
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Cyber Security Evaluation Framework for In-Vehicle Electrical Control Units
Haichun Zhang, Yuqian Pan, Zhaojun Lu, et al.
IEEE Access (2021) Vol. 9, pp. 149690-149706
Open Access | Times Cited: 18
Haichun Zhang, Yuqian Pan, Zhaojun Lu, et al.
IEEE Access (2021) Vol. 9, pp. 149690-149706
Open Access | Times Cited: 18
Showing 18 citing articles:
A Survey on Cyber-Physical Security of Active Distribution Networks in Smart Grids
Mohsen Khalaf, Abdelrahman Ayad, Mosaddek Hossain Kamal Tushar, et al.
IEEE Access (2024) Vol. 12, pp. 29414-29444
Open Access | Times Cited: 19
Mohsen Khalaf, Abdelrahman Ayad, Mosaddek Hossain Kamal Tushar, et al.
IEEE Access (2024) Vol. 12, pp. 29414-29444
Open Access | Times Cited: 19
Smart Card-Based Vehicle Ignition Systems: Security, Regulatory Compliance, Drug and Impairment Detection, Through Advanced Materials and Authentication Technologies
Valentina Vitiello, Alessandro Benazzi, Paolo Trucillo
Processes (2025) Vol. 13, Iss. 3, pp. 911-911
Open Access
Valentina Vitiello, Alessandro Benazzi, Paolo Trucillo
Processes (2025) Vol. 13, Iss. 3, pp. 911-911
Open Access
Prevention of Controller Area Network (CAN) Attacks on Electric Autonomous Vehicles
Salah Adly, Ahmed Moro, Sherif Hammad, et al.
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9374-9374
Open Access | Times Cited: 7
Salah Adly, Ahmed Moro, Sherif Hammad, et al.
Applied Sciences (2023) Vol. 13, Iss. 16, pp. 9374-9374
Open Access | Times Cited: 7
Cybersecurity Comparison of Brain-Based Automotive Electrical and Electronic Architectures
Nadera Sultana Tany, Sunish Suresh, Durgesh Nandan Sinha, et al.
Information (2022) Vol. 13, Iss. 11, pp. 518-518
Open Access | Times Cited: 9
Nadera Sultana Tany, Sunish Suresh, Durgesh Nandan Sinha, et al.
Information (2022) Vol. 13, Iss. 11, pp. 518-518
Open Access | Times Cited: 9
STRIDE-based Methodologies for Threat Modeling of Industrial Control Systems: A Review
Olaf Saßnick, Thomas Rosenstatter, Christian Schäfer, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
Olaf Saßnick, Thomas Rosenstatter, Christian Schäfer, et al.
(2024), pp. 1-8
Closed Access | Times Cited: 1
A Periodic Authentication Scheme for Safety/Security Co-Design on CAN Buses
Mingqing Zhang, Dharshan Krishna Murthy, Philip Parsch, et al.
IEEE Transactions on Vehicular Technology (2023) Vol. 73, Iss. 4, pp. 4814-4829
Closed Access | Times Cited: 3
Mingqing Zhang, Dharshan Krishna Murthy, Philip Parsch, et al.
IEEE Transactions on Vehicular Technology (2023) Vol. 73, Iss. 4, pp. 4814-4829
Closed Access | Times Cited: 3
A Study of The Risk Quantification Method of Cyber-Physical Systems focusing on Direct-Access Attacks to In-Vehicle Networks
Yasuyuki Kawanishi, H. Nishihara, Hideki Yamamoto, et al.
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2022) Vol. E106.A, Iss. 3, pp. 341-349
Open Access | Times Cited: 5
Yasuyuki Kawanishi, H. Nishihara, Hideki Yamamoto, et al.
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2022) Vol. E106.A, Iss. 3, pp. 341-349
Open Access | Times Cited: 5
A Secure Framework for Blockchain Transactions Protection
Wafaa N. Al-Sharu, Majdi K. Qabalin, Muawya Naser, et al.
