
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Quantitative Risk Assessment Model for Distribution Cyber-Physical System Under Cyberattack
Song Deng, Zhang Jian-tang, Di Wu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 3, pp. 2899-2908
Closed Access | Times Cited: 22
Song Deng, Zhang Jian-tang, Di Wu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 3, pp. 2899-2908
Closed Access | Times Cited: 22
Showing 22 citing articles:
A Risk Assessment Framework for Cyber-Physical Security in Distribution Grids with Grid-Edge DERs
Xue Gao, Mazhar Ali, Wei Sun
Energies (2024) Vol. 17, Iss. 7, pp. 1587-1587
Open Access | Times Cited: 4
Xue Gao, Mazhar Ali, Wei Sun
Energies (2024) Vol. 17, Iss. 7, pp. 1587-1587
Open Access | Times Cited: 4
Identification and Vulnerability Assessment of Critical Components in Distribution Networks Under High Penetration Rate Conditions
Liangyu Tang, Yang Han, Siyu Zhou, et al.
Energy (2025), pp. 134864-134864
Closed Access
Liangyu Tang, Yang Han, Siyu Zhou, et al.
Energy (2025), pp. 134864-134864
Closed Access
Including insider threats into risk management through Bayesian threat graph networks
Nicola d’Ambrosio, Gaetano Perrone, Simon Pietro Romano
Computers & Security (2023) Vol. 133, pp. 103410-103410
Closed Access | Times Cited: 10
Nicola d’Ambrosio, Gaetano Perrone, Simon Pietro Romano
Computers & Security (2023) Vol. 133, pp. 103410-103410
Closed Access | Times Cited: 10
The impact of Fintech innovations on digital currency adoption: a blockchain-based study in India
Puneett Bhatnagr, Anupama Rajesh, Richa Misra
International Journal of Accounting and Information Management (2024)
Closed Access | Times Cited: 3
Puneett Bhatnagr, Anupama Rajesh, Richa Misra
International Journal of Accounting and Information Management (2024)
Closed Access | Times Cited: 3
Cybersecurity challenges across sustainable development goals: A comprehensive review
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 2
Nur Nabila Mohamed, Bassam Hossam Hassan Abuobied
Sustainable Engineering and Innovation ISSN 2712-0562 (2024) Vol. 6, Iss. 1, pp. 57-86
Open Access | Times Cited: 2
A General Real-Time Cyberattack Risk Assessment Method for Distribution Network Involving the Influence of Feeder Automation System
Rong Zeng, Yijia Cao, Yong Li, et al.
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 2, pp. 2102-2115
Closed Access | Times Cited: 4
Rong Zeng, Yijia Cao, Yong Li, et al.
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 2, pp. 2102-2115
Closed Access | Times Cited: 4
SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering
Kaixiang Liu, Yongfang Xie, Shiwen Xie, et al.
Journal of Process Control (2023) Vol. 132, pp. 103131-103131
Closed Access | Times Cited: 4
Kaixiang Liu, Yongfang Xie, Shiwen Xie, et al.
Journal of Process Control (2023) Vol. 132, pp. 103131-103131
Closed Access | Times Cited: 4
A Security Evaluation Model for Edge Information Systems Based on Index Screening
Ziyu Guo, Jiahao Qi, Jinxin Zuo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21585-21603
Closed Access | Times Cited: 1
Ziyu Guo, Jiahao Qi, Jinxin Zuo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21585-21603
Closed Access | Times Cited: 1
Modeling and Analysis of Risk Propagation and Loss Causing Capacity for Key Nodes in Cyber-Physical Coupled Power Network
Dongqi Liu, Qiong Zhang, Haolan Liang, et al.
Complex System Modeling and Simulation (2024) Vol. 4, Iss. 2, pp. 124-136
Open Access | Times Cited: 1
Dongqi Liu, Qiong Zhang, Haolan Liang, et al.
