OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects
Muhammad Muzamil Aslam, Ali Tufail, Ki‐Hyung Kim, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7999-7999
Open Access | Times Cited: 12

Showing 12 citing articles:

Advances in machine learning and IoT for water quality monitoring: A comprehensive review
Ismail Essamlali, Hasna Nhaila, Mohamed El Khaïli
Heliyon (2024) Vol. 10, Iss. 6, pp. e27920-e27920
Open Access | Times Cited: 38

Predicting Future Cybercrime Trends in the Metaverse Era
Wasswa Shafik
Advances in digital crime, forensics, and cyber terrorism book series (2023), pp. 78-113
Closed Access | Times Cited: 19

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 5

Empowering water security: the synergy of automation and IoT integration
Neha Mumtaz, Tabish Izhar, Jazbi Izhar, et al.
Elsevier eBooks (2025), pp. 135-156
Closed Access

Modern Water Treatment and Technological Solutions
Aseem Saxena, Durga Prasad Panday, Manish Kumar
(2025), pp. 225-234
Closed Access

Breaking the flow and the bank: Stealthy cyberattacks on water network hydraulics
Abdallah Alalem Albustami, Ahmad F. Taha
Water Research (2025) Vol. 283, pp. 123719-123719
Closed Access

Cyber Security in Cyber Physical Systems
Muhammad Muzamil Aslam, Sajid Ali, Haji Gul, et al.
Advances in information security, privacy, and ethics book series (2025), pp. 149-180
Closed Access

An improved autoencoder-based approach for anomaly detection in industrial control systems
Muhammad Muzamil Aslam, Ali Tufail, Liyanage C. De Silva, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 2

ICS Deployment Optimization with Time Delay Reduction and Energy-Efficiency in IWSNs
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access | Times Cited: 1

Supply Chain Challenges in Wartime: LLC “Raben Ukraine” Key Study
Antoniia Bieliatynska, Kristina Čižiūnienė, Іryna Кlymenko, et al.
Studies in systems, decision and control (2024), pp. 433-483
Closed Access | Times Cited: 1

Optimizing Safety In IoT Water Plants: From Critical Importance To Innovative Solutions
Aicha Aiche, Pierre-Martin Tardif, Mohammed Erritali, et al.
(2024), pp. 378-384
Closed Access

Towards Enhanced Industry 4.0 Security: Intrusion Detection Systems and Machine Learning Applications in IIoT
Lahcen Idouglid, Said Tkatek, Khalid El Fayq, et al.
Lecture notes in information systems and organisation (2024), pp. 207-215
Closed Access

Page 1

Scroll to top