
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Characterization of Cybersecurity Simulation Scenarios
Hamdi Kavak, José J. Padilla, Daniele Vernon-Bido
(2016)
Closed Access | Times Cited: 12
Hamdi Kavak, José J. Padilla, Daniele Vernon-Bido
(2016)
Closed Access | Times Cited: 12
Showing 12 citing articles:
A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and Challenges
Abdallah A. Smadi, Babatunde Ajao, Brian K. Johnson, et al.
Electronics (2021) Vol. 10, Iss. 9, pp. 1043-1043
Open Access | Times Cited: 64
Abdallah A. Smadi, Babatunde Ajao, Brian K. Johnson, et al.
Electronics (2021) Vol. 10, Iss. 9, pp. 1043-1043
Open Access | Times Cited: 64
Simulation for cybersecurity: state of the art and future directions
Hamdi Kavak, José J. Padilla, Daniele Vernon-Bido, et al.
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 49
Hamdi Kavak, José J. Padilla, Daniele Vernon-Bido, et al.
Journal of Cybersecurity (2021) Vol. 7, Iss. 1
Open Access | Times Cited: 49
Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases
Uchenna Ani, Jeremy Watson, Benjamin Green, et al.
Journal of Cyber Security Technology (2020) Vol. 5, Iss. 2, pp. 71-119
Open Access | Times Cited: 27
Uchenna Ani, Jeremy Watson, Benjamin Green, et al.
Journal of Cyber Security Technology (2020) Vol. 5, Iss. 2, pp. 71-119
Open Access | Times Cited: 27
Cyber Attack and Defense Emulation Agents
Jeong Do Yoo, Eunji Park, Gyungmin Lee, et al.
Applied Sciences (2020) Vol. 10, Iss. 6, pp. 2140-2140
Open Access | Times Cited: 15
Jeong Do Yoo, Eunji Park, Gyungmin Lee, et al.
Applied Sciences (2020) Vol. 10, Iss. 6, pp. 2140-2140
Open Access | Times Cited: 15
Development of Cyber Ranges as a Reference Environment for Digital Transformation
Ivan Blagoev, Velizar Shalamanov
(2023), pp. 1-5
Closed Access | Times Cited: 3
Ivan Blagoev, Velizar Shalamanov
(2023), pp. 1-5
Closed Access | Times Cited: 3
Analysis of automated adversary emulation techniques
Andy Applebaum, D. Miller, Blake E. Strom, et al.
(2017), pp. 16
Closed Access | Times Cited: 8
Andy Applebaum, D. Miller, Blake E. Strom, et al.
(2017), pp. 16
Closed Access | Times Cited: 8
Simulating Municipal Cybersecurity Incidents: Recommendations from Expert Interviews
Kira Gedris, K. Eric Bowman, Aatish Neupane, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2021)
Open Access | Times Cited: 5
Kira Gedris, K. Eric Bowman, Aatish Neupane, et al.
Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences (2021)
Open Access | Times Cited: 5
Modeling and Simulating large scale Cyber Effects for Cybersecurity using Riverbed Modeler
Rajiv Parwani, Hanan Mohammed Saeed Al-Amoudi, Abdul Jhummarwala
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 570-575
Closed Access | Times Cited: 3
Rajiv Parwani, Hanan Mohammed Saeed Al-Amoudi, Abdul Jhummarwala
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2020), pp. 570-575
Closed Access | Times Cited: 3
Making Iot Security Policies Relevant, Inclusive and Practical for People: A Multi-Dimensional Method
Kruakae Pothong, Larissa Pschetz, Jane Watson, et al.
(2019), pp. 32 (11 pp.)-32 (11 pp.)
Open Access | Times Cited: 2
Kruakae Pothong, Larissa Pschetz, Jane Watson, et al.
(2019), pp. 32 (11 pp.)-32 (11 pp.)
Open Access | Times Cited: 2
SoK: A Survey of Open Source Threat Emulators
Sunders Bruskin, Polina Zilberman, Rami Puzis, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2
Sunders Bruskin, Polina Zilberman, Rami Puzis, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2
Trustworthy Human-Centered Automation Through Explainable AI and High-Fidelity Simulation
Bradley Hayes, Michael Moniz
Advances in intelligent systems and computing (2020), pp. 3-9
Closed Access | Times Cited: 2
Bradley Hayes, Michael Moniz
Advances in intelligent systems and computing (2020), pp. 3-9
Closed Access | Times Cited: 2
Usable Security vs. Workflow Realities
Jim Blythe, Vijay Kothari, Sean W. Smith, et al.
(2018)
Open Access
Jim Blythe, Vijay Kothari, Sean W. Smith, et al.
(2018)
Open Access