
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Stabilization of DC Microgrids Under Cyber Attacks-Optimal Design and Sensitivity Analysis
Minrui Leng, Subham Sahoo, Frede Blaabjerg
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 1, pp. 113-123
Closed Access | Times Cited: 4
Minrui Leng, Subham Sahoo, Frede Blaabjerg
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 1, pp. 113-123
Closed Access | Times Cited: 4
Showing 4 citing articles:
Informatics-Centric Neural Network for Distributed Energy Resources Against Diverse Cyber Threats
Tossaporn Surinkaew, Thongchart Kerdphol
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 12, pp. 14029-14041
Closed Access | Times Cited: 1
Tossaporn Surinkaew, Thongchart Kerdphol
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 12, pp. 14029-14041
Closed Access | Times Cited: 1
Delay-Aware Semantic Sampling in Power Electronic Systems
Kirti Gupta, Subham Sahoo, Bijaya Ketan Panigrahi
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 4, pp. 4038-4049
Open Access | Times Cited: 3
Kirti Gupta, Subham Sahoo, Bijaya Ketan Panigrahi
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 4, pp. 4038-4049
Open Access | Times Cited: 3
Vulnerability analysis and modeling false data injection attack against voltage source converter in renewable generation power system
Yankai Xing, Guangdou Zhang, Jian Li, et al.
ISA Transactions (2023) Vol. 143, pp. 492-502
Closed Access | Times Cited: 2
Yankai Xing, Guangdou Zhang, Jian Li, et al.
ISA Transactions (2023) Vol. 143, pp. 492-502
Closed Access | Times Cited: 2
Compensation strategies of electric arc furnace with ability to detect cyber-attacks
Martin Bejvl, Viktor Valouch, Petr Šimek
(2024), pp. 1-6
Closed Access
Martin Bejvl, Viktor Valouch, Petr Šimek
(2024), pp. 1-6
Closed Access