OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies
Mary Nankya, Robin Chataut, Robert Akl
Sensors (2023) Vol. 23, Iss. 21, pp. 8840-8840
Open Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

6G Networks and the AI Revolution—Exploring Technologies, Applications, and Emerging Challenges
Robin Chataut, Mary Nankya, Robert Akl
Sensors (2024) Vol. 24, Iss. 6, pp. 1888-1888
Open Access | Times Cited: 33

Optimizing renewable energy systems through artificial intelligence: Review and future prospects
Kingsley Ukoba, Kehinde O. Olatunji, Eyitayo Adeoye, et al.
Energy & Environment (2024) Vol. 35, Iss. 7, pp. 3833-3879
Open Access | Times Cited: 30

Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering
Nanyeneke Ravana Mayeke, Aisha Temitope Arigbabu, Oluwaseun Oladeji Olaniyi, et al.
Asian Journal of Research in Computer Science (2024) Vol. 17, Iss. 5, pp. 108-124
Open Access | Times Cited: 21

Analyzing anomalies in industrial networks: A data-driven approach to enhance security in manufacturing processes
Karel Kuchař, Radek Fujdiak
Computers & Security (2025) Vol. 153, pp. 104395-104395
Closed Access

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4

CGAAD: Centrality- and Graph-Aware Deep-Learning Model for Detecting Cyberattacks Targeting Industrial Control Systems in Critical Infrastructure
Thuraya N.I. Alrumaih, Mohammed J. F. Alenazi
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24162-24182
Closed Access | Times Cited: 3

Cutting-Edge AI Approaches with MAS for PdM in Industry 4.0: Challenges and Future Directions
Shadia Yahya Baroud
Journal of Applied Data Sciences (2024) Vol. 5, Iss. 2, pp. 455-473
Open Access | Times Cited: 3

Network Traffic Visualization Coupled With Convolutional Neural Networks for Enhanced IoT Botnet Detection
David Arnold, M. Gromov, Jafar Saniie
IEEE Access (2024) Vol. 12, pp. 73547-73560
Open Access | Times Cited: 3

Research on the integrated solution of physical education based on smart campus
Xingli Hu, LI Jiang-tao
AJP Advances in Physiology Education (2024) Vol. 48, Iss. 2, pp. 378-384
Closed Access | Times Cited: 2

Optimizing the Steering of Driverless Personal Mobility Pods with a Novel Differential Harris Hawks Optimization Algorithm (DHHO) and Encoder Modeling
Mohamed Reda, Ahmed Onsy, Amira Y. Haikal, et al.
Sensors (2024) Vol. 24, Iss. 14, pp. 4650-4650
Open Access | Times Cited: 2

Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and Education
Salaheddin Hosseinzadeh, Dionysios Voutos, D. Barrie, et al.
Sensors (2024) Vol. 24, Iss. 12, pp. 3923-3923
Open Access | Times Cited: 1

Cybersecurity Challenges and Solutions in Industry 4.0, Telematics and Smart Cities
M. Zajicek, Tomáš Tichý, Zdeněk Lokaj, et al.
(2024) Vol. 7, pp. 1-7
Closed Access

Research and Verification of Motion System on EtherNet/IP Carried by 5G Non-Public Network
Bin Shen, Youyang Zhu, Jinyu Zhu, et al.
(2024) Vol. 23, pp. 413-418
Closed Access

Deep learning and ensemble methods for anomaly detection in ICS security
Md. Alamgir Hossain, Tahmid Hasan, Vincent Karovic, et al.
International Journal of Information Technology (2024)
Closed Access

Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
Seyed Mohammad Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
International Journal of Critical Infrastructure Protection (2024), pp. 100729-100729
Closed Access

Modern SCADA for CSP Systems Based on OPC UA, Wi-Fi Mesh Networks, and Open-Source Software
Jose A. Carballo, Javier Bonilla, Jesús Fernández‐Reche, et al.
Energies (2024) Vol. 17, Iss. 24, pp. 6284-6284
Open Access

Exploring ICS/SCADA Network Vulnerabilities
Hala Strohmier, Aaryan R. Londhe, Chris A. Clark, et al.
Lecture notes in computer science (2024), pp. 215-233
Closed Access

Enhancing IoT Security through Machine Learning-Driven Anomaly Detection
Usama Tahir, Muhammad Kamran Abid, Muhammad Fuzail, et al.
VFAST Transactions on Software Engineering (2024) Vol. 12, Iss. 2, pp. 01-13
Open Access

Explainable Intrusion Detection in Industrial Control Systems
Reham Eltomy, Wassila Lalouani
(2024), pp. 1-8
Closed Access

Abnormal behavior detection in industrial control systems based on CNN
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access

Security Considerations in Generative AI for Web Applications
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access

Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats
Dojin Yoo, Seunghuk Lee, Sherry X. Yang, et al.
Applied Sciences (2024) Vol. 14, Iss. 22, pp. 10342-10342
Open Access

Security Challenges and Solutions in IoT
Salah El Hajla, El Mahfoud Ennaji, Yassine Maleh, et al.
Advances in computational intelligence and robotics book series (2024), pp. 25-50
Closed Access

Page 1 - Next Page

Scroll to top