OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Quantitative Risk Assessment Model for Distribution Cyber-Physical System Under Cyberattack
Song Deng, Zhang Jian-tang, Di Wu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 3, pp. 2899-2908
Closed Access | Times Cited: 22

Showing 22 citing articles:

A Risk Assessment Framework for Cyber-Physical Security in Distribution Grids with Grid-Edge DERs
Xue Gao, Mazhar Ali, Wei Sun
Energies (2024) Vol. 17, Iss. 7, pp. 1587-1587
Open Access | Times Cited: 4

Including insider threats into risk management through Bayesian threat graph networks
Nicola d’Ambrosio, Gaetano Perrone, Simon Pietro Romano
Computers & Security (2023) Vol. 133, pp. 103410-103410
Closed Access | Times Cited: 10

The impact of Fintech innovations on digital currency adoption: a blockchain-based study in India
Puneett Bhatnagr, Anupama Rajesh, Richa Misra
International Journal of Accounting and Information Management (2024)
Closed Access | Times Cited: 3

Cybersecurity challenges across sustainable development goals: A comprehensive review
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 2

A General Real-Time Cyberattack Risk Assessment Method for Distribution Network Involving the Influence of Feeder Automation System
Rong Zeng, Yijia Cao, Yong Li, et al.
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 2, pp. 2102-2115
Closed Access | Times Cited: 4

SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Kaixiang Liu, Yongfang Xie, Shiwen Xie, et al.
Journal of Process Control (2023) Vol. 132, pp. 103131-103131
Closed Access | Times Cited: 4

A Security Evaluation Model for Edge Information Systems Based on Index Screening
Ziyu Guo, Jiahao Qi, Jinxin Zuo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21585-21603
Closed Access | Times Cited: 1

Modeling and Analysis of Risk Propagation and Loss Causing Capacity for Key Nodes in Cyber-Physical Coupled Power Network
Dongqi Liu, Qiong Zhang, Haolan Liang, et al.
Complex System Modeling and Simulation (2024) Vol. 4, Iss. 2, pp. 124-136
Open Access | Times Cited: 1

Stealthy False Data Injection Attacks against the Summation Detector in Cyber-Physical Systems
Yifa Liu, Long Cheng, Dan Ye
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 391-403
Closed Access | Times Cited: 1

Integrated physical safety–cyber security risk assessment based on layers of protection analysis
Feilong Zhang, Jianfeng Yang, Jing Li, et al.
Process Safety and Environmental Protection (2024) Vol. 212, pp. 405-420
Closed Access | Times Cited: 1

Cross-site scripting attack detection based on a modified convolution neural network
Huyong Yan, Li Feng, Yu You, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 6

Convolutional-de-convolutional neural networks for recognition of surgical workflow
Yu‐Wen Chen, Zhang Ju, Peng Wang, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 4

Enhancing power communication network security: A comprehensive cyber risk visual analytics framework with real-time risk assessment
Xiaoli Lin, Yu Yao, Bo Hu, et al.
Sustainable Energy Grids and Networks (2024) Vol. 38, pp. 101325-101325
Closed Access

Designing and Modelling of Switched Reluctance Motor with its Characteristics Analysis
Arun Kumar Maurya, Mohit Kumar Maheshwari, Anurag Gupta
(2024), pp. 1-6
Closed Access

Modeling and risk assessment of cyber physical distribution system based on cyber attack
Jidong Liu, Runze Wu, Chengtao Gao, et al.
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) (2024), pp. 1559-1563
Closed Access

A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
Ying Zhou, Zhiyong Zhang, Kejing Zhao, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109482-109482
Closed Access

A Review on Quantitative Risk Assessment of Cyber-Physical Power Systems for Cyber Attacks
五一 张
Applied Physics (2024) Vol. 14, Iss. 09, pp. 629-639
Closed Access

Improve Robustness of Latent Feature Learning Using Double-Space
Di Wu
SpringerBriefs in computer science (2022), pp. 47-65
Closed Access | Times Cited: 1

Data-characteristic-aware Latent Feature Learning
Di Wu
SpringerBriefs in computer science (2022), pp. 67-83
Closed Access

Generalized Deep Latent Feature Learning
Di Wu
SpringerBriefs in computer science (2022), pp. 97-109
Closed Access

A Stochastic Assessment of Service Loss due to Cyber Vulnerabilities of Power Network Infrastructure: A Case Study of Puerto Rico
Esther Boyle, Stefano Chiaradonna, Petar Jevtić
SSRN Electronic Journal (2022)
Closed Access

Page 1

Scroll to top