
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 45
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 45
Showing 26-50 of 45 citing articles:
Enhancing Industrial Control System Security: An Isolation Forest-based Anomaly Detection Model for Mitigating Cyber Threats
Md. Saif Mahmud, Md Ashikul Islam, Md. Maruf Rahman, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 3, pp. 161-173
Open Access | Times Cited: 1
Md. Saif Mahmud, Md Ashikul Islam, Md. Maruf Rahman, et al.
Journal of Engineering Research and Reports (2024) Vol. 26, Iss. 3, pp. 161-173
Open Access | Times Cited: 1
BDPM: A secure batch dynamic password management scheme in industrial internet environments
Jingyu Feng, Rui Yan, Gang Han, et al.
Future Generation Computer Systems (2024) Vol. 157, pp. 193-209
Closed Access | Times Cited: 1
Jingyu Feng, Rui Yan, Gang Han, et al.
Future Generation Computer Systems (2024) Vol. 157, pp. 193-209
Closed Access | Times Cited: 1
Towards a Supervised Machine Learning Algorithm for Cyberattacks Detection and Prevention in a Smart Grid Cybersecurity System
Takudzwa Vincent Banda, Dewald Blaauw, Bruce W. Watson
Communications in computer and information science (2024), pp. 107-128
Closed Access | Times Cited: 1
Takudzwa Vincent Banda, Dewald Blaauw, Bruce W. Watson
Communications in computer and information science (2024), pp. 107-128
Closed Access | Times Cited: 1
Exploration of Quantum Cryptography Security Applications for Industrial Control Systems
Hengyu Li, Yun Dong, Yusheng Zhang, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access | Times Cited: 1
Hengyu Li, Yun Dong, Yusheng Zhang, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access | Times Cited: 1
A Safe and Reliable Bayesian Spiking Neural Network in Industrial Control Systems
Tala Talaei Khoei, Naima Kaabouch
(2024), pp. 1-7
Closed Access | Times Cited: 1
Tala Talaei Khoei, Naima Kaabouch
(2024), pp. 1-7
Closed Access | Times Cited: 1
Cyber Security for Cyber-Physical Systems in Critical Infrastructures: Bibliometrics Analysis and Future Directions
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1
Mahdad Pourmadadkar, Marianna Lezzi, Angelo Corallo
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 15405-15421
Closed Access | Times Cited: 1
Radiant: Reactive Autoencoder Defense for Industrial Adversarial Network Threats
Irfan Khan, Syed Wali, Yasir Ali Farrukh
(2023)
Closed Access | Times Cited: 2
Irfan Khan, Syed Wali, Yasir Ali Farrukh
(2023)
Closed Access | Times Cited: 2
Gopalakrishnan, Shreevanth; Tuptuk, Nilufer; Hailes, Stephen; (2023) Machine Learning-based Intrusion Detection Systems: Deployment Guidelines for Industry
About Petras
(2024)
Open Access
About Petras
(2024)
Open Access
CIDF:Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP
Jianwen Xiang, Xue-min Zhang, Qianrong Zheng, et al.
(2024), pp. 417-426
Closed Access
Jianwen Xiang, Xue-min Zhang, Qianrong Zheng, et al.
(2024), pp. 417-426
Closed Access
Abnormal behavior detection in industrial control systems based on CNN
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
Jingzhao Chen, Bin Liu, Haowen Zuo
Alexandria Engineering Journal (2024) Vol. 107, pp. 643-651
Closed Access
Multichain Blockchain Solutions for Ensuring Trust and Transparency in IoT Healthcare Environment
Atul Kumar, Kalpna Guleria, Ishu Sharma, et al.
(2024), pp. 1314-1318
Closed Access
Atul Kumar, Kalpna Guleria, Ishu Sharma, et al.
(2024), pp. 1314-1318
Closed Access
SIRT: A Distinctive and Smart Invasion Recognition Tool (SIRT) for Defending IoT Integrated ICS from Cyber-Attacks
M.S. Kavitha, G. Sumathy, B. Sarala, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 47, pp. 100720-100720
Closed Access
M.S. Kavitha, G. Sumathy, B. Sarala, et al.
International Journal of Critical Infrastructure Protection (2024) Vol. 47, pp. 100720-100720
Closed Access
Prediction of Industrial Cyber Attacks Using Normalizing Flows
V. P. Stepashkina, M. I. Hushchyn
Doklady Mathematics (2024) Vol. 110, Iss. S1, pp. S95-S102
Closed Access
V. P. Stepashkina, M. I. Hushchyn
Doklady Mathematics (2024) Vol. 110, Iss. S1, pp. S95-S102
Closed Access
A Reinforcement-Learning-based Agent to discover Safety-Critical States in Smart Grid Environments
Alessandro Santorsola, Antonio Maci, Piero Delvecchio, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1
Alessandro Santorsola, Antonio Maci, Piero Delvecchio, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1
USING MACHINE LEARNING METHODS FOR INDUSTRIAL CONTROL SYSTEMS INTRUSION DETECTION
Ramiz Shikhaliyev
Problems of Information Technology (2023) Vol. 14, Iss. 2, pp. 37-48
Open Access | Times Cited: 1
Ramiz Shikhaliyev
Problems of Information Technology (2023) Vol. 14, Iss. 2, pp. 37-48
Open Access | Times Cited: 1
Double-Optimized CS-BP Anomaly Prediction for Control Operation Data
Ming Wan, Xueqing Liu, Li Yang
Lecture notes in computer science (2023), pp. 509-523
Closed Access | Times Cited: 1
Ming Wan, Xueqing Liu, Li Yang
Lecture notes in computer science (2023), pp. 509-523
Closed Access | Times Cited: 1
Editorial: AI meets cybersecurity
Giuseppina Andresini, Annalisa Appice
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 277-279
Open Access | Times Cited: 1
Giuseppina Andresini, Annalisa Appice
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 277-279
Open Access | Times Cited: 1
Threat Attribution and Reasoning for Industrial Control System Asset
Shuqin Zhang, Peiyu Shi, Tianhui Du, et al.
International Journal of Ambient Computing and Intelligence (2023) Vol. 15, Iss. 1, pp. 1-27
Open Access
Shuqin Zhang, Peiyu Shi, Tianhui Du, et al.
International Journal of Ambient Computing and Intelligence (2023) Vol. 15, Iss. 1, pp. 1-27
Open Access
Real-Time Threat Detection in Critical Infrastructure with Machine Learning and Industrial Control System Data
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access
Atul Kumar, Ishu Sharma
(2023), pp. 1-6
Closed Access