OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, et al.
IEEE Access (2021) Vol. 9, pp. 57792-57807
Open Access | Times Cited: 227

Showing 26-50 of 227 citing articles:

AI-driven job scheduling in cloud computing: a comprehensive review
Yousef Sanjalawe, Salam Al-E’mari, F.M.A. Salam, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 7
Open Access

Fog Computing, Cloud Computing and IoT Environment: Advanced Broker Management System
Mohammed Al Masarweh, Tariq Alwada‘n, Waleed Afandi
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 84-84
Open Access | Times Cited: 21

XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals
Md Saquib Jawed, Mohammad Sajid
Evolving Systems (2022) Vol. 14, Iss. 5, pp. 749-770
Closed Access | Times Cited: 19

To adopt or not to adopt? The determinants of cloud computing adoption in information technology sector
Arooj Hassan, Sabeen Hussain Bhatti, Sobia Shujaat, et al.
Decision Analytics Journal (2022) Vol. 5, pp. 100138-100138
Open Access | Times Cited: 19

Journey from cloud of things to fog of things: Survey, new trends, and research directions
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 19

Influential Characteristics and Benefits of Cloud ERP Adoption in New Zealand SMEs: A Vendors’ Perspective
Sunchai Tongsuksai, Sanjay Mathrani, Kasuni Weerasinghe
IEEE Access (2023) Vol. 11, pp. 23956-23979
Open Access | Times Cited: 11

Cloud Computing Infrastructure, Platforms, and Software for Scientific Research
Prateek Mathur
Series in bioengineering (2024), pp. 89-127
Closed Access | Times Cited: 4

Survey on Secure Scientific Workflow Scheduling in Cloud Environments
Hadeel Amjed Saeed, Sufyan Al-Janabi, Esam Taha Yassen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 51-51
Open Access

Ensuring Data Security in Cloud Computing: A VIKOR-Based Analysis

(2025) Vol. 4, Iss. 3, pp. 33-41
Closed Access

Supply Chain Planning of Agricultural-Products Under Water Scarcity Using Deep Learning
Padmashree Gehl Sampath, A. Jackulin Mahariba, P. Sathiyamurthi, et al.
Iranian Journal of Science and Technology Transactions of Civil Engineering (2025)
Closed Access

A Comprehensive Overview of Privacy and Data Security for Cloud Storage
Nikhat Akhtar, Bedine Kerim, Yusuf Perwej, et al.
International Journal of Scientific Research in Science Engineering and Technology (2021), pp. 113-152
Open Access | Times Cited: 26

Comprehensive review on intelligent security defences in cloud: Taxonomy, security issues, ML/DL techniques, challenges and future trends
Mohamad Mulham Belal, Divya Meena Sundaram
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 10, pp. 9102-9131
Open Access | Times Cited: 16

Embracing Digital Technologies in the Pharmaceutical Industry
Reza Ebrahimi Hariry, Reza Vatankhah Barenji
(2023), pp. 141-165
Closed Access | Times Cited: 9

Determining factors affecting Filipino consumers’ behavioral intention to use cloud storage services: An extended technology acceptance model integrating valence framework
Gerlyn Calica Altes, Ardvin Kester S. Ong, Josephine D. German
Heliyon (2024) Vol. 10, Iss. 4, pp. e26447-e26447
Open Access | Times Cited: 3

Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard
Mayank Pathak, Kamta Nath Mishra, Satya P. Singh
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 3

The cloud sovereignty nexus: How the European Union seeks to reverse strategic dependencies in its digital ecosystem
Filippo Gualtiero Blancato
Policy & Internet (2023) Vol. 16, Iss. 1, pp. 12-32
Open Access | Times Cited: 8

Towards a sustainable future: developing a cybersecurity framework for manufacturing
Adel Alqudhaibi, S. P. Deshpande, Sandeep Jagtap, et al.
Technological Sustainability (2023) Vol. 2, Iss. 4, pp. 372-387
Open Access | Times Cited: 7

Paving the Path to a Sustainable Digital Future With Green Cloud Computing
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, et al.
Advances in computer and electrical engineering book series (2024), pp. 44-66
Closed Access | Times Cited: 2

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Sina Ahmadi
Journal of Information Security (2024) Vol. 15, Iss. 02, pp. 148-167
Open Access | Times Cited: 2

Cybersecurity Strategies for Safe ERP/CRM Implementation
Pratiksha Agarwal, Arun Kumar Gupta
(2024), pp. 1-6
Closed Access | Times Cited: 2

Intelligent Manufacturing in Aerospace: Integrating Industry 4.0 Technologies for Operational Excellence and Digital Transformation
Vineet Bhatia, Sumati Sidharth, Sanjeev Kumar Khare, et al.
Springer series in advanced manufacturing (2024), pp. 389-434
Closed Access | Times Cited: 2



3C TIC Cuadernos de desarrollo aplicados a las TIC (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 12

Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems
Mohammed K. S. Alwaheidi, Shareeful Islam
Sensors (2022) Vol. 22, Iss. 15, pp. 5726-5726
Open Access | Times Cited: 11

PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud
John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron Acquah, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-17
Open Access | Times Cited: 6

Innovación y Transformación Digital en el Empresa
Marco Antonio Nolasco-Mamani, Sam Michael Espinoza Vidaurre, Roger Eduardo Choque-Salcedo
Deleted Journal (2023)
Open Access | Times Cited: 6

Scroll to top