
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology
Daun Jung, Jiho Shin, Chaechang Lee, et al.
IEEE Access (2023) Vol. 11, pp. 15229-15241
Open Access | Times Cited: 13
Daun Jung, Jiho Shin, Chaechang Lee, et al.
IEEE Access (2023) Vol. 11, pp. 15229-15241
Open Access | Times Cited: 13
Showing 13 citing articles:
Sustainable Energy Safety Management Utilizing an Industry-Relative Assessment of Enterprise Equipment Technical Condition
Hanna Hrinchenko, Olha Prokopenko, Nadiia Shmygol, et al.
Sustainability (2024) Vol. 16, Iss. 2, pp. 771-771
Open Access | Times Cited: 7
Hanna Hrinchenko, Olha Prokopenko, Nadiia Shmygol, et al.
Sustainability (2024) Vol. 16, Iss. 2, pp. 771-771
Open Access | Times Cited: 7
Advanced financial security system using smart contract in private ethereum consortium blockchain with hybrid optimization strategy
S. C. Prabanand, M. S. Thanabal
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
S. C. Prabanand, M. S. Thanabal
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Assessment of cyber security systems using atrous to enhance anomaly detection mechanism
Yogesh Pawar, Pawar Anil Bhausaheb
AIP conference proceedings (2025) Vol. 3175, pp. 020100-020100
Closed Access
Yogesh Pawar, Pawar Anil Bhausaheb
AIP conference proceedings (2025) Vol. 3175, pp. 020100-020100
Closed Access
Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
A Review on Emerging Trends in Artificial Intelligence and Cyber Security Applications in IT Industry
Vishnu P Parandhaman, S. Venkatachalam, K. Saranya, et al.
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 6-10
Closed Access | Times Cited: 4
Vishnu P Parandhaman, S. Venkatachalam, K. Saranya, et al.
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) (2023), pp. 6-10
Closed Access | Times Cited: 4
The Evolving Technological Framework and Emerging Trends in Electrical Intelligence within Nuclear Power Facilities
Yao Sun, Zhijian Wang, Yao Huang, et al.
Processes (2024) Vol. 12, Iss. 7, pp. 1374-1374
Open Access | Times Cited: 1
Yao Sun, Zhijian Wang, Yao Huang, et al.
Processes (2024) Vol. 12, Iss. 7, pp. 1374-1374
Open Access | Times Cited: 1
Assessing the risk management-based impact relation map of nuclear energy system investments using the golden cut and bipolar q-ROF hybrid decision making model
Hasan Di̇nçer, Serhat Yüksel
Progress in Nuclear Energy (2023) Vol. 165, pp. 104911-104911
Closed Access | Times Cited: 2
Hasan Di̇nçer, Serhat Yüksel
Progress in Nuclear Energy (2023) Vol. 165, pp. 104911-104911
Closed Access | Times Cited: 2
Atomic Condition Coverage Analysis for Structured Text Based Programmable Logic Controller (PLC)
Sangharatna Godboley, P. Radha Krishna, Ritesh Kumar Jha
(2024), pp. 1-5
Open Access
Sangharatna Godboley, P. Radha Krishna, Ritesh Kumar Jha
(2024), pp. 1-5
Open Access
A Securing the Data Using a Novel Security Algorithm S-RKB-22
C. Bagath Basha, S. Rajaprakash, V. Subaprıya, et al.
Lecture notes in networks and systems (2024), pp. 425-433
Closed Access
C. Bagath Basha, S. Rajaprakash, V. Subaprıya, et al.
Lecture notes in networks and systems (2024), pp. 425-433
Closed Access
サイバー攻撃を想定した制御システムデザインと運用
Kenji Sawada
Journal of the Robotics Society of Japan (2024) Vol. 42, Iss. 2, pp. 111-116
Closed Access
Kenji Sawada
Journal of the Robotics Society of Japan (2024) Vol. 42, Iss. 2, pp. 111-116
Closed Access
Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
Tati Ernawati, Idham Kholid, Dahlan, et al.
Jurnal Online Informatika (2024) Vol. 9, Iss. 1, pp. 41-51
Open Access
Tati Ernawati, Idham Kholid, Dahlan, et al.
Jurnal Online Informatika (2024) Vol. 9, Iss. 1, pp. 41-51
Open Access
Packet Analysis and Information Theory on Attack Detection for Modbus TCP
Tatsuya Nishiuchi, Shintaro Fujita, Yohei Watanabe, et al.
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society (2023), pp. 1-6
Closed Access | Times Cited: 1
Tatsuya Nishiuchi, Shintaro Fujita, Yohei Watanabe, et al.
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society (2023), pp. 1-6
Closed Access | Times Cited: 1
Extended Calibration of Charge Mode Accelerometers to Improve the Accuracy of Energy Systems
Krzysztof Tomczyk
Energies (2023) Vol. 16, Iss. 22, pp. 7619-7619
Open Access
Krzysztof Tomczyk
Energies (2023) Vol. 16, Iss. 22, pp. 7619-7619
Open Access