Complex System Modeling and Simulation (2024) Vol. 4, Iss. 2, pp. 124-136
Open Access | Times Cited: 1
Stealthy False Data Injection Attacks against the Summation Detector in Cyber-Physical Systems
Yifa Liu, Long Cheng, Dan Ye
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 391-403
Closed Access | Times Cited: 1
Yifa Liu, Long Cheng, Dan Ye
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 391-403
Closed Access | Times Cited: 1
Integrated physical safety–cyber security risk assessment based on layers of protection analysis
Feilong Zhang, Jianfeng Yang, Jing Li, et al.
Process Safety and Environmental Protection (2024) Vol. 212, pp. 405-420
Closed Access | Times Cited: 1
Feilong Zhang, Jianfeng Yang, Jing Li, et al.
Process Safety and Environmental Protection (2024) Vol. 212, pp. 405-420
Closed Access | Times Cited: 1
Cross-site scripting attack detection based on a modified convolution neural network
Huyong Yan, Li Feng, Yu You, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 6
Huyong Yan, Li Feng, Yu You, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 6
Convolutional-de-convolutional neural networks for recognition of surgical workflow
Yu‐Wen Chen, Zhang Ju, Peng Wang, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 4
Yu‐Wen Chen, Zhang Ju, Peng Wang, et al.
Frontiers in Computational Neuroscience (2022) Vol. 16
Open Access | Times Cited: 4
Enhancing power communication network security: A comprehensive cyber risk visual analytics framework with real-time risk assessment
Xiaoli Lin, Yu Yao, Bo Hu, et al.
Sustainable Energy Grids and Networks (2024) Vol. 38, pp. 101325-101325
Closed Access
Xiaoli Lin, Yu Yao, Bo Hu, et al.
Sustainable Energy Grids and Networks (2024) Vol. 38, pp. 101325-101325
Closed Access
Designing and Modelling of Switched Reluctance Motor with its Characteristics Analysis
Arun Kumar Maurya, Mohit Kumar Maheshwari, Anurag Gupta
(2024), pp. 1-6
Closed Access
Arun Kumar Maurya, Mohit Kumar Maheshwari, Anurag Gupta
(2024), pp. 1-6
Closed Access
Modeling and risk assessment of cyber physical distribution system based on cyber attack
Jidong Liu, Runze Wu, Chengtao Gao, et al.
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) (2024), pp. 1559-1563
Closed Access
Jidong Liu, Runze Wu, Chengtao Gao, et al.
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) (2024), pp. 1559-1563
Closed Access
A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph
Ying Zhou, Zhiyong Zhang, Kejing Zhao, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109482-109482
Closed Access
Ying Zhou, Zhiyong Zhang, Kejing Zhao, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109482-109482
Closed Access
A Review on Quantitative Risk Assessment of Cyber-Physical Power Systems for Cyber Attacks
五一 张
Applied Physics (2024) Vol. 14, Iss. 09, pp. 629-639
Closed Access
五一 张
Applied Physics (2024) Vol. 14, Iss. 09, pp. 629-639
Closed Access
Improve Robustness of Latent Feature Learning Using Double-Space
Di Wu
SpringerBriefs in computer science (2022), pp. 47-65
Closed Access | Times Cited: 1
Di Wu
SpringerBriefs in computer science (2022), pp. 47-65
Closed Access | Times Cited: 1
Data-characteristic-aware Latent Feature Learning
Di Wu
SpringerBriefs in computer science (2022), pp. 67-83
Closed Access
Di Wu
SpringerBriefs in computer science (2022), pp. 67-83
Closed Access
Generalized Deep Latent Feature Learning
Di Wu
SpringerBriefs in computer science (2022), pp. 97-109
Closed Access
Di Wu
SpringerBriefs in computer science (2022), pp. 97-109
Closed Access
A Stochastic Assessment of Service Loss due to Cyber Vulnerabilities of Power Network Infrastructure: A Case Study of Puerto Rico
Esther Boyle, Stefano Chiaradonna, Petar Jevtić
SSRN Electronic Journal (2022)
Closed Access
Esther Boyle, Stefano Chiaradonna, Petar Jevtić
SSRN Electronic Journal (2022)
Closed Access