OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
Kyriaki Tsantikidou, Nicolas Sklavos
Cryptography (2024) Vol. 8, Iss. 1, pp. 7-7
Open Access | Times Cited: 9

Showing 9 citing articles:

AI-based Malware Detection in IoT Networks within Smart Cities: A Survey
Mustafa J.M. Alhamdi, José Manuel López-Guede, Jafar AlQaryouti, et al.
Computer Communications (2025), pp. 108055-108055
Closed Access

Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1

Ensuring cybersecurity of FPGA as a service with the use of penetration testing of components
Artem Tetskyi, Artem Perepelitsyn, Oleg Illiashenko, et al.
RADIOELECTRONIC AND COMPUTER SYSTEMS (2024) Vol. 2024, Iss. 2, pp. 160-172
Open Access

Cryptographic Services Based on Cellular Automata in Image Encryption
George Cosmin Stănică, Ştefan Octavian Stănică, Petre Anghelescu
2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) (2024), pp. 1-4
Closed Access

Structured Defense Model Against DNP3-Based Critical Infrastructure Attacks
Erdal ÖZDOĞAN
Arabian Journal for Science and Engineering (2024)
Closed Access

Light-PoEDDP: A Fast and Lightweight RSA-Based Proof of Possession of Outsourced Data & Correct Computation
Abdel Ali Harchaoui, Ali Younes, Abdelaaziz El Hibaoui, et al.
(2024), pp. 1-8
Closed Access

Cybersecurity in the Digital Era: A Comprehensive Framework for Safeguarding Data Integrity, Privacy and Critical Infrastructures Against Evolving Threats
Harsh C Vachheta, Ishita Pawar, Ketan Girish Hukare, et al.
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 471-486
Open Access

Page 1

Scroll to top