OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges
Abigail Koay, Ryan K. L. Ko, Hinne Hettema, et al.
Journal of Intelligent Information Systems (2022) Vol. 60, Iss. 2, pp. 377-405
Open Access | Times Cited: 45

Showing 1-25 of 45 citing articles:

A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 56

Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 33

Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Iqbal H. Sarker, Helge Janicke, Mohamed Amine Ferrag, et al.
Internet of Things (2024) Vol. 25, pp. 101110-101110
Open Access | Times Cited: 20

A review on effective alarm management systems for industrial process control: Barriers and opportunities
Faizan E Mustafa, Ijaz Ahmed, Abdul Basit, et al.
International Journal of Critical Infrastructure Protection (2023) Vol. 41, pp. 100599-100599
Closed Access | Times Cited: 32

A comprehensive review of machine learning's role in enhancing network security and threat detection
Akoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, et al.
World Journal of Advanced Research and Reviews (2024) Vol. 21, Iss. 2, pp. 877-886
Open Access | Times Cited: 11

Transforming Cybersecurity into Critical Energy Infrastructure: A Study on the Effectiveness of Artificial Intelligence
Jaime Govea, Walter Gaibor-Naranjo, William Villegas-Ch
Systems (2024) Vol. 12, Iss. 5, pp. 165-165
Open Access | Times Cited: 11

A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics
Zibo Wang, Yaofang Zhang, Yilu Chen, et al.
Processes (2023) Vol. 11, Iss. 3, pp. 918-918
Open Access | Times Cited: 19

A novel approach for software defect prediction using CNN and GRU based on SMOTE Tomek method
Nasraldeen Alnor Adam Khleel, Károly Nehéz
Journal of Intelligent Information Systems (2023) Vol. 60, Iss. 3, pp. 673-707
Open Access | Times Cited: 18

Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition
Shuaiyi Lu, Kai Wang, Liren Zhang, et al.
Pattern Recognition (2023) Vol. 141, pp. 109661-109661
Closed Access | Times Cited: 13

Securing Smart Grid Data With Blockchain and Wireless Sensor Networks: A Collaborative Approach
Saleh Almasabi, Ahmad Shaf, Tariq Ali, et al.
IEEE Access (2024) Vol. 12, pp. 19181-19198
Open Access | Times Cited: 5

An Exploratory Analysis of Effect of Adversarial Machine Learning Attack on IoT-enabled Industrial Control Systems
Sandeep Trivedi, Tien Anh Tran, Nuruzzaman Faruqui, et al.
(2023)
Closed Access | Times Cited: 11

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4

Analyzing anomalies in industrial networks: A data-driven approach to enhance security in manufacturing processes
Karel Kuchař, Radek Fujdiak
Computers & Security (2025) Vol. 153, pp. 104395-104395
Closed Access

RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats
Irfan Khan, Syed Wali, Yasir Ali Farrukh
Computers & Security (2025), pp. 104403-104403
Closed Access

CYBER INFRASTRUCTURE GUIDE: IT/OT INTEGRATION
Mustafa Bilgehan İmamoğlu
Ömer Halisdemir Üniversitesi İktisadi ve İdari Bilimler Fakültesi Dergisi (2025) Vol. 18, Iss. 1, pp. 378-391
Open Access

Anomaly Detection Method Considering PLC Control Logic Structure for ICS Cyber Threat Detection
Ju Hyeon Lee, Il Hwan Ji, Seungho Jeon, et al.
Applied Sciences (2025) Vol. 15, Iss. 7, pp. 3507-3507
Open Access

Enhancing cybersecurity of nonlinear processes via a two-layer control architecture
Arthur Khodaverdian, Dhruv Gohil, Panagiotis D. Christofides
Digital Chemical Engineering (2025), pp. 100233-100233
Open Access

LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Multi-Scale Feature Fusion-Based Real-Time Anomaly Detection in Industrial Control Systems
Lin Xu, Ke Shang, Xiaohan Zhang, et al.
Electronics (2025) Vol. 14, Iss. 8, pp. 1645-1645
Open Access

Security of Programmable Logic Controllers and Related Systems: Today and Tomorrow
Wael Alsabbagh, Peter Langendörfer
IEEE Open Journal of the Industrial Electronics Society (2023) Vol. 4, pp. 659-693
Open Access | Times Cited: 10

A black-box adversarial attack on demand side management
Eike Cramer, Ji Gao
Computers & Chemical Engineering (2024) Vol. 186, pp. 108681-108681
Open Access | Times Cited: 3

Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN
Yuchen Huang, J L Liu, Xuanyi Xiang, et al.
Sensors (2024) Vol. 24, Iss. 17, pp. 5518-5518
Open Access | Times Cited: 2

Deep learning and ensemble methods for anomaly detection in ICS security
Md. Alamgir Hossain, Tahmid Hasan, Vincent Karovic, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2

Cyberbiosecurity Workforce Preparation
Samson Adeoye, Heather Lindberg, Bathurst Bagby, et al.
NACTA Journal (2024) Vol. 67, Iss. 1
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top