
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art
Yehia Ibrahim Alzoubi, Valmira Osmanaj, Ashraf Jaradat, et al.
Security and Privacy (2020) Vol. 4, Iss. 2
Closed Access | Times Cited: 83
Yehia Ibrahim Alzoubi, Valmira Osmanaj, Ashraf Jaradat, et al.
Security and Privacy (2020) Vol. 4, Iss. 2
Closed Access | Times Cited: 83
Showing 1-25 of 83 citing articles:
Blockchain technology applications in waste management: Overview, challenges and opportunities
Peng Jiang, Lei Zhang, Siming You, et al.
Journal of Cleaner Production (2023) Vol. 421, pp. 138466-138466
Closed Access | Times Cited: 72
Peng Jiang, Lei Zhang, Siming You, et al.
Journal of Cleaner Production (2023) Vol. 421, pp. 138466-138466
Closed Access | Times Cited: 72
Offloading Mechanisms Based on Reinforcement Learning and Deep Learning Algorithms in the Fog Computing Environment
Dezheen H. Abdulazeez, Shavan Askar
IEEE Access (2023) Vol. 11, pp. 12555-12586
Open Access | Times Cited: 43
Dezheen H. Abdulazeez, Shavan Askar
IEEE Access (2023) Vol. 11, pp. 12555-12586
Open Access | Times Cited: 43
Attributes impacting cybersecurity policy development: An evidence from seven nations
Alok Mishra, Yehia Ibrahim Alzoubi, Memoona J. Anwar, et al.
Computers & Security (2022) Vol. 120, pp. 102820-102820
Open Access | Times Cited: 65
Alok Mishra, Yehia Ibrahim Alzoubi, Memoona J. Anwar, et al.
Computers & Security (2022) Vol. 120, pp. 102820-102820
Open Access | Times Cited: 65
Mobile cloud computing models security issues: A systematic review
Ahmad Al‐Ahmad, Hasan Kahtan, Yehia Ibrahim Alzoubi, et al.
Journal of Network and Computer Applications (2021) Vol. 190, pp. 103152-103152
Closed Access | Times Cited: 63
Ahmad Al‐Ahmad, Hasan Kahtan, Yehia Ibrahim Alzoubi, et al.
Journal of Network and Computer Applications (2021) Vol. 190, pp. 103152-103152
Closed Access | Times Cited: 63
Blockchain technology as a Fog computing security and privacy solution: An overview
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Hasan Kahtan
Computer Communications (2021) Vol. 182, pp. 129-152
Closed Access | Times Cited: 59
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Hasan Kahtan
Computer Communications (2021) Vol. 182, pp. 129-152
Closed Access | Times Cited: 59
Cybersecurity Enterprises Policies: A Comparative Study
Alok Mishra, Yehia Ibrahim Alzoubi, Asif Qumer Gill, et al.
Sensors (2022) Vol. 22, Iss. 2, pp. 538-538
Open Access | Times Cited: 45
Alok Mishra, Yehia Ibrahim Alzoubi, Asif Qumer Gill, et al.
Sensors (2022) Vol. 22, Iss. 2, pp. 538-538
Open Access | Times Cited: 45
Green blockchain – A move towards sustainability
Yehia Ibrahim Alzoubi, Alok Mishra
Journal of Cleaner Production (2023) Vol. 430, pp. 139541-139541
Open Access | Times Cited: 41
Yehia Ibrahim Alzoubi, Alok Mishra
Journal of Cleaner Production (2023) Vol. 430, pp. 139541-139541
Open Access | Times Cited: 41
Detecting IoT Attacks Using an Ensemble Machine Learning Model
Vikas Tomer, Sachin Sharma
Future Internet (2022) Vol. 14, Iss. 4, pp. 102-102
Open Access | Times Cited: 38
Vikas Tomer, Sachin Sharma
Future Internet (2022) Vol. 14, Iss. 4, pp. 102-102
Open Access | Times Cited: 38
Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Hasan Kahtan, et al.
Future Internet (2022) Vol. 14, Iss. 7, pp. 216-216
Open Access | Times Cited: 38
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Hasan Kahtan, et al.
Future Internet (2022) Vol. 14, Iss. 7, pp. 216-216
Open Access | Times Cited: 38
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends
Yao Zhao, Youyang Qu, Yong Xiang, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-34
Open Access | Times Cited: 8
Yao Zhao, Youyang Qu, Yong Xiang, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 1, pp. 1-34
Open Access | Times Cited: 8
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues
Yehia Ibrahim Alzoubi, Asif Qumer Gill, Alok Mishra
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 35
Yehia Ibrahim Alzoubi, Asif Qumer Gill, Alok Mishra
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 35
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 18
Bandar Alotaibi
Sensors (2023) Vol. 23, Iss. 17, pp. 7470-7470
Open Access | Times Cited: 18
Fog Intelligence for Secure Smart Villages: Architecture and Future Challenges
Ahamed Aljuhani, Prabhat Kumar, Randhir Kumar, et al.
