
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Showing 1-25 of 54 citing articles:
Leveraging AI/ML for anomaly detection, threat prediction, and automated response
Olakunle Abayomi Ajala, Olusegun Abiodun Balogun
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2584-2598
Open Access | Times Cited: 20
Olakunle Abayomi Ajala, Olusegun Abiodun Balogun
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 1, pp. 2584-2598
Open Access | Times Cited: 20
Using Ensemble Learning for Anomaly Detection in Cyber–Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2024) Vol. 13, Iss. 7, pp. 1391-1391
Open Access | Times Cited: 12
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2024) Vol. 13, Iss. 7, pp. 1391-1391
Open Access | Times Cited: 12
THE EVOLUTION OF QUALITY ASSURANCE AND SERVICE IMPROVEMENT IN SATELLITE TELECOMMUNICATIONS THROUGH ANALYTICS: A REVIEW OF INITIATIVES AND THEIR IMPACTS
Nneka Adaobi Ochuba, David Olanrewaju Olutimehin, Olusegun Gbenga Odunaiya, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 1060-1071
Open Access | Times Cited: 11
Nneka Adaobi Ochuba, David Olanrewaju Olutimehin, Olusegun Gbenga Odunaiya, et al.
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 3, pp. 1060-1071
Open Access | Times Cited: 11
Large scale foundation models for intelligent manufacturing applications: a survey
Haotian Zhang, Stuart Dereck Semujju, Zhicheng Wang, et al.
Journal of Intelligent Manufacturing (2025)
Open Access
Haotian Zhang, Stuart Dereck Semujju, Zhicheng Wang, et al.
Journal of Intelligent Manufacturing (2025)
Open Access
Evaluation of the Cyber-Physical System State Under Destructive Impact Conditions Based on a Comprehensive Analysis of Parameters
Anton Mogilny, Elena Basan, Alexey Nekrasov
Robotics (2025) Vol. 14, Iss. 1, pp. 6-6
Open Access
Anton Mogilny, Elena Basan, Alexey Nekrasov
Robotics (2025) Vol. 14, Iss. 1, pp. 6-6
Open Access
Adaptive learning anomaly detection and classification model for cyber and physical threats in industrial control systems
Gabriela Ahmadi‐Assalemi, Haider Al‐Khateeb, Vladlena Benson, et al.
IET Cyber-Physical Systems Theory & Applications (2025) Vol. 10, Iss. 1
Open Access
Gabriela Ahmadi‐Assalemi, Haider Al‐Khateeb, Vladlena Benson, et al.
IET Cyber-Physical Systems Theory & Applications (2025) Vol. 10, Iss. 1
Open Access
A Systematic Literature Review of Current Research Trends in Operational and Related Technology Threats, Threat Detection, and Security Insurance
Nikolaj Goranin, Dainius Čeponis, Antanas Čenys
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2316-2316
Open Access
Nikolaj Goranin, Dainius Čeponis, Antanas Čenys
Applied Sciences (2025) Vol. 15, Iss. 5, pp. 2316-2316
Open Access
Leveraging Meta‐Learning for Enhanced False Data Injection Detection in Smart Grids: The ONF‐ML Approach
Mohammadreza Pourshirazi, Mohsen Simab, Alireza Mirzaee, et al.
IET Renewable Power Generation (2025) Vol. 19, Iss. 1
Open Access
Mohammadreza Pourshirazi, Mohsen Simab, Alireza Mirzaee, et al.
IET Renewable Power Generation (2025) Vol. 19, Iss. 1
Open Access
Optimization of monitoring and early warning technology for mine water disasters using microservices and long short-term memory algorithm
Wei Li, Yang Li, Yaning Zhao, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Wei Li, Yang Li, Yaning Zhao, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Advancements in AI-Based Anomaly Detection for Smart Manufacturing
Md. Rashedul Islam, Fahmid Al Farid
Springer series in advanced manufacturing (2025), pp. 37-68
Closed Access
Md. Rashedul Islam, Fahmid Al Farid
Springer series in advanced manufacturing (2025), pp. 37-68
Closed Access
Treatment of an Unconfirmed Quality According to 8D Using the Problem-Solving Tool (PST) System a Case Study in an International Company
Souad Lahmine, Fatima Bennouna
Journal of Machine Engineering (2025)
Open Access
Souad Lahmine, Fatima Bennouna
Journal of Machine Engineering (2025)
Open Access
Unveiling the Dynamic Landscape of Malware Sandboxing: A Comprehensive Review
Elhaam Abdulrahman Debas, Norah Alhumam, Khaled Riad
(2023)
Open Access | Times Cited: 10
Elhaam Abdulrahman Debas, Norah Alhumam, Khaled Riad
(2023)
Open Access | Times Cited: 10
Leveraging AI/ML for anomaly detection, threat prediction, and automated response.
