OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network
Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1008-1025
Closed Access | Times Cited: 10

Showing 10 citing articles:

CANAttack: Assessing Vulnerabilities within Controller Area Network
Damilola Oladimeji, Amar Rasheed, Cihan Varol, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8223-8223
Open Access | Times Cited: 11

MTDCAP: Moving Target Defense-Based CAN Authentication Protocol
Heng Sun, Huibiao Su, Jian Weng, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12800-12817
Closed Access | Times Cited: 4

Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity
Pierpaolo Dini, Sergio Saponara
Sensors (2023) Vol. 23, Iss. 22, pp. 9231-9231
Open Access | Times Cited: 10

Decentralized switching-type adaptive event-triggered-based non-recursive control for interconnected cyber-physical systems against multiple cyber attacks
Haibin Sun, Yahui Cui, Linlin Hou, et al.
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 350-361
Closed Access | Times Cited: 2

IoT based Real Time Anomaly Detection in Automotive ECUs Using Machine Learning
Rahul Biswas, P.K. Samanta, Bishnu Prasad De, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1

Table of Content

IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 1, pp. C1-C4
Open Access

Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning
Nuri Alperen Kose, Razaq Jinad, Amar Rasheed, et al.
Sensors (2024) Vol. 24, Iss. 3, pp. 983-983
Open Access

Nussbaum-Based Adaptive Neural Networks Tracking Control for Nonlinear PDE-ODE Systems Subject to Deception Attacks
Lei Wan, Huaguang Zhang, Jiayue Sun, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 10, pp. 6193-6202
Closed Access

Stochastic Event-Triggered Feedback Physical Watermarks Against Replay Attacks
Xudong Zhao, Wei Xing, Xinyu Wang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 12, Iss. 2, pp. 814-822
Closed Access

Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms
Amar Rasheed, Mohamed Baza, Mohammad S. Khan, et al.
2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC) (2023), pp. 76-82
Closed Access | Times Cited: 1

Page 1

Scroll to top