
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems
Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 1774-1779
Open Access | Times Cited: 41
Alvi Ataur Khalil, Javier Franco, Imtiaz Parvez, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2022), pp. 1774-1779
Open Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
Blockchain and Machine Learning for Future Smart Grids: A Review
Vidya Krishnan Mololoth, Saguna Saguna, Christer Åhlund
Energies (2023) Vol. 16, Iss. 1, pp. 528-528
Open Access | Times Cited: 62
Vidya Krishnan Mololoth, Saguna Saguna, Christer Åhlund
Energies (2023) Vol. 16, Iss. 1, pp. 528-528
Open Access | Times Cited: 62
Toward an Intelligent Blockchain IoT-Enabled Fish Supply Chain: A Review and Conceptual Framework
Shereen Ismail, Hassan Reza, Khouloud Salameh, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5136-5136
Open Access | Times Cited: 29
Shereen Ismail, Hassan Reza, Khouloud Salameh, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5136-5136
Open Access | Times Cited: 29
Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
Shereen Ismail, Diana W. Dawoud, Hassan Reza
Future Internet (2023) Vol. 15, Iss. 6, pp. 200-200
Open Access | Times Cited: 22
Shereen Ismail, Diana W. Dawoud, Hassan Reza
Future Internet (2023) Vol. 15, Iss. 6, pp. 200-200
Open Access | Times Cited: 22
Security risk models against attacks in smart grid using big data and artificial intelligence
Yazeed Yasin Ghadi, Tehseen Mazhar, Khursheed Aurangzeb, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1840-e1840
Open Access | Times Cited: 10
Yazeed Yasin Ghadi, Tehseen Mazhar, Khursheed Aurangzeb, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1840-e1840
Open Access | Times Cited: 10
A Blockchain-based IoT Security Solution Using Multichain
Shereen Ismail, Hassan Reza, Hossein Kashani Zadeh, et al.
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2023)
Closed Access | Times Cited: 15
Shereen Ismail, Hassan Reza, Hossein Kashani Zadeh, et al.
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (2023)
Closed Access | Times Cited: 15
A Reliable and Secure Permissioned Blockchain‐Assisted Data Transfer Mechanism in Healthcare‐Based Cyber‐Physical Systems
P. Vinayasree, A. Mallikarjuna Reddy
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 3
Closed Access
P. Vinayasree, A. Mallikarjuna Reddy
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 3
Closed Access
Blockchain Security and Privacy: Threats, Challenges, Applications, and Tools
Ahod Alghuried, Mohammed Alkinoon, Manar Mohaisen, et al.
Deleted Journal (2025)
Closed Access
Ahod Alghuried, Mohammed Alkinoon, Manar Mohaisen, et al.
Deleted Journal (2025)
Closed Access
Developing an IoT Identity Management System Using Blockchain
Sitalakshmi Venkatraman, Sazia Parvin
Systems (2022) Vol. 10, Iss. 2, pp. 39-39
Open Access | Times Cited: 22
Sitalakshmi Venkatraman, Sazia Parvin
Systems (2022) Vol. 10, Iss. 2, pp. 39-39
Open Access | Times Cited: 22
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, et al.
Computer Communications (2022) Vol. 193, pp. 302-331
Closed Access | Times Cited: 20
A Hybrid Genetic Algorithm-Based Random Forest Model for Intrusion Detection Approach in Internet of Medical Things
Monire Norouzi, Zeynep Aydın, Özgür Can Turna, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11145-11145
Open Access | Times Cited: 10
Monire Norouzi, Zeynep Aydın, Özgür Can Turna, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11145-11145
Open Access | Times Cited: 10
BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems
M. Anwar, Noshina Tariq, Muhammad Ashraf, et al.
IEEE Access (2024) Vol. 12, pp. 101878-101894
Open Access | Times Cited: 3
M. Anwar, Noshina Tariq, Muhammad Ashraf, et al.
IEEE Access (2024) Vol. 12, pp. 101878-101894
Open Access | Times Cited: 3
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains
Tayebeh Rajabi, Alvi Ataur Khalil, Mohammad Hossein Manshaei, et al.
Deleted Journal (2023) Vol. 2, Iss. 4, pp. 1-21
Open Access | Times Cited: 9
Tayebeh Rajabi, Alvi Ataur Khalil, Mohammad Hossein Manshaei, et al.
Deleted Journal (2023) Vol. 2, Iss. 4, pp. 1-21
Open Access | Times Cited: 9
The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis
Tahesin Samira Delwar, Unal Aras, Sayak Mukhopadhyay, et al.
Sensors (2024) Vol. 24, Iss. 19, pp. 6377-6377
Open Access | Times Cited: 2
Tahesin Samira Delwar, Unal Aras, Sayak Mukhopadhyay, et al.