Olakunle Abayomi Ajala
(2024)
Open Access | Times Cited: 3
Olakunle Abayomi Ajala
(2024)
Open Access | Times Cited: 3
Detecting APT Using Machine Learning: Comparative Performance Analysis With Proposed Model
Rajashree Manjulalayam Rajendran, Bhuman Vyas
SoutheastCon (2024), pp. 1064-1069
Closed Access | Times Cited: 3
Rajashree Manjulalayam Rajendran, Bhuman Vyas
SoutheastCon (2024), pp. 1064-1069
Closed Access | Times Cited: 3
Towards Improved Vulnerability Management in Digital Environments: A Comprehensive Framework for Cyber Security Enhancement
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Ehigiator Egho-Promise, Emmanuel Lyada, Folayo Aina
International Research Journal of Computer Science (2024) Vol. 11, Iss. 05, pp. 441-449
Open Access | Times Cited: 3
Deep Learning-Based Anomaly Detection in Network Traffic for Cyber Threat Identification
Luay Ibrahim Khalaf, Baydaa Al-Hamadani, Omar Ayad Ismael, et al.
(2024), pp. 303-309
Closed Access | Times Cited: 3
Luay Ibrahim Khalaf, Baydaa Al-Hamadani, Omar Ayad Ismael, et al.
(2024), pp. 303-309
Closed Access | Times Cited: 3
A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
M. Wasim Abbas Ashraf, Arvind R. Singh, A. Pandian, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3
Securing the Supply Chain
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
TOWARDS IMPROVED THREAT MITIGATION IN DIGITAL ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR CYBERSECURITY ENHANCEMENT
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Journal of Research -GRANTHAALAYAH (2024) Vol. 12, Iss. 5
Open Access | Times Cited: 2
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Journal of Research -GRANTHAALAYAH (2024) Vol. 12, Iss. 5
Open Access | Times Cited: 2
A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems
Oluwaseun O. Tooki, Olawale Popoola
Renewable energy focus (2024) Vol. 51, pp. 100628-100628
Open Access | Times Cited: 2
Oluwaseun O. Tooki, Olawale Popoola
Renewable energy focus (2024) Vol. 51, pp. 100628-100628
Open Access | Times Cited: 2
Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach
N. Prakash, J. Vignesh, M. Ashwin, et al.
Optical and Quantum Electronics (2023) Vol. 56, Iss. 2
Closed Access | Times Cited: 7
N. Prakash, J. Vignesh, M. Ashwin, et al.
Optical and Quantum Electronics (2023) Vol. 56, Iss. 2
Closed Access | Times Cited: 7
Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks
Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, et al.
(2024), pp. 01-07
Closed Access | Times Cited: 2
Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, et al.
(2024), pp. 01-07
Closed Access | Times Cited: 2
Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2
Next-Generation Threat Detection and Mitigation in 6G Wireless Networks Using IAM, ZTNA and Advanced Security Mechanisms
S. Sankar Ganesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2034-2041
Open Access | Times Cited: 1
S. Sankar Ganesh
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2034-2041
Open Access | Times Cited: 1
The Effectiveness of a Comprehensive threat Mitigation Framework in NETWORKING: A Multi-Layered Approach to Cyber Security
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Research Journal of Computer Science (2024) Vol. 11, Iss. 06, pp. 529-538
Open Access | Times Cited: 1
Hewa Balisane, Ehigiator Egho-Promise, Emmanuel Lyada, et al.
International Research Journal of Computer Science (2024) Vol. 11, Iss. 06, pp. 529-538
Open Access | Times Cited: 1