IEEE Consumer Electronics Magazine (2022) Vol. 12, Iss. 5, pp. 12-21
Open Access | Times Cited: 22
Ahamed Aljuhani, Prabhat Kumar, Randhir Kumar, et al.
IEEE Consumer Electronics Magazine (2022) Vol. 12, Iss. 5, pp. 12-21
Open Access | Times Cited: 22
Financial Risk Assessment Model Based on Fuzzy Logic
Xiuqiong Yang Xiuqiong Yang
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 192-205
Open Access | Times Cited: 5
Xiuqiong Yang Xiuqiong Yang
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 192-205
Open Access | Times Cited: 5
Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Ashraf Jaradat
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2021) Vol. 11, Iss. 6, pp. 5081-5081
Open Access | Times Cited: 30
Yehia Ibrahim Alzoubi, Ahmad Al‐Ahmad, Ashraf Jaradat
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2021) Vol. 11, Iss. 6, pp. 5081-5081
Open Access | Times Cited: 30
Journey from cloud of things to fog of things: Survey, new trends, and research directions
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 20
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 20
The factors influenced by stakeholder identification in E-learning systems: A survey
Duha Awad H. Elneel, Hasan Kahtan, Abdul Sahli Fakharudin, et al.
Journal of King Saud University - Science (2023) Vol. 35, Iss. 3, pp. 102566-102566
Open Access | Times Cited: 12
Duha Awad H. Elneel, Hasan Kahtan, Abdul Sahli Fakharudin, et al.
Journal of King Saud University - Science (2023) Vol. 35, Iss. 3, pp. 102566-102566
Open Access | Times Cited: 12
Edge intelligence secure frameworks: Current state and future challenges
Esther Villar-Rodríguez, María Arostegi, Ana I. Torre-Bastida, et al.
Computers & Security (2023) Vol. 130, pp. 103278-103278
Open Access | Times Cited: 12
Esther Villar-Rodríguez, María Arostegi, Ana I. Torre-Bastida, et al.
Computers & Security (2023) Vol. 130, pp. 103278-103278
Open Access | Times Cited: 12
Survey of energy-efficient fog computing: Techniques and recent advances
Mohammed H. AlSharif, Abu Jahid, Raju Kannadasan, et al.
Energy Reports (2025) Vol. 13, pp. 1739-1763
Closed Access
Mohammed H. AlSharif, Abu Jahid, Raju Kannadasan, et al.
Energy Reports (2025) Vol. 13, pp. 1739-1763
Closed Access
Elevating e-health excellence with IOTA distributed ledger technology: Sustaining data integrity in next-gen fog-driven systems
Waqas Ahmed, Waseem Iqbal, Ammar Hassan, et al.
Future Generation Computer Systems (2025), pp. 107755-107755
Open Access
Waqas Ahmed, Waseem Iqbal, Ammar Hassan, et al.
Future Generation Computer Systems (2025), pp. 107755-107755
Open Access
Scalable Lightweight Privacy Scheme for SDN-Based Fog-IoT Networks
Eman O. Attia, Hala A. Mansour, Shimaa S. Ali, et al.
Lecture notes in networks and systems (2025), pp. 588-603
Closed Access
Eman O. Attia, Hala A. Mansour, Shimaa S. Ali, et al.
Lecture notes in networks and systems (2025), pp. 588-603
Closed Access
Security and Privacy in IoT, Fog, and Blockchain Networks
Nikhil Kumar Goyal
Advances in environmental engineering and green technologies book series (2025), pp. 371-398
Closed Access
Nikhil Kumar Goyal
Advances in environmental engineering and green technologies book series (2025), pp. 371-398
Closed Access
A metric focused performance assessment of fog computing environments: A critical review
Sugandha Rathi, Renuka Nagpal, Deepti Mehrotra, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108350-108350
Closed Access | Times Cited: 17
Sugandha Rathi, Renuka Nagpal, Deepti Mehrotra, et al.
Computers & Electrical Engineering (2022) Vol. 103, pp. 108350-108350
Closed Access | Times Cited: 17
LAMAS: Lightweight anonymous mutual authentication scheme for securing fog computing environments
Mariam Hamada, Sameh A. Salem, Fatty M. Salem
Ain Shams Engineering Journal (2022) Vol. 13, Iss. 6, pp. 101752-101752
Open Access | Times Cited: 16
Mariam Hamada, Sameh A. Salem, Fatty M. Salem
Ain Shams Engineering Journal (2022) Vol. 13, Iss. 6, pp. 101752-101752
Open Access | Times Cited: 16