
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An IoT-Based Deep-Learning Architecture to Secure Automated Electric Vehicles Against Cyberattacks and Data Loss
Shimaa Bergies, Tawfiq M. Aljohani, Shun‐Feng Su, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 9, pp. 5717-5732
Closed Access | Times Cited: 8
Shimaa Bergies, Tawfiq M. Aljohani, Shun‐Feng Su, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 9, pp. 5717-5732
Closed Access | Times Cited: 8
Showing 8 citing articles:
A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
Tawfiq M. Aljohani, Abdulaziz Almutairi
Defence Technology (2024) Vol. 42, pp. 31-58
Open Access | Times Cited: 10
Tawfiq M. Aljohani, Abdulaziz Almutairi
Defence Technology (2024) Vol. 42, pp. 31-58
Open Access | Times Cited: 10
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Faheed A. F. Alrslani, Manal Abdullah Alohali, Mohammed Aljebreen, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Faheed A. F. Alrslani, Manal Abdullah Alohali, Mohammed Aljebreen, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
HYRIDE: HYbrid and Robust Intrusion DEtection Approach for Enhancing Cybersecurity in Industry 4.0
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Shubham Srivastav, Amit K. Shukla, Sandeep Kumar, et al.
Internet of Things (2025), pp. 101492-101492
Open Access
Leveraging sparrow search optimization with deep learning-based cybersecurity detection in industrial internet of things environment
Fatma S. Alrayes, Nadhem Nemri, Wahida Mansouri, et al.
Alexandria Engineering Journal (2025) Vol. 121, pp. 128-137
Closed Access
Fatma S. Alrayes, Nadhem Nemri, Wahida Mansouri, et al.
Alexandria Engineering Journal (2025) Vol. 121, pp. 128-137
Closed Access
EXP-Transformer time series prediction model for accident scenarios in high-reliability energy systems: Nuclear power plants case
Xuan Zhang, Meiqi Song, Xiao Xiao, et al.
Energy (2025), pp. 135481-135481
Closed Access
Xuan Zhang, Meiqi Song, Xiao Xiao, et al.
Energy (2025), pp. 135481-135481
Closed Access
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC
Mousa Tayseer Jafar, Lu‐Xing Yang, Gang Li
Computers & Security (2024) Vol. 148, pp. 104186-104186
Closed Access | Times Cited: 1
Mousa Tayseer Jafar, Lu‐Xing Yang, Gang Li
Computers & Security (2024) Vol. 148, pp. 104186-104186
Closed Access | Times Cited: 1
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, et al.
World Electric Vehicle Journal (2024) Vol. 16, Iss. 1, pp. 14-14
Open Access | Times Cited: 1
Tiansheng Yang, Ruikai Sun, Rajkumar Singh Rathore, et al.
World Electric Vehicle Journal (2024) Vol. 16, Iss. 1, pp. 14-14
Open Access | Times Cited: 1
A power grid topology detection method based on edge graph attention neural network
Chunxia Zhao, Xueping Li, Yao Cai
Electric Power Systems Research (2024) Vol. 239, pp. 111219-111219
Closed Access
Chunxia Zhao, Xueping Li, Yao Cai
Electric Power Systems Research (2024) Vol. 239, pp. 111219-111219
Closed Access