
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity Testing for Automotive Domain: A Survey
Feng Luo, Xuan Zhang, Zhenyu Yang, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9211-9211
Open Access | Times Cited: 15
Feng Luo, Xuan Zhang, Zhenyu Yang, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9211-9211
Open Access | Times Cited: 15
Showing 15 citing articles:
MaCySTe: A virtual testbed for maritime cybersecurity
Giacomo Longo, Alessandro Orlich, Stefano Musante, et al.
SoftwareX (2023) Vol. 23, pp. 101426-101426
Open Access | Times Cited: 18
Giacomo Longo, Alessandro Orlich, Stefano Musante, et al.
SoftwareX (2023) Vol. 23, pp. 101426-101426
Open Access | Times Cited: 18
Cybersecurity of Automotive Wired Networking Systems: Evolution, Challenges, and Countermeasures
Nicasio Canino, Pierpaolo Dini, Stefano Mazzetti, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 471-471
Open Access
Nicasio Canino, Pierpaolo Dini, Stefano Mazzetti, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 471-471
Open Access
Reverse Engineering-Guided Fuzzing for CAN Bus Vulnerability Detection
Manu Jo Varghese, Frank Jiang, Jeremy Bryans, et al.
Lecture notes in computer science (2025), pp. 219-230
Closed Access
Manu Jo Varghese, Frank Jiang, Jeremy Bryans, et al.
Lecture notes in computer science (2025), pp. 219-230
Closed Access
Intrusion Detection Systems in Automotive Ethernet Networks: Challenges, Opportunities and Future Research Trends
Nordine Quadar, Abdellah Chehri, Benoît Debaque, et al.
IEEE Internet of Things Magazine (2024) Vol. 7, Iss. 2, pp. 62-68
Closed Access | Times Cited: 3
Nordine Quadar, Abdellah Chehri, Benoît Debaque, et al.
IEEE Internet of Things Magazine (2024) Vol. 7, Iss. 2, pp. 62-68
Closed Access | Times Cited: 3
Formal Methods and Validation Techniques for Ensuring Automotive Systems Security
Moez Krichen
Information (2023) Vol. 14, Iss. 12, pp. 666-666
Open Access | Times Cited: 7
Moez Krichen
Information (2023) Vol. 14, Iss. 12, pp. 666-666
Open Access | Times Cited: 7
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles
Meriem Benyahya, Teri Lenard, Anastasija Collen, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Open Access | Times Cited: 6
Meriem Benyahya, Teri Lenard, Anastasija Collen, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Open Access | Times Cited: 6
Survey of Model-Based Security Testing Approaches in the Automotive Domain
Florian Sommer, Reiner Kriesten, Frank Kargl
IEEE Access (2023) Vol. 11, pp. 55474-55514
Open Access | Times Cited: 5
Florian Sommer, Reiner Kriesten, Frank Kargl
IEEE Access (2023) Vol. 11, pp. 55474-55514
Open Access | Times Cited: 5
Penetration Testing of In-Vehicle Infotainment Systems in Connected Vehicles
Hannah Wieser, Thomas Schäfer, Christoph Krauß
(2024), pp. 156-163
Closed Access | Times Cited: 1
Hannah Wieser, Thomas Schäfer, Christoph Krauß
(2024), pp. 156-163
Closed Access | Times Cited: 1
Introduction to the Special Issue on Automotive CPS Safety & Security: Part 2
Samarjit Chakraborty, Somesh Jha, Soheil Samii, et al.
ACM Transactions on Cyber-Physical Systems (2024) Vol. 8, Iss. 2, pp. 1-17
Closed Access
Samarjit Chakraborty, Somesh Jha, Soheil Samii, et al.
ACM Transactions on Cyber-Physical Systems (2024) Vol. 8, Iss. 2, pp. 1-17
Closed Access
Exploring Smart Contracts based on Web 3.0 Applications with respect to Vulnerability Detection Mechanisms
M Govindaraj, Neethu Tressa, Muhammad Suraquatu, et al.
(2024), pp. 1-6
Closed Access
M Govindaraj, Neethu Tressa, Muhammad Suraquatu, et al.
(2024), pp. 1-6
Closed Access
Fostering Cyber Resilience in Europe: An In-Depth Exploration of the Cyber Resilience Act
Christoph Schmittner, Omar Veledar, Thomas Faschang, et al.
Communications in computer and information science (2024), pp. 390-404
Closed Access
Christoph Schmittner, Omar Veledar, Thomas Faschang, et al.
Communications in computer and information science (2024), pp. 390-404
Closed Access
GNSS Threat Identification and Mitigation, Cyber-Security aspects in Automotive Scenarios
Carmine Giannì, Rosario Francesco Giordano, Gregorio Pitolli, et al.
(2023), pp. 127-131
Closed Access | Times Cited: 1
Carmine Giannì, Rosario Francesco Giordano, Gregorio Pitolli, et al.
(2023), pp. 127-131
Closed Access | Times Cited: 1
An Open Software-Based Framework for Automotive Cybersecurity Testing
Thomas Faschang, Georg Macher
Communications in computer and information science (2023), pp. 316-328
Closed Access | Times Cited: 1
Thomas Faschang, Georg Macher
Communications in computer and information science (2023), pp. 316-328
Closed Access | Times Cited: 1
A Global Survey of Standardization and Industry Practices of Automotive Cybersecurity Validation and Verification Testing Processes and Tools
Andrew D. Roberts, Stefan Marksteiner, Müjdat Soytürk, et al.
SAE International Journal of Connected and Automated Vehicles (2023) Vol. 7, Iss. 2
Closed Access
Andrew D. Roberts, Stefan Marksteiner, Müjdat Soytürk, et al.
SAE International Journal of Connected and Automated Vehicles (2023) Vol. 7, Iss. 2
Closed Access