
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Attacks on Self-Driving Cars and Their Countermeasures: A Survey
Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman, et al.
IEEE Access (2020) Vol. 8, pp. 207308-207342
Open Access | Times Cited: 109
Abdullahi Chowdhury, Gour Karmakar, Joarder Kamruzzaman, et al.
IEEE Access (2020) Vol. 8, pp. 207308-207342
Open Access | Times Cited: 109
Showing 1-25 of 109 citing articles:
A Review on Autonomous Vehicles: Progress, Methods and Challenges
Darsh Parekh, Nishi Poddar, Aakash Rajpurkar, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2162-2162
Open Access | Times Cited: 256
Darsh Parekh, Nishi Poddar, Aakash Rajpurkar, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2162-2162
Open Access | Times Cited: 256
A Survey on Attack Detection and Resilience for Connected and Automated Vehicles: From Vehicle Dynamics and Control Perspective
Zhiyang Ju, Hui Zhang, Xiang Li, et al.
IEEE Transactions on Intelligent Vehicles (2022) Vol. 7, Iss. 4, pp. 815-837
Closed Access | Times Cited: 121
Zhiyang Ju, Hui Zhang, Xiang Li, et al.
IEEE Transactions on Intelligent Vehicles (2022) Vol. 7, Iss. 4, pp. 815-837
Closed Access | Times Cited: 121
Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 4, pp. 3614-3637
Closed Access | Times Cited: 74
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 4, pp. 3614-3637
Closed Access | Times Cited: 74
A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles
Shah Khalid Khan, Nirajan Shiwakoti, Peter Stasinopoulos
Accident Analysis & Prevention (2021) Vol. 165, pp. 106515-106515
Closed Access | Times Cited: 60
Shah Khalid Khan, Nirajan Shiwakoti, Peter Stasinopoulos
Accident Analysis & Prevention (2021) Vol. 165, pp. 106515-106515
Closed Access | Times Cited: 60
A Comprehensive Review on Limitations of Autonomous Driving and Its Impact on Accidents and Collisions
Amit Chougule, Vinay Chamola, Aishwarya Sam, et al.
IEEE Open Journal of Vehicular Technology (2023) Vol. 5, pp. 142-161
Open Access | Times Cited: 30
Amit Chougule, Vinay Chamola, Aishwarya Sam, et al.
IEEE Open Journal of Vehicular Technology (2023) Vol. 5, pp. 142-161
Open Access | Times Cited: 30
Machine learning and blockchain technologies for cybersecurity in connected vehicles
Jameel Ahmad, Muhammad Umer Zia, Ijaz Haider Naqvi, et al.
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 27
Jameel Ahmad, Muhammad Umer Zia, Ijaz Haider Naqvi, et al.
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2023) Vol. 14, Iss. 1
Open Access | Times Cited: 27
Alternative prioritization of freeway incident management using autonomous vehicles in mixed traffic using a type-2 neutrosophic number based decision support system
Ilgın Gökaşar, Vladimir Šimić, Muhammet Deveci, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106183-106183
Open Access | Times Cited: 22
Ilgın Gökaşar, Vladimir Šimić, Muhammet Deveci, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106183-106183
Open Access | Times Cited: 22
XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving Systems
Sazid Nazat, Lingxi Li, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 48583-48607
Open Access | Times Cited: 8
Sazid Nazat, Lingxi Li, Mustafa Abdallah
IEEE Access (2024) Vol. 12, pp. 48583-48607
Open Access | Times Cited: 8
Multichain-Assisted Lightweight Security for Code Mutated False Data Injection Attacks in Connected Autonomous Vehicles
Sadia Jabeen Siddiqi, Bushra Tahir, Mian Ahmad Jan, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 11000-11010
Closed Access | Times Cited: 7
Sadia Jabeen Siddiqi, Bushra Tahir, Mian Ahmad Jan, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 11000-11010
Closed Access | Times Cited: 7
Data Privacy and Security in Autonomous Connected Vehicles in Smart City Environment
Tanweer Alam
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 95-95
Open Access | Times Cited: 7
Tanweer Alam
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 9, pp. 95-95
Open Access | Times Cited: 7
Intrusion detection system for cyberattacks in the Internet of Vehicles environment
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, et al.
Ad Hoc Networks (2023) Vol. 153, pp. 103330-103330
Open Access | Times Cited: 20
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, et al.
