
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cognitive systems and bio-inspired computing in homeland security
Lidia Ogiela, Marek R. Ogiela
Journal of Network and Computer Applications (2013) Vol. 38, pp. 34-42
Closed Access | Times Cited: 42
Lidia Ogiela, Marek R. Ogiela
Journal of Network and Computer Applications (2013) Vol. 38, pp. 34-42
Closed Access | Times Cited: 42
Showing 26-50 of 42 citing articles:
Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms
Baojiang Cui, Peilin Shi, Wei-kong Qi, et al.
Future Generation Computer Systems (2016) Vol. 67, pp. 276-285
Closed Access | Times Cited: 4
Baojiang Cui, Peilin Shi, Wei-kong Qi, et al.
Future Generation Computer Systems (2016) Vol. 67, pp. 276-285
Closed Access | Times Cited: 4
A PSO FPGA based architecture to optimize constrained functions
Leonardo Moraes, Dionne Cavalcante Monteiro, Daniel Leal Souza, et al.
(2016), pp. 463-468
Closed Access | Times Cited: 4
Leonardo Moraes, Dionne Cavalcante Monteiro, Daniel Leal Souza, et al.
(2016), pp. 463-468
Closed Access | Times Cited: 4
Advanced technologies for homeland defense and security
Ilsun You, Marek R. Ogiela, A Min Tjoa, et al.
Journal of Network and Computer Applications (2014) Vol. 38, pp. 1-2
Closed Access | Times Cited: 4
Ilsun You, Marek R. Ogiela, A Min Tjoa, et al.
Journal of Network and Computer Applications (2014) Vol. 38, pp. 1-2
Closed Access | Times Cited: 4
Information Security in Intelligent Data Management Processes
Lidia Ogiela, Urszula Ogiela
(2015), pp. 169-172
Closed Access | Times Cited: 4
Lidia Ogiela, Urszula Ogiela
(2015), pp. 169-172
Closed Access | Times Cited: 4
Visual pattern embedding in multi-secret image steganography
Marek R. Ogiela, Katarzyna Koptyra
(2015), pp. 434-437
Closed Access | Times Cited: 4
Marek R. Ogiela, Katarzyna Koptyra
(2015), pp. 434-437
Closed Access | Times Cited: 4
Cognitive gravitation model-based relative transformation for classification
Yaxin Sun, Guihua Wen
Soft Computing (2016) Vol. 21, Iss. 18, pp. 5425-5441
Closed Access | Times Cited: 3
Yaxin Sun, Guihua Wen
Soft Computing (2016) Vol. 21, Iss. 18, pp. 5425-5441
Closed Access | Times Cited: 3
TARD: Temporary Access Rights Delegation for guest network devices
Joonghwan Lee, Jae Woo Seo, Hoon Ko, et al.
Journal of Computer and System Sciences (2016) Vol. 86, pp. 59-69
Open Access | Times Cited: 2
Joonghwan Lee, Jae Woo Seo, Hoon Ko, et al.
Journal of Computer and System Sciences (2016) Vol. 86, pp. 59-69
Open Access | Times Cited: 2
Knowledge Management Approaches for Data Understanding
Lidia Ogiela, Marek R. Ogiela
(2016), pp. 270-273
Closed Access | Times Cited: 2
Lidia Ogiela, Marek R. Ogiela
(2016), pp. 270-273
Closed Access | Times Cited: 2
Bio-inspired Algorithms in Data Management Processes
Lidia Ogiela, Marek R. Ogiela
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (2015) Vol. 38, pp. 368-371
Closed Access | Times Cited: 2
Lidia Ogiela, Marek R. Ogiela
2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) (2015) Vol. 38, pp. 368-371
Closed Access | Times Cited: 2
Personalized Cryptography in Data Sharing and Management
Marek R. Ogiela, Lidia Ogiela
(2015), pp. 269-272
Closed Access | Times Cited: 2
Marek R. Ogiela, Lidia Ogiela
(2015), pp. 269-272
Closed Access | Times Cited: 2
Biometric Extensions for Secret Sharing Protocols
Lidia Ogiela, Marek R. Ogiela
(2015)
Closed Access | Times Cited: 1
Lidia Ogiela, Marek R. Ogiela
(2015)
Closed Access | Times Cited: 1
Application of Personalized Cryptography in Cloud Environment
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2016), pp. 253-257
Closed Access | Times Cited: 1
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2016), pp. 253-257
Closed Access | Times Cited: 1
Personal Information in Strategic Data Sharing and Communication Protocols
Lidia Ogiela, Marek R. Ogiela
Lecture Notes on Information Theory (2015) Vol. 3, Iss. 2
Closed Access
Lidia Ogiela, Marek R. Ogiela
Lecture Notes on Information Theory (2015) Vol. 3, Iss. 2
Closed Access
Medical Image Analysis by Cognitive Information Systems – a Review
Lidia Ogiela, Makoto Takizawa
Journal of Medical Systems (2016) Vol. 40, Iss. 10
Closed Access
Lidia Ogiela, Makoto Takizawa
Journal of Medical Systems (2016) Vol. 40, Iss. 10
Closed Access
Comparison of Biometric and Linguistic Secret Sharing Protocols
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
Lecture notes on data engineering and communications technologies (2016), pp. 501-505
Closed Access
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
Lecture notes on data engineering and communications technologies (2016), pp. 501-505
Closed Access
Cognitive Information Systems in Pervasive Computing and Management Application
Marek R. Ogiela, Lidia Ogiela
International Journal of Knowledge Engineering (2015) Vol. 1, Iss. 3, pp. 236-239
Closed Access
Marek R. Ogiela, Lidia Ogiela
International Journal of Knowledge Engineering (2015) Vol. 1, Iss. 3, pp. 236-239
Closed Access