OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A security framework in G-Hadoop for big data computing across distributed Cloud data centres
Jiaqi Zhao, Lizhe Wang, Jie Tao, et al.
Journal of Computer and System Sciences (2014) Vol. 80, Iss. 5, pp. 994-1007
Open Access | Times Cited: 123

Showing 26-50 of 123 citing articles:

Big Data Security: Survey on Frameworks and Algorithms
Sudipta Chandra, Soumya Ray, Radha Tamal Goswami
(2017), pp. 48-54
Closed Access | Times Cited: 26

CRFs based parallel biomedical named entity recognition algorithm employing MapReduce framework
Zhuo Tang, Lingang Jiang, Li Yang, et al.
Cluster Computing (2015) Vol. 18, Iss. 2, pp. 493-505
Closed Access | Times Cited: 25

A study on the author collaboration network in big data*
Yufang Peng, Jin Shi, Marcelo Fantinato, et al.
Information Systems Frontiers (2017) Vol. 19, Iss. 6, pp. 1329-1342
Closed Access | Times Cited: 25

Secure algorithm for cloud computing and its applications
Akshita Bhandari, Ashutosh Gupta, Debasis Das
(2016), pp. 188-192
Closed Access | Times Cited: 23

SEINA: A stealthy and effective internal attack in Hadoop systems
Jiayin Wang, Teng Wang, Zhengyu Yang, et al.
2016 International Conference on Computing, Networking and Communications (ICNC) (2017), pp. 525-530
Closed Access | Times Cited: 24

MOMTH: multi-objective scheduling algorithm of many tasks in Hadoop
Mihaela-Catalina Nita, Florin Pop, Cristiana Voicu, et al.
Cluster Computing (2015) Vol. 18, Iss. 3, pp. 1011-1024
Open Access | Times Cited: 23

Brain big data processing with massively parallel computing technology: challenges and opportunities
Dan Chen, Yangyang Hu, Chang Cai, et al.
Software Practice and Experience (2016) Vol. 47, Iss. 3, pp. 405-420
Closed Access | Times Cited: 22

Scheduling Data-Intensive Workloads in Large-Scale Distributed Systems: Trends and Challenges
Georgios L. Stavrinides, Helen D. Karatza
Studies in big data (2018), pp. 19-43
Closed Access | Times Cited: 22

Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation
Lifeng Yuan, Mingchu Li, Cheng Guo, et al.
PLoS ONE (2016) Vol. 11, Iss. 10, pp. e0165512-e0165512
Open Access | Times Cited: 20

Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS Constraints
Yunliang Chen, Lizhe Wang, Xiaodao Chen, et al.
IEEE Transactions on Cloud Computing (2016) Vol. 8, Iss. 4, pp. 1284-1295
Closed Access | Times Cited: 18

CaACBIM: A Context-aware Access Control Model for BIM
Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, et al.
Information (2019) Vol. 10, Iss. 2, pp. 47-47
Open Access | Times Cited: 18

Stochastic scheduling for variation-aware virtual machine placement in a cloud computing CPS
Yunliang Chen, Xiaodao Chen, Wangyang Liu, et al.
Future Generation Computer Systems (2017) Vol. 105, pp. 779-788
Closed Access | Times Cited: 18

Big Data Security
Fatima-Zahra Benjelloun, Ayoub Ait Lahcen
Advances in information security, privacy, and ethics book series (2015), pp. 301-313
Closed Access | Times Cited: 17

Research on parallelized real-time map matching algorithm for massive GPS data
Hongyu Wang, Jin Li, Zhenshan Hou, et al.
Cluster Computing (2017) Vol. 20, Iss. 2, pp. 1123-1134
Closed Access | Times Cited: 17

Data Privacy Protection Based on Micro Aggregation with Dynamic Sensitive Attribute Updating
Yancheng Shi, Zhenjiang Zhang, Han‐Chieh Chao, et al.
Sensors (2018) Vol. 18, Iss. 7, pp. 2307-2307
Open Access | Times Cited: 16

Big data emerging issues: Hadoop security and privacy
Karim Abouelmehdi, Abderrahim Beni‐Hssane, Hayat Khaloufi, et al.
(2016), pp. 731-736
Closed Access | Times Cited: 15

Towards the Development of Best Data Security for Big Data
Yuan Tian
Communications and Network (2017) Vol. 09, Iss. 04, pp. 291-301
Open Access | Times Cited: 16

Enabling collaborative MapReduce on the Cloud with a single-sign-on mechanism
Jiaqi Zhao, Jie Tao, Achim Streit
Computing (2014) Vol. 98, Iss. 1-2, pp. 55-72
Closed Access | Times Cited: 14

Exploring the Potential of Geospatial Data: An In-Depth Investigation
Emad Mahjoobi, Fatemeh Rafiei
IntechOpen eBooks (2024)
Open Access | Times Cited: 1

Big Data Security
Fatima-Zahra Benjelloun, Ayoub Ait Lahcen
IGI Global eBooks (2018), pp. 25-38
Closed Access | Times Cited: 13

A Review on Big Data Integration
B. Arputhamary, L. Arockiam
International Conference on Advanced Computing (2015), Iss. 5, pp. 21-26
Closed Access | Times Cited: 12

Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
Maocai Wang, Guangming Dai, Kim‐Kwang Raymond Choo, et al.
PLoS ONE (2016) Vol. 11, Iss. 8, pp. e0161857-e0161857
Open Access | Times Cited: 12

SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing
Wei Ren, Ran Liu, Min Lei, et al.
Computer Standards & Interfaces (2016) Vol. 54, pp. 29-35
Closed Access | Times Cited: 12

A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations
Zeyad A. Al-Odat, Eman M. Al-Qtiemat, Samee U. Khan
(2019), pp. 13-18
Closed Access | Times Cited: 11

A data parallel approach to modelling and simulation of large crowd
Tao Yu, Minggang Dou, Mao Zhu
Cluster Computing (2015) Vol. 18, Iss. 3, pp. 1307-1316
Closed Access | Times Cited: 10

Scroll to top