OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems
Abdullah Algarni
IEEE Access (2019) Vol. 7, pp. 101879-101894
Open Access | Times Cited: 87

Showing 26-50 of 87 citing articles:

Wireless Technology Security and Privacy: A Comprehensive Study
Hamza Azam, M. Tan, Lim Tik Pin, et al.
(2023)
Open Access | Times Cited: 20

Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective
Kanneboina Ashok, S. Gopikrishnan
IEEE Access (2023) Vol. 11, pp. 2621-2651
Open Access | Times Cited: 18

Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar
IEEE Access (2020) Vol. 8, pp. 150081-150112
Open Access | Times Cited: 45

Insights into security and privacy issues in smart healthcare systems based on medical images
Fei Yan, Nianqiao Li, Abdullah M. Iliyasu, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103621-103621
Open Access | Times Cited: 14

IoMT-driven smart healthcare
Arun Kumar Dey, Govind P. Gupta
Elsevier eBooks (2025), pp. 149-160
Closed Access

Securing IoMT‐Based Healthcare System
Ashok Kumar, Rahul Gupta, Sunil Kumar, et al.
(2025), pp. 17-56
Closed Access

Intelligent sensors for smart healthcare
Asadullah Shaikh, Darakhshan Syed, Mana Saleh Al Reshan, et al.
Elsevier eBooks (2025), pp. 347-361
Closed Access

A secure healthcare data transmission based on synchronization of fractional order chaotic systems
Nur Afiqah Suzelan Amir, Fatin Nabila Abd Latiff, Kok Bin Wong, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2665-e2665
Open Access

Wireless sensor networks for secure smart cities
Behrang Chaboki, Fakhrosadat Fanian, Marjan Kuchaki Rafsanjani
Elsevier eBooks (2025), pp. 407-423
Closed Access

A user-adaptive privacy-preserving authentication of IoMT using zero knowledge proofs with ECC
Garima Misra, Bramah Hazela, Brijesh Kumar Chaurasia
Multimedia Tools and Applications (2025)
Closed Access

AI for Cyber-Security in E-Health Ensuring Security and Privacy of Patient Data and Information
Bhupinder Singh, Christian Kaunert, Anjali Raghav, et al.
Advances in computational intelligence and robotics book series (2025), pp. 293-314
Closed Access

Health–Related ICT Solutions of Smart Environments for Elderly–Systematic Review
Petra Marešová, Ondřej Krejcar, Sabina Baraković, et al.
IEEE Access (2020) Vol. 8, pp. 54574-54600
Open Access | Times Cited: 35

Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions
Mahmoud Abbasi, Marta Plaza-Hernández, Javier Prieto, et al.
IEEE Access (2022) Vol. 10, pp. 97197-97216
Open Access | Times Cited: 21

Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme
Nur Fadhilah Mohd Shari, Amizah Malip
Internet of Things (2024) Vol. 27, pp. 101256-101256
Closed Access | Times Cited: 3

An intelligent hybrid classification model for heart disease detection using imbalanced electrocardiogram signals
Shwet Ketu, Pramod Kumar Mishra
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 4286-4308
Closed Access | Times Cited: 8

Zero Knowledge based Authentication for Internet of Medical Things
Garima Misha, Bramah Hazela, Brijesh Kumar Chaurasia
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-6
Closed Access | Times Cited: 8

Security of IoT Application Layer: Requirements, Threats, and Solutions
Mahmoud Abbasi, Marta Plaza-Hernández, Yeray Mezquita
Lecture notes in networks and systems (2023), pp. 86-100
Closed Access | Times Cited: 6

Analysis of Privacy-Preserving Edge Computing and Internet of Things Models in Healthcare Domain
Naif Almusallam, Abdulatif Alabdulatif, Fawaz Khaled Alarfaj
Computational and Mathematical Methods in Medicine (2021) Vol. 2021, pp. 1-6
Open Access | Times Cited: 13

RETRACTED ARTICLE: Implementation of enhanced blowfish algorithm in cloud environment
Venkata Koti Reddy Gangireddy, K. Srihari, Karthik Subburathinam
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 3, pp. 3999-4005
Closed Access | Times Cited: 13

AI Enabled Internet of Medical Things Framework for Smart Healthcare
Jyoti Srivastava, Sidheswar Routray
Communications in computer and information science (2022), pp. 30-46
Closed Access | Times Cited: 8

Internet of Things and Machine Learning for Smart Healthcare
Cristiano André da Costa, Felipe André Zeiser, Rodrigo da Rosa Righi, et al.
Studies in computational intelligence (2024), pp. 95-133
Closed Access | Times Cited: 1

Threat Modeling and Assessment Methods in the Healthcare-IT System: A Critical Review and Systematic Evaluation
Mohammad Aijaz, Mohammed Nazir, Malik Nadeem Anwar Mohammad
SN Computer Science (2023) Vol. 4, Iss. 6
Closed Access | Times Cited: 4

Smart Healthcare at Home in the Era of IoMT
Qian Qu, Han Sun, Yu Chen
IntechOpen eBooks (2023)
Open Access | Times Cited: 4

5G-Based Smart Healthcare and Mobile Network Security: Combating Fake Base Stations
I‐Hsien Liu, Meng-Huan Lee, Hsiao-Ching Huang, et al.
Applied Sciences (2023) Vol. 13, Iss. 20, pp. 11565-11565
Open Access | Times Cited: 4

IoT Attacks Countermeasures: Systematic Review and Future Research Direction
Joshua Teddy Ibibo
(2024), pp. 95-111
Closed Access | Times Cited: 1

Scroll to top