
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Study of The Risk Quantification Method of Cyber-Physical Systems focusing on Direct-Access Attacks to In-Vehicle Networks
Yasuyuki Kawanishi, H. Nishihara, Hideki Yamamoto, et al.
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2022) Vol. E106.A, Iss. 3, pp. 341-349
Open Access | Times Cited: 5
Yasuyuki Kawanishi, H. Nishihara, Hideki Yamamoto, et al.
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2022) Vol. E106.A, Iss. 3, pp. 341-349
Open Access | Times Cited: 5
Showing 5 citing articles:
A Study on Threat Analysis and Risk Assessment Based on the “Asset Container” Method and CWSS
Yasuyuki Kawanishi, H. Nishihara, Hirotaka Yoshida, et al.
IEEE Access (2023) Vol. 11, pp. 18148-18156
Open Access | Times Cited: 6
Yasuyuki Kawanishi, H. Nishihara, Hirotaka Yoshida, et al.
IEEE Access (2023) Vol. 11, pp. 18148-18156
Open Access | Times Cited: 6
Advancing Threat and Risk Analysis with a Combined Approach: Asset Container Method and CWSS Integration
Mr. Mounesh A, Ms. Shikha Shetty, Ms. Shilpa, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 77-84
Open Access
Mr. Mounesh A, Ms. Shikha Shetty, Ms. Shilpa, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 77-84
Open Access
Extended Pulsation Attack Against Kalman Filter Driven BLDC Motor Control System
Yuri Boiko, Iluju Kiringa, Tet Yeap
2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (2023), pp. 397-402
Closed Access
Yuri Boiko, Iluju Kiringa, Tet Yeap
2022 12th International Conference on Advanced Computer Information Technologies (ACIT) (2023), pp. 397-402
Closed Access
Intermediate Estimator-based Attack Reconstruction for Cyber-Physical Systems
Xiao Hu, Xinghua Liu, Peng Wang
2022 4th International Conference on Industrial Artificial Intelligence (IAI) (2023)
Closed Access
Xiao Hu, Xinghua Liu, Peng Wang
2022 4th International Conference on Industrial Artificial Intelligence (IAI) (2023)
Closed Access
The Application of Intelligent Computing and Machine Learning in the Security Guarantee and Information Security Scheme Design
Ruifeng Cao, Zhichun Fang, Shaowa Lin, et al.
(2023), pp. 396-400
Closed Access
Ruifeng Cao, Zhichun Fang, Shaowa Lin, et al.
(2023), pp. 396-400
Closed Access