OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage
Shahnawaz Ahmad, Shabana Mehfuz, Javed Beg
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 23
Closed Access | Times Cited: 18

Showing 18 citing articles:

Efficient time-oriented latency-based secure data encryption for cloud storage
Shahnawaz Ahmad, Shabana Mehfuz
Cyber Security and Applications (2023) Vol. 2, pp. 100027-100027
Open Access | Times Cited: 21

Multilayer multivariate forecasting network for precise resource utilization prediction in edge data centers
Shivani Tripathi, Priyadarshni Priyadarshni, Rajiv Misra, et al.
Future Generation Computer Systems (2025) Vol. 166, pp. 107692-107692
Closed Access

An Enhanced Encryption Scheme for IoT‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

A Consistent Augmented Stacking Polynomial Optimized Tool (ASPOT) for Improving Security of Cloud-IoT Systems
Divya Ramachandran, R. Chithambaramani, S. Sankar Ganesh, et al.
Journal of Advanced Research in Applied Sciences and Engineering Technology (2024) Vol. 37, Iss. 1, pp. 16-36
Open Access | Times Cited: 2

Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies
Justin Onyarin Ogala, Shahnawaz Ahmad, Iman Shakeel, et al.
SN Computer Science (2023) Vol. 4, Iss. 5
Closed Access | Times Cited: 6

A novel method for effective intrusion detection based on convolutional speaking neural networks
Ying Xie, Hong Chen
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101975-101975
Open Access | Times Cited: 1

Personalized Collaborative Search Engine for Decision Making
Mohd. Murshleen, Ajith Prabhu, Garima Jain
(2024), pp. 202-206
Closed Access | Times Cited: 1

A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection
Yongxing Lin, Xiaoyan Xu, Hongyun Xu
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13333-13352
Closed Access

Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing
Varun Garg -, Bikrampal Kaur, Surender Jangra
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 23
Closed Access

Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks
Ling Xiong, Qiang Li, Lele Tang, et al.
Future Generation Computer Systems (2024), pp. 107530-107530
Closed Access

Decentralizing ride-sharing: a blockchain-based application with smart contract automation and performance analysis
Madhusudan Naik, Akhilendra Pratap Singh, Nihar Ranjan Pradhan
Multimedia Tools and Applications (2024)
Closed Access

Privacy-preserving and verifiable convolution neural network inference and training in cloud computing
Wei Cao, Wenting Shen, Jing Qin, et al.
Future Generation Computer Systems (2024), pp. 107560-107560
Closed Access

LEVERAGING AI IN CLOUD COMPUTING TO ENHANCE NANO GRID OPERATIONS AND PERFORMANCE IN AGRICULTURE
Kruti Sutariya, C Menaka, Mohammad Shahid, et al.
Sustainable Computing Informatics and Systems (2024) Vol. 46, pp. 101075-101075
Closed Access

Deployment of ML Techniques for Optimization of Energy in Residential & Commercial Structures: A Review
Prerna Mahajan, Priya Dahiya, Rimpi Upadhyay
(2024), pp. 1112-1115
Closed Access

Integrating fully homomorphic encryption to enhance the security of blockchain applications
Xiaohua Wu, Jing Wang, Tingbo Zhang
Future Generation Computer Systems (2024) Vol. 161, pp. 467-477
Closed Access

Influence of AI and MAS in Enhancing Energy Efficiency of 6G Communications
Divya Negi, Febin Prakash, Anjali Gupta
(2024), pp. 234-238
Closed Access

An IoT Based Framework for Monitoring Power Consumption in Smart Grids
R. M. Raghavendra, Nidhi Chauhan, Gaurav Mittal
(2024), pp. 229-233
Closed Access

OIDS: A Smart Framework for Intrusion Detection in 5G WSN’s by using Ontology
Sover Singh Bisht, Anuj Singh Rajput, Sanjeev Kumar Mandal
(2023), pp. 991-995
Closed Access | Times Cited: 1

Page 1

Scroll to top