Sensors (2024) Vol. 24, Iss. 19, pp. 6377-6377
Open Access | Times Cited: 2
CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS
Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman
(2021), pp. 533-540
Open Access | Times Cited: 18
Alvi Ataur Khalil, Mohamed Y. Selim, Mohammad Ashiqur Rahman
(2021), pp. 533-540
Open Access | Times Cited: 18
Super Artificial Intelligence Medical Healthcare Services and Smart Wearable System based on IoT for Remote Health Monitoring
S. Elango, L. Manjunath, Dr Gudapati Syam Prasad, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 1180-1186
Closed Access | Times Cited: 7
S. Elango, L. Manjunath, Dr Gudapati Syam Prasad, et al.
2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) (2023), pp. 1180-1186
Closed Access | Times Cited: 7
Intrusion detection in cyber-physical system using rsa blockchain technology
A.Kh. Al-Jabri, Farah Jemili, Ouajdi Korbaa
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 48119-48140
Closed Access | Times Cited: 7
A.Kh. Al-Jabri, Farah Jemili, Ouajdi Korbaa
Multimedia Tools and Applications (2023) Vol. 83, Iss. 16, pp. 48119-48140
Closed Access | Times Cited: 7
Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain
Vinamra Das, Aswani Kumar Cherukuri, Qin Hu, et al.
Advances in information security (2023), pp. 259-274
Closed Access | Times Cited: 5
Vinamra Das, Aswani Kumar Cherukuri, Qin Hu, et al.
Advances in information security (2023), pp. 259-274
Closed Access | Times Cited: 5
Robustness and resilience of artificial intelligence-enabled electric vehicles: a safety and security perspective
Tanya Garg, Gurjinder Kaur, Ravinder Goyal
Elsevier eBooks (2024), pp. 59-80
Closed Access | Times Cited: 1
Tanya Garg, Gurjinder Kaur, Ravinder Goyal
Elsevier eBooks (2024), pp. 59-80
Closed Access | Times Cited: 1
BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems
Nur Imtiazul Haque, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, et al.
(2021), pp. 48-58
Closed Access | Times Cited: 9
Nur Imtiazul Haque, Alvi Ataur Khalil, Mohammad Ashiqur Rahman, et al.
(2021), pp. 48-58
Closed Access | Times Cited: 9
FAKEY: Fake Hashed Key Attack on Payment Channel Networks
Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy
(2023)
Closed Access | Times Cited: 3
Alvi Ataur Khalil, Mohammad Ashiqur Rahman, Hisham A. Kholidy
(2023)
Closed Access | Times Cited: 3
Cybersecurity-Based Blockchain for Cyber-Physical Systems: Challenges and Applications
Yassine Maleh, Soufyane Mounir, Karim Ouazzane
Advances in information security (2023), pp. 47-71
Closed Access | Times Cited: 2
Yassine Maleh, Soufyane Mounir, Karim Ouazzane
Advances in information security (2023), pp. 47-71
Closed Access | Times Cited: 2
A Review on Cyber-Physical Systems based on Blockchain: Possibilities and Challenges
Bhawana, Sushil Kumar
2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA) (2021), pp. 691-696
Closed Access | Times Cited: 6
Bhawana, Sushil Kumar
2021 IEEE 6th International Conference on Computing, Communication and Automation (ICCCA) (2021), pp. 691-696
Closed Access | Times Cited: 6
Analysis of Cross-Domain Security and Privacy Aspects of Cyber-Physical Systems
Kamal Prasat, S. Sanjay, V. Ananya, et al.
International Journal of Wireless Information Networks (2022) Vol. 29, Iss. 4, pp. 454-479
Closed Access | Times Cited: 4
Kamal Prasat, S. Sanjay, V. Ananya, et al.
International Journal of Wireless Information Networks (2022) Vol. 29, Iss. 4, pp. 454-479
Closed Access | Times Cited: 4
A Hybrid Data Acquisition Model for Precision Agriculture using IoT, Engineering Nanomaterials and Artificial Intelligence
K. Sankara Moorthy, Ms. Peddinti Neeraia, P. Pavitra, et al.
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2023)
Closed Access | Times Cited: 2
K. Sankara Moorthy, Ms. Peddinti Neeraia, P. Pavitra, et al.
2022 6th International Conference on Trends in Electronics and Informatics (ICOEI) (2023)
Closed Access | Times Cited: 2
Analysis Techniques for Pharmaceutical Drugs Biomedicine Big Data Analytics and Machine Learning
P. A. Padmaavathy, A. Celina, R. Prameela Devi, et al.
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 83-86
Closed Access | Times Cited: 2
P. A. Padmaavathy, A. Celina, R. Prameela Devi, et al.
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2023), pp. 83-86
Closed Access | Times Cited: 2