
Mahmoud M. Amin, Fayez F. M. El-Sousy, Ghada A. Abdel Aziz, et al.
IEEE Access (2021) Vol. 9, pp. 38571-38601
Open Access | Times Cited: 54
A holistic review on Cyber-Physical Power System (CPPS) testbeds for secure and sustainable electric power grid – Part – I: Background on CPPS and necessity of CPPS testbeds
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Rishi Pugazhendhi, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 136, pp. 107718-107718
Closed Access | Times Cited: 47
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, Rishi Pugazhendhi, et al.
International Journal of Electrical Power & Energy Systems (2021) Vol. 136, pp. 107718-107718
Closed Access | Times Cited: 47
Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)
Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, et al.
IEEE Access (2022) Vol. 10, pp. 52922-52954
Open Access | Times Cited: 35
Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, et al.
IEEE Access (2022) Vol. 10, pp. 52922-52954
Open Access | Times Cited: 35
A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning
Furqan Rustam, Ali Raza, Muhammad Qasim, et al.
IEEE Access (2024) Vol. 12, pp. 39614-39627
Open Access | Times Cited: 7
Furqan Rustam, Ali Raza, Muhammad Qasim, et al.
IEEE Access (2024) Vol. 12, pp. 39614-39627
Open Access | Times Cited: 7
Adaptive control for cyber-physical systems under man-in-the-middle attacks with false data injections
Rahul Kumar, Rajeeb Dey, Kevin Guelton, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 4, pp. 106661-106661
Closed Access | Times Cited: 6
Rahul Kumar, Rajeeb Dey, Kevin Guelton, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 4, pp. 106661-106661
Closed Access | Times Cited: 6
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure
Ayei E. Ibor, Olusoji B. Okunoye, Florence A. Oladeji, et al.
Journal of Information Security and Applications (2022) Vol. 65, pp. 103107-103107
Closed Access | Times Cited: 23
Ayei E. Ibor, Olusoji B. Okunoye, Florence A. Oladeji, et al.
Journal of Information Security and Applications (2022) Vol. 65, pp. 103107-103107
Closed Access | Times Cited: 23
Model-Free Adaptive Resilient Control for Nonlinear CPSs With Aperiodic Jamming Attacks
Yongsheng Ma, Wei‐Wei Che, Chao Deng, et al.
IEEE Transactions on Cybernetics (2022) Vol. 53, Iss. 9, pp. 5949-5956
Closed Access | Times Cited: 22
Yongsheng Ma, Wei‐Wei Che, Chao Deng, et al.
IEEE Transactions on Cybernetics (2022) Vol. 53, Iss. 9, pp. 5949-5956
Closed Access | Times Cited: 22
Machine learning for securing Cyber–Physical Systems under cyber attacks: A survey
Cheng Fei, Jun Shen
Franklin Open (2023) Vol. 4, pp. 100041-100041
Open Access | Times Cited: 14
Cheng Fei, Jun Shen
Franklin Open (2023) Vol. 4, pp. 100041-100041
Open Access | Times Cited: 14
Observer-based dynamic event-triggered second-level MPC for nonlinear time-delay CPSs under joint hybrid attacks
Hyung K. Song, Zhenlei Wang, Xin Wang
Applied Mathematics and Computation (2025) Vol. 498, pp. 129391-129391
Closed Access
Hyung K. Song, Zhenlei Wang, Xin Wang
Applied Mathematics and Computation (2025) Vol. 498, pp. 129391-129391
Closed Access
Homomorphic Encryption of Supervisory Control Systems Using Automata
Sian Zhou, Zhenhua Yu, Emad Abouel Nasr, et al.
IEEE Access (2020) Vol. 8, pp. 147185-147198
Open Access | Times Cited: 38
Sian Zhou, Zhenhua Yu, Emad Abouel Nasr, et al.
IEEE Access (2020) Vol. 8, pp. 147185-147198
Open Access | Times Cited: 38
Event‐triggered model‐free adaptive control for nonlinear cyber‐physical systems with false data injection attacks
Yongsheng Ma, Wei‐Wei Che, Chao Deng
International Journal of Robust and Nonlinear Control (2021) Vol. 32, Iss. 4, pp. 2442-2452
Closed Access | Times Cited: 28
Yongsheng Ma, Wei‐Wei Che, Chao Deng
International Journal of Robust and Nonlinear Control (2021) Vol. 32, Iss. 4, pp. 2442-2452
Closed Access | Times Cited: 28
Intrusion response systems for cyber-physical systems: A comprehensive survey
May Bashendy, Ashraf Tantawy, Abdelkarim Erradi
Computers & Security (2022) Vol. 124, pp. 102984-102984
Closed Access | Times Cited: 21
May Bashendy, Ashraf Tantawy, Abdelkarim Erradi
Computers & Security (2022) Vol. 124, pp. 102984-102984
Closed Access | Times Cited: 21
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
An Investigation of Cyber-Attacks and Security Mechanisms for Connected and Autonomous Vehicles
Sandeep Gupta, Carsten Maple, Roberto Passerone
IEEE Access (2023) Vol. 11, pp. 90641-90669
Open Access | Times Cited: 12
Sandeep Gupta, Carsten Maple, Roberto Passerone
IEEE Access (2023) Vol. 11, pp. 90641-90669
Open Access | Times Cited: 12
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework
Mannan Javed, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9372-9372
Open Access | Times Cited: 12
Mannan Javed, Noshina Tariq, Muhammad Imran Ashraf, et al.
Sensors (2023) Vol. 23, Iss. 23, pp. 9372-9372
Open Access | Times Cited: 12
Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works
Pengyuan Lu, Lin Zhang, Mengyu Liu, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-31
Open Access | Times Cited: 4
Pengyuan Lu, Lin Zhang, Mengyu Liu, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-31
Open Access | Times Cited: 4