
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
MMTD: Multistage Moving Target Defense for Security-Enhanced D-FACTS Operation
Jiazhou Wang, Jue Tian, Yang Liu, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12234-12247
Closed Access | Times Cited: 8
Jiazhou Wang, Jue Tian, Yang Liu, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12234-12247
Closed Access | Times Cited: 8
Showing 8 citing articles:
A comprehensive review of FACTS devices in modern power systems: Addressing power quality, optimal placement, and stability with renewable energy penetration
Ban H. Alajrash, Mohamed Salem, Mahmood Swadi, et al.
Energy Reports (2024) Vol. 11, pp. 5350-5371
Open Access | Times Cited: 32
Ban H. Alajrash, Mohamed Salem, Mahmood Swadi, et al.
Energy Reports (2024) Vol. 11, pp. 5350-5371
Open Access | Times Cited: 32
False Data Injection Attack with Max-Min Optimization in Smart Grid
Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya
Computers & Security (2024) Vol. 140, pp. 103761-103761
Closed Access | Times Cited: 3
Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya
Computers & Security (2024) Vol. 140, pp. 103761-103761
Closed Access | Times Cited: 3
Optimal Deployment in Moving Target Defense against Coordinated Cyber–Physical Attacks via Game Theory
Jian Yu, Qiang Li
Electronics (2023) Vol. 12, Iss. 11, pp. 2484-2484
Open Access | Times Cited: 5
Jian Yu, Qiang Li
Electronics (2023) Vol. 12, Iss. 11, pp. 2484-2484
Open Access | Times Cited: 5
Deep-Reinforcement-Learning-Based Self-Evolving Moving Target Defense Approach Against Unknown Attacks
Yuan Cao, Kun Liu, Yeming Lin, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33027-33039
Closed Access
Yuan Cao, Kun Liu, Yeming Lin, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33027-33039
Closed Access
Combating temporal composition inference by high-order camouflaged network topology obfuscation
Xiaohui Li, Yang Xiang, Yizhao Huang, et al.
Computers & Security (2024) Vol. 144, pp. 103981-103981
Closed Access
Xiaohui Li, Yang Xiang, Yizhao Huang, et al.
Computers & Security (2024) Vol. 144, pp. 103981-103981
Closed Access
CFDI: Coordinated false data injection attack in active distribution network
Yang Liu, Chenyang Yang, Nanpeng Yu, et al.
IET Generation Transmission & Distribution (2024) Vol. 18, Iss. 15, pp. 2556-2569
Open Access
Yang Liu, Chenyang Yang, Nanpeng Yu, et al.
IET Generation Transmission & Distribution (2024) Vol. 18, Iss. 15, pp. 2556-2569
Open Access
Joint Meter Coding and Moving Target Defense for Detecting Stealthy False Data Injection Attacks in Power System State Estimation
Chensheng Liu, Yang Tang, Ruilong Deng, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 3371-3381
Closed Access | Times Cited: 1
Chensheng Liu, Yang Tang, Ruilong Deng, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 3371-3381
Closed Access | Times Cited: 1