OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses
Akm Iqridar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 61

Showing 26-50 of 61 citing articles:

A Multilayer Proposal to a Smart Home Applied to Healthcare
José Reinaldo Silva, E C Macedo, Yaney Gomez Correa, et al.
Polytechnica (2021) Vol. 4, Iss. 1, pp. 1-14
Closed Access | Times Cited: 9

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 8

Rebirth of Distributed AI—A Review of eHealth Research
Manzoor Ahmed Khan, Najla Alkaabi
Sensors (2021) Vol. 21, Iss. 15, pp. 4999-4999
Open Access | Times Cited: 8

An Efficient Fog-Based Attack Detection Using Ensemble of MOA-WMA for Internet of Medical Things
Shilan S. Hameed, Wan Haslina Hassan, Liza Abdul Latiff
Lecture notes on data engineering and communications technologies (2021), pp. 774-785
Closed Access | Times Cited: 7

Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems
Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Hossain Shahriar
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2021), pp. 504-513
Closed Access | Times Cited: 7

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
Mwrwan Abubakar, Zakwan Jaroucheh, Ahmed Al Dubai, et al.
(2021), pp. 1-7
Open Access | Times Cited: 6

Privacy Preservation Models for the Independent Data Release of High-Dimensional Datasets
Surapon Riyana
Research Square (Research Square) (2023)
Closed Access | Times Cited: 2

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5

Healthcare Security: Usage of Generative Models for Malware Adversarial Attacks and Defense
Shymala Gowri Selvaganapathy, G. Sudha Sadasivam
Lecture notes in networks and systems (2021), pp. 885-897
Closed Access | Times Cited: 5

Classification of Security Attacks in Healthcare and associated Cyber-harms
Mohammad Aijaz, Mohammed Nazir, Malik Nadeem Anwar
(2021), pp. 166-173
Closed Access | Times Cited: 5

Consortium Blockchain for Reliable Remote Health Monitoring
Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield
Research Square (Research Square) (2024)
Open Access

Navigating blockchain-based clinical data sharing: An interoperability review
Virinder Kumar Singla, Amardeep Singh, Gurjit Singh Bhathal
CRC Press eBooks (2024), pp. 402-408
Open Access

ПІДВИЩЕННЯ КІБЕРБЕЗПЕКИ ЕЛЕКТРОННИХ КОМУНІКАЦІЙНИХ СИСТЕМ МЕДИЧНОГО ПРИЗНАЧЕННЯ
Олександр САФАРОВ, В. І. Корнієнко, В’ячеслав ГОРЄВ, et al.
Information Technology Computer Science Software Engineering and Cyber Security (2024), Iss. 2, pp. 128-133
Open Access

Exploring the Landscape of Ubiquitous In-home Health Monitoring: A Comprehensive Survey
Farhad Pourpanah, Ali Etemad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 1

TOTAL QUALITY MANAGEMENT ON PERFORMANCE OF ELECTRONIC CLAIMS SYSTEMS IN MEDICAL INSURANCE FIRMS IN KENYA: A CASE OF NATIONAL HEALTH INSURANCE FUND, KENYA
LAURA ECHULET, LUCY KIRIMA, MOSES OWINO, et al.
Strategic Journal of Business & Change Management (2023) Vol. 10, Iss. 3
Open Access | Times Cited: 1

BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
Muhammed Ali Yurdagul, Hüsrev Taha Sencar
(2021), pp. 214-220
Open Access | Times Cited: 3

Issues and Solution Techniques for IoT Security and Privacy - A Survey
G Sripriyanka, Anand Mahendran
International Journal of Computing and Digital Systems (2022) Vol. 12, Iss. 4, pp. 909-928
Open Access | Times Cited: 2

DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems
Md Hasan Shahriar, Mohammad Ashiqur Rahman, Nur Imtiazul Haque, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2021), pp. 725-734
Closed Access | Times Cited: 2

Specifics of Communication Organization and Attacks on Medical Cyber-physical Devices
M. A. Poltavtseva, Anna N. Kharitonova, D. S. Lavrova
(2021), pp. 1-4
Closed Access | Times Cited: 2

Integrating an optimised PUF-based authentication scheme in OSCORE
Jaime Pérez Díaz, Florina Almenares
Ad Hoc Networks (2022) Vol. 140, pp. 103038-103038
Closed Access | Times Cited: 1

المنهجية البرمجية لتحسين عمليات تطوير أنظمة الرعاية الصحية
د.عبدالعزيز احمد ثوابة, أ.م.د.عزيز الأزهر الرملي, أ.م.د محمد فرحان محمد فودزي
المجلة العلمية - جامعة إقليم سبأ (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 1

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems.
Javier Franco, Ahmet Arış, Berk Canberk, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 1

Scroll to top