OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cloud Security Threats and Solutions: A Survey
Umer Ahmed Butt, Rashid Amin, Muhammad Mehmood, et al.
Wireless Personal Communications (2022) Vol. 128, Iss. 1, pp. 387-413
Closed Access | Times Cited: 50

Showing 26-50 of 50 citing articles:

Fortifying Data Security in the Evolving Digital Landscape
Naman Srivastava, Harshita Sharma, Akshita Maliyal, et al.
Advances in library and information science (ALIS) book series (2024), pp. 209-232
Closed Access

Improving fault tolerance in LinuX container-based distributed systems using blockchain
Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5285-5294
Closed Access

Cloud Cryptography
R. Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan
Advances in computer and electrical engineering book series (2024), pp. 84-104
Closed Access

Breached But Not Broken: How Attributional Information Shapes Shareholder Reactions to Firms Following Data Breaches
Xinran Wang, Jiaju Yan, Timothy P. Munyon, et al.
Corporate Reputation Review (2024) Vol. 28, Iss. 1, pp. 71-92
Closed Access

Magneto-optical fiber-based orbital angular momentum mode converters
G. Chen, Baojian Wu, Qiquan Wang, et al.
Applied Optics (2024) Vol. 63, Iss. 10, pp. 2469-2469
Closed Access

Intelligence Agencies’ move to the Cloud: Challenges and Opportunities
Karin Säberg, Gazmend Huskaj
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 565-573
Open Access

A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access

A coding computation scheme for secure aggregation
Ze Yang, Youliang Tian
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102073-102073
Open Access

An Invisible Backdoor Attack on Cloud Computing in the Internet of Things
Xiangyun Qian, Rui Zhang, Zi Kang, et al.
(2024), pp. 101-106
Closed Access

Cyber threats to the Private Academic Cloud
Valeriy Lakhno, Бахытжан Ахметов, Olena Kryvoruchko, et al.
International Journal of Electronics and Telecommunications (2024), pp. 413-420
Open Access

A Cloud-Edge Collaborative System for Object Detection Based on KubeEdge
Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, et al.
(2024), pp. 248-253
Closed Access

Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Ali Alhchaimi
Wasit Journal of Computer and Mathematics Science (2024) Vol. 3, Iss. 2, pp. 19-31
Open Access

Advancing Intrusion Detection Precision Through Analysis of Diverse Classification Algorithms
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access

Loopholes in Security Implementation of Cloud and IoT Environment: Case Study of a Recent Security Incident
T. N. Nisha, Ambarish Mukharjee, Shubham Saxena
Lecture notes in networks and systems (2024), pp. 215-226
Closed Access

A Virtual Cryptographic Card Resource Sharing Method Based on Lottery Scheduling Optimization Algorithm
Yi Gao, Daoyu Wang, Jing Xia, et al.
(2024), pp. 278-285
Closed Access

SecureCloud: A Shield Against Virtual Threats
M V Rakshitha, K. Chitra
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 153-156
Open Access

Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access

Improve the Security of Cloud Computing to Enhance Network Security
Shirmohammad Tavangari, Somayeh Taghavi Kulfati, Aref Yelghi
(2023)
Open Access | Times Cited: 1

Security Issues in Cloud-based IoT Systems
Rahma Berchi, Lemia Louail, Sarra Cherbal
(2023), pp. 1-8
Closed Access | Times Cited: 1

Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
Imran Khan, Anwar Ghani, Syed Muhammad Saqlain, et al.
IEEE Access (2023) Vol. 11, pp. 144560-144573
Open Access | Times Cited: 1

SECURITY ISSUES AND SOLUTION MECHANISMS IN CLOUD COMPUTING SYSTEMS: A REVIEW
Rashid Alakbarov
Problems of Information Technology (2023) Vol. 14, Iss. 2, pp. 12-22
Open Access

Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment
Ashish Gupta, Shreya Sinha, Harsh Kumar Singh, et al.
(2023), pp. 433-442
Closed Access

Previous Page - Page 2

Scroll to top