
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, et al.
Cryptography (2022) Vol. 6, Iss. 3, pp. 44-44
Open Access | Times Cited: 19
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, et al.
Cryptography (2022) Vol. 6, Iss. 3, pp. 44-44
Open Access | Times Cited: 19
Showing 19 citing articles:
Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection
Oleg Illiashenko, Vyacheslav Kharchenko, Eugene Babeshko, et al.
Entropy (2023) Vol. 25, Iss. 8, pp. 1123-1123
Open Access | Times Cited: 29
Oleg Illiashenko, Vyacheslav Kharchenko, Eugene Babeshko, et al.
Entropy (2023) Vol. 25, Iss. 8, pp. 1123-1123
Open Access | Times Cited: 29
UAV Fleet as a Dependable Service for Smart Cities: Model-Based Assessment and Application
Vyacheslav Kharchenko, Ihor Kliushnikov, Andrzej Ruciński, et al.
Smart Cities (2022) Vol. 5, Iss. 3, pp. 1151-1178
Open Access | Times Cited: 23
Vyacheslav Kharchenko, Ihor Kliushnikov, Andrzej Ruciński, et al.
Smart Cities (2022) Vol. 5, Iss. 3, pp. 1151-1178
Open Access | Times Cited: 23
Evaluation of the Omni-Secure Firewall System in a Private Cloud Environment
Salman Mahmood, Raza Hasan, Nor Adnan Yahaya, et al.
Knowledge (2024) Vol. 4, Iss. 2, pp. 141-170
Open Access | Times Cited: 3
Salman Mahmood, Raza Hasan, Nor Adnan Yahaya, et al.
Knowledge (2024) Vol. 4, Iss. 2, pp. 141-170
Open Access | Times Cited: 3
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture
Iure Fé, Tuấn Anh Nguyễn, Mario Di Mauro, et al.
Computing (2024) Vol. 106, Iss. 8, pp. 2737-2783
Closed Access | Times Cited: 3
Iure Fé, Tuấn Anh Nguyễn, Mario Di Mauro, et al.
Computing (2024) Vol. 106, Iss. 8, pp. 2737-2783
Closed Access | Times Cited: 3
WORM-VIRUS DETECTION METHOD ACCORDING TO MULTI-CLASS CLASSIFICATION
БОГДАН САВЕНКО
Herald of Khmelnytskyi National University Technical sciences (2024) Vol. 331, Iss. 1, pp. 18-28
Open Access | Times Cited: 1
БОГДАН САВЕНКО
Herald of Khmelnytskyi National University Technical sciences (2024) Vol. 331, Iss. 1, pp. 18-28
Open Access | Times Cited: 1
Model-Driven Dependability and Power Consumption Quantification of Kubernetes-Based Cloud-Fog Continuum
Iure Fé, Tuấn Anh Nguyễn, Andréc. B. Soares, et al.
IEEE Access (2023) Vol. 11, pp. 140826-140852
Open Access | Times Cited: 4
Iure Fé, Tuấn Anh Nguyễn, Andréc. B. Soares, et al.
IEEE Access (2023) Vol. 11, pp. 140826-140852
Open Access | Times Cited: 4
Analysis of direct traffic at the transport protocol level in the WiMax-1/2 cluster oriented to offload the smart city's wireless ecosystem
Viacheslav Kovtun, Krzysztof Grochla, Aldosary Saad, et al.
Royal Society Open Science (2024) Vol. 11, Iss. 7
Open Access | Times Cited: 1
Viacheslav Kovtun, Krzysztof Grochla, Aldosary Saad, et al.
Royal Society Open Science (2024) Vol. 11, Iss. 7
Open Access | Times Cited: 1
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
Cheng‐Chi Lee, Mehdi Gheisari, Mohammad Javad Shayegan, et al.
Cryptography (2023) Vol. 7, Iss. 4, pp. 51-51
Open Access | Times Cited: 3
Cheng‐Chi Lee, Mehdi Gheisari, Mohammad Javad Shayegan, et al.
Cryptography (2023) Vol. 7, Iss. 4, pp. 51-51
Open Access | Times Cited: 3
Analytical model of a virtualized computing system using semi-markov approach
R. K. Bhardwaj, L. D. Sharma
Life Cycle Reliability and Safety Engineering (2024)
Closed Access
R. K. Bhardwaj, L. D. Sharma
Life Cycle Reliability and Safety Engineering (2024)
Closed Access
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity
Λέανδρος Μαγλαράς
Computers (2022) Vol. 11, Iss. 11, pp. 159-159
Open Access | Times Cited: 3
Λέανδρος Μαγλαράς
Computers (2022) Vol. 11, Iss. 11, pp. 159-159
Open Access | Times Cited: 3
Multi-fragmental and multi-phase availability models of the safety-critical I&C systems with two-cascade redundancy
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Eugene Babeshko
International Journal of Electronics and Telecommunications (2024), pp. 211-218
Open Access
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Eugene Babeshko
International Journal of Electronics and Telecommunications (2024), pp. 211-218
Open Access
Safety Assessment of Maintained Control Systems with Cascade Two-Version 2oo3/1oo2 Structures Considering Version Faults
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Eugene Babeshko, et al.
Lecture notes in networks and systems (2023), pp. 119-129
Closed Access | Times Cited: 1
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Eugene Babeshko, et al.
Lecture notes in networks and systems (2023), pp. 119-129
Closed Access | Times Cited: 1
An Effective Dual Level Flow Optimized AlexNet-BiGRU Model for Intrusion Detection in Cloud Computing
Rajesh Bingu, S. Jothilakshmi
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 7s, pp. 153-165
Open Access | Times Cited: 1
Rajesh Bingu, S. Jothilakshmi
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 7s, pp. 153-165
Open Access | Times Cited: 1
Markov Model of PLC Availability Considering Cyber-Attacks in Industrial IoT
Maryna Kolisnyk, Axel Jantsch, Tanja Zseby, et al.
Studies in systems, decision and control (2023), pp. 61-78
Closed Access | Times Cited: 1
Maryna Kolisnyk, Axel Jantsch, Tanja Zseby, et al.
Studies in systems, decision and control (2023), pp. 61-78
Closed Access | Times Cited: 1
Developing the Concept of Methodological Support for Designing and Assessing the Efficiency of Information Protection Systems of Standard Information Systems Considering Their Vulnerabilities
Islam A. Alexandrov, Andrey Kirichek, Vladimir Kuklin, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 11, pp. 1305-1317
Open Access | Times Cited: 1
Islam A. Alexandrov, Andrey Kirichek, Vladimir Kuklin, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 11, pp. 1305-1317
Open Access | Times Cited: 1
Analytical Approaches to QoS Analysis and Performance Modelling in Fog Computing
Yönal Kırsal
Advances in computational intelligence and robotics book series (2023), pp. 121-151
Closed Access
Yönal Kırsal
Advances in computational intelligence and robotics book series (2023), pp. 121-151
Closed Access
Availability Markov Models of Complex Equipment with Relearning Diagnostic Means after Detecting Latent Failures
Vladyslav Shchehlov, Vyacheslav Kharchenko, José Leitão Borges, et al.
(2023), pp. 1-7
Closed Access
Vladyslav Shchehlov, Vyacheslav Kharchenko, José Leitão Borges, et al.
(2023), pp. 1-7
Closed Access
Set-Valued Markov Chain Dependability Model with Uncertain Data
Leonid Lyubchyk, Yurii Zaitsev, Galyna Grinberg, et al.
(2022)
Closed Access
Leonid Lyubchyk, Yurii Zaitsev, Galyna Grinberg, et al.
(2022)
Closed Access