
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cloud Security Threats and Solutions: A Survey
Umer Ahmed Butt, Rashid Amin, Muhammad Mehmood, et al.
Wireless Personal Communications (2022) Vol. 128, Iss. 1, pp. 387-413
Closed Access | Times Cited: 50
Umer Ahmed Butt, Rashid Amin, Muhammad Mehmood, et al.
Wireless Personal Communications (2022) Vol. 128, Iss. 1, pp. 387-413
Closed Access | Times Cited: 50
Showing 26-50 of 50 citing articles:
Fortifying Data Security in the Evolving Digital Landscape
Naman Srivastava, Harshita Sharma, Akshita Maliyal, et al.
Advances in library and information science (ALIS) book series (2024), pp. 209-232
Closed Access
Naman Srivastava, Harshita Sharma, Akshita Maliyal, et al.
Advances in library and information science (ALIS) book series (2024), pp. 209-232
Closed Access
Improving fault tolerance in LinuX container-based distributed systems using blockchain
Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5285-5294
Closed Access
Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5285-5294
Closed Access
Cloud Cryptography
R. Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan
Advances in computer and electrical engineering book series (2024), pp. 84-104
Closed Access
R. Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan
Advances in computer and electrical engineering book series (2024), pp. 84-104
Closed Access
Breached But Not Broken: How Attributional Information Shapes Shareholder Reactions to Firms Following Data Breaches
Xinran Wang, Jiaju Yan, Timothy P. Munyon, et al.
Corporate Reputation Review (2024) Vol. 28, Iss. 1, pp. 71-92
Closed Access
Xinran Wang, Jiaju Yan, Timothy P. Munyon, et al.
Corporate Reputation Review (2024) Vol. 28, Iss. 1, pp. 71-92
Closed Access
Magneto-optical fiber-based orbital angular momentum mode converters
G. Chen, Baojian Wu, Qiquan Wang, et al.
Applied Optics (2024) Vol. 63, Iss. 10, pp. 2469-2469
Closed Access
G. Chen, Baojian Wu, Qiquan Wang, et al.
Applied Optics (2024) Vol. 63, Iss. 10, pp. 2469-2469
Closed Access
Intelligence Agencies’ move to the Cloud: Challenges and Opportunities
Karin Säberg, Gazmend Huskaj
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 565-573
Open Access
Karin Säberg, Gazmend Huskaj
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 565-573
Open Access
A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
R. Julian Menezes, P. Jesu Jayarin, A. Chandrasekar
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
A coding computation scheme for secure aggregation
Ze Yang, Youliang Tian
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102073-102073
Open Access
Ze Yang, Youliang Tian
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102073-102073
Open Access
An Invisible Backdoor Attack on Cloud Computing in the Internet of Things
Xiangyun Qian, Rui Zhang, Zi Kang, et al.
(2024), pp. 101-106
Closed Access
Xiangyun Qian, Rui Zhang, Zi Kang, et al.
(2024), pp. 101-106
Closed Access
Cyber threats to the Private Academic Cloud
Valeriy Lakhno, Бахытжан Ахметов, Olena Kryvoruchko, et al.
International Journal of Electronics and Telecommunications (2024), pp. 413-420
Open Access
Valeriy Lakhno, Бахытжан Ахметов, Olena Kryvoruchko, et al.
International Journal of Electronics and Telecommunications (2024), pp. 413-420
Open Access
A Cloud-Edge Collaborative System for Object Detection Based on KubeEdge
Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, et al.
(2024), pp. 248-253
Closed Access
Yifan Pei, Peiyan Yuan, Xiaoyan Zhao, et al.
(2024), pp. 248-253
Closed Access
Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms
Ali Alhchaimi
Wasit Journal of Computer and Mathematics Science (2024) Vol. 3, Iss. 2, pp. 19-31
Open Access
Ali Alhchaimi
Wasit Journal of Computer and Mathematics Science (2024) Vol. 3, Iss. 2, pp. 19-31
Open Access
Advancing Intrusion Detection Precision Through Analysis of Diverse Classification Algorithms
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access
Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things
Zia Ullah, Ghassan Husnain, Muhammad Ismail Mohmand, et al.
IET Communications (2024)
Open Access
Zia Ullah, Ghassan Husnain, Muhammad Ismail Mohmand, et al.
IET Communications (2024)
Open Access
Loopholes in Security Implementation of Cloud and IoT Environment: Case Study of a Recent Security Incident
T. N. Nisha, Ambarish Mukharjee, Shubham Saxena
Lecture notes in networks and systems (2024), pp. 215-226
Closed Access
T. N. Nisha, Ambarish Mukharjee, Shubham Saxena
Lecture notes in networks and systems (2024), pp. 215-226
Closed Access
System Construction of Artificial Intelligence Dependent Cloud Service Mode based on Deep Learning Core Algorithms
WU Yan-hong
(2024), pp. 1-7
Closed Access
WU Yan-hong
(2024), pp. 1-7
Closed Access
A Virtual Cryptographic Card Resource Sharing Method Based on Lottery Scheduling Optimization Algorithm
Yi Gao, Daoyu Wang, Jing Xia, et al.
(2024), pp. 278-285
Closed Access
Yi Gao, Daoyu Wang, Jing Xia, et al.
(2024), pp. 278-285
Closed Access
SecureCloud: A Shield Against Virtual Threats
M V Rakshitha, K. Chitra
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 153-156
Open Access
M V Rakshitha, K. Chitra
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 153-156
Open Access
Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access
Qifei Zhou, Na Ren, Changqing Zhu
Symmetry (2024) Vol. 16, Iss. 12, pp. 1626-1626
Open Access
Improve the Security of Cloud Computing to Enhance Network Security
Shirmohammad Tavangari, Somayeh Taghavi Kulfati, Aref Yelghi
(2023)
Open Access | Times Cited: 1
Shirmohammad Tavangari, Somayeh Taghavi Kulfati, Aref Yelghi
(2023)
Open Access | Times Cited: 1
Security Issues in Cloud-based IoT Systems
Rahma Berchi, Lemia Louail, Sarra Cherbal
(2023), pp. 1-8
Closed Access | Times Cited: 1
Rahma Berchi, Lemia Louail, Sarra Cherbal
(2023), pp. 1-8
Closed Access | Times Cited: 1
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
Imran Khan, Anwar Ghani, Syed Muhammad Saqlain, et al.
IEEE Access (2023) Vol. 11, pp. 144560-144573
Open Access | Times Cited: 1
Imran Khan, Anwar Ghani, Syed Muhammad Saqlain, et al.
IEEE Access (2023) Vol. 11, pp. 144560-144573
Open Access | Times Cited: 1
An Information-Theoretically Secure Method to Encrypt One-Time Pads Utilizing Cellular Automata
G. Kumaresan
(2023), pp. 1-8
Closed Access
G. Kumaresan
(2023), pp. 1-8
Closed Access
SECURITY ISSUES AND SOLUTION MECHANISMS IN CLOUD COMPUTING SYSTEMS: A REVIEW
Rashid Alakbarov
Problems of Information Technology (2023) Vol. 14, Iss. 2, pp. 12-22
Open Access
Rashid Alakbarov
Problems of Information Technology (2023) Vol. 14, Iss. 2, pp. 12-22
Open Access
Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment
Ashish Gupta, Shreya Sinha, Harsh Kumar Singh, et al.
(2023), pp. 433-442
Closed Access
Ashish Gupta, Shreya Sinha, Harsh Kumar Singh, et al.
(2023), pp. 433-442
Closed Access