Ad Hoc Networks (2023) Vol. 153, pp. 103330-103330
Open Access | Times Cited: 20
Security of Connected and Autonomous Vehicles: A Review of Attacks and Mitigation Strategies
Farahnaz Javidi Niroumand, Parisa Ansari Bonab, Arman Sargolzaei
SoutheastCon (2024)
Closed Access | Times Cited: 6
Farahnaz Javidi Niroumand, Parisa Ansari Bonab, Arman Sargolzaei
SoutheastCon (2024)
Closed Access | Times Cited: 6
On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving Systems
Sazid Nazat, Osvaldo Arreche, Mustafa Abdallah
Sensors (2024) Vol. 24, Iss. 11, pp. 3515-3515
Open Access | Times Cited: 6
Sazid Nazat, Osvaldo Arreche, Mustafa Abdallah
Sensors (2024) Vol. 24, Iss. 11, pp. 3515-3515
Open Access | Times Cited: 6
A review of digital twins and their application in cybersecurity based on artificial intelligence
MohammadHossein Homaei, Óscar Mogollón-Gutiérrez, José Carlos Sancho Núñez, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 8
Open Access | Times Cited: 6
MohammadHossein Homaei, Óscar Mogollón-Gutiérrez, José Carlos Sancho Núñez, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 8
Open Access | Times Cited: 6
Enhancing Autonomous System Security and Resilience With Generative AI: A Comprehensive Survey
Martin Andreoni Lopez, Willian T. Lunardi, George Lawton, et al.
IEEE Access (2024) Vol. 12, pp. 109470-109493
Open Access | Times Cited: 6
Martin Andreoni Lopez, Willian T. Lunardi, George Lawton, et al.
IEEE Access (2024) Vol. 12, pp. 109470-109493
Open Access | Times Cited: 6
Clustering in Vehicular Ad Hoc Network: A Bibliometric Analysis
Ashish Kumari, Shailender Kumar, Ram Shringar Raw, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Ashish Kumari, Shailender Kumar, Ram Shringar Raw, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses
Mohammed Aledhari, Rehma Razzak, Mohamed Rahouti, et al.
Computers & Security (2025), pp. 104352-104352
Open Access
Mohammed Aledhari, Rehma Razzak, Mohamed Rahouti, et al.
Computers & Security (2025), pp. 104352-104352
Open Access
Exploring Autonomous Vehicle Technology: Advancements, Challenges, and the Critical Role of Simulation
Leila Haj Meftah, Asma Cherif
(2025)
Closed Access
Leila Haj Meftah, Asma Cherif
(2025)
Closed Access
Advancing Trustworthy AI: A Comparative Evaluation of AI Robustness Toolboxes
Avinash Agarwal, Manisha J. Nene
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Avinash Agarwal, Manisha J. Nene
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
A scoping study: crime and connected and autonomous vehicles
Ashley Brown, Shane D. Johnson, Nilufer Tuptuk
Crime Science (2025) Vol. 14, Iss. 1
Open Access
Ashley Brown, Shane D. Johnson, Nilufer Tuptuk
Crime Science (2025) Vol. 14, Iss. 1
Open Access
Human robot interaction (HRI): An artificial cognitive autonomy approach to enhance Decision-Making
Walter Teixeira Lima, Rudinei André Welter, Wellington Pacheco Ferreira, et al.
Cognitive Systems Research (2025) Vol. 91, pp. 101336-101336
Closed Access
Walter Teixeira Lima, Rudinei André Welter, Wellington Pacheco Ferreira, et al.
Cognitive Systems Research (2025) Vol. 91, pp. 101336-101336
Closed Access
Blockchain-Integrated Multiagent Deep Reinforcement Learning for Securing Cooperative Adaptive Cruise Control
Gunasekaran Raja, Kottilingam Kottursamy, Kapal Dev, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 7, pp. 9630-9639
Closed Access | Times Cited: 23
Gunasekaran Raja, Kottilingam Kottursamy, Kapal Dev, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 7, pp. 9630-9639
Closed Access | Times Cited: 23
Post-Accident Cyberattack Event Analysis for Connected and Automated Vehicles
Mansi Girdhar, Yongsik You, Tai‐Jin Song, et al.
IEEE Access (2022) Vol. 10, pp. 83176-83194
Open Access | Times Cited: 23
Mansi Girdhar, Yongsik You, Tai‐Jin Song, et al.
IEEE Access (2022) Vol. 10, pp. 83176-83194
Open Access | Times Cited: 23
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View
Xu Yuan, Xingshuo Han, Gelei Deng, et al.
(2023)
Open Access | Times Cited: 15
Xu Yuan, Xingshuo Han, Gelei Deng, et al.
(2023)
Open Access | Times Cited: 15
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats
Florian Sommer, Mona Gierl, Reiner Kriesten, et al.
ACM Transactions on Privacy and Security (2024) Vol. 27, Iss. 2, pp. 1-34
Closed Access | Times Cited: 4
Florian Sommer, Mona Gierl, Reiner Kriesten, et al.
ACM Transactions on Privacy and Security (2024) Vol. 27, Iss. 2, pp. 1-34
Closed Access | Times Cited: 4