Computer Systems Science and Engineering (2022) Vol. 45, Iss. 2, pp. 1095-1111
Open Access | Times Cited: 3
Wafaa N. Al-Sharu, Majdi K. Qabalin, Muawya Naser, et al.
Computer Systems Science and Engineering (2022) Vol. 45, Iss. 2, pp. 1095-1111
Open Access | Times Cited: 3
Data Security Risk Assessment Method for Connected and Automated Vehicles
Shiying Zhou, Xuezhu Yang, Muxi Li, et al.
2020 IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE) (2022), pp. 379-387
Closed Access | Times Cited: 3
Shiying Zhou, Xuezhu Yang, Muxi Li, et al.
2020 IEEE 5th International Conference on Intelligent Transportation Engineering (ICITE) (2022), pp. 379-387
Closed Access | Times Cited: 3
Hazardous Chemicals Logistics Internet of Vehicles Based on Encryption Algorithm
Yujian Tang, Ya Chen, Hoe-Kyung Jung
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 3, pp. 1287-1300
Open Access
Yujian Tang, Ya Chen, Hoe-Kyung Jung
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 3, pp. 1287-1300
Open Access
Towards an Evaluation Framework for Extended Reality Authentication Schemes
Christina Katsini, Gregory Epiphaniou, Carsten Maple
(2024), pp. 1-6
Open Access
Christina Katsini, Gregory Epiphaniou, Carsten Maple
(2024), pp. 1-6
Open Access
Distributed Estimation Based Public Key Infrastructure for In-Vehicle Network Security
Karthika Venkatesan, Seshadhri Srinivasan, Padmapritha Thamodharan, et al.
(2024), pp. 1-7
Closed Access
Karthika Venkatesan, Seshadhri Srinivasan, Padmapritha Thamodharan, et al.
(2024), pp. 1-7
Closed Access
Simulation of the Electrical Control Unit (ECU) in Automated Electric Vehicles for Reliability and Safety Using On-Board Sensors and Internet of Things
Mukesh Kumar, T. Anuradha, Yerram Srinivas, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
Mukesh Kumar, T. Anuradha, Yerram Srinivas, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 1
Cyber-Resilient Grid-Interactive Renewable Powered Wireless Charging of Electric Vehicles
Priyanka Tiwari, Deepak Ronanki
(2022)
Closed Access | Times Cited: 2
Priyanka Tiwari, Deepak Ronanki
(2022)
Closed Access | Times Cited: 2
Towards Interpretable and Lightweight Intrusion Detection for In-vehicle Network
Gang Yang, Chaojing Tang, Zhiyuan Jiang, et al.
2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) (2022), pp. 179-182
Closed Access | Times Cited: 1
Gang Yang, Chaojing Tang, Zhiyuan Jiang, et al.
2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) (2022), pp. 179-182
Closed Access | Times Cited: 1
Security Breaches in VANETs and Possible Solutions
Jasmeet Kour, Pooja Sharma, Anuj Mahajan
(2023) Vol. 23, pp. 1521-1527
Closed Access
Jasmeet Kour, Pooja Sharma, Anuj Mahajan
(2023) Vol. 23, pp. 1521-1527
Closed Access
Perfectly Keyless Commercial Vehicle
T Shubha, H K E Latha, Yogananth Karuppiah
(2023), pp. 1-4
Closed Access
T Shubha, H K E Latha, Yogananth Karuppiah
(2023), pp. 1-4
Closed Access
Security Concerns in Intelligent Transport Systems
Jasmeet Kour, Pooja Sharma, Anuj Mahajan
Lecture notes in networks and systems (2023), pp. 873-884
Closed Access
Jasmeet Kour, Pooja Sharma, Anuj Mahajan
Lecture notes in networks and systems (2023), pp. 873-884
Closed Access