
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
Ahlem Hamdi, Lamia Chaari Fourati, Samiha Ayed
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 713-757
Closed Access | Times Cited: 8
Ahlem Hamdi, Lamia Chaari Fourati, Samiha Ayed
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 713-757
Closed Access | Times Cited: 8
Showing 8 citing articles:
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
Ahmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed M. Fakhrudeen
Computer Networks (2023) Vol. 239, pp. 110140-110140
Closed Access | Times Cited: 14
A secure and privacy preserving model for healthcare applications based on blockchain-layered architecture
Adla Sanober, Shamama Anwar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 12, pp. 1206-1218
Closed Access | Times Cited: 2
Adla Sanober, Shamama Anwar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 12, pp. 1206-1218
Closed Access | Times Cited: 2
Analyzing the Impact of Blockchain Technology on Transaction Security with a Bibliometric Perspective
Loso Judijanto, Fritz Gamaliel
The Eastasouth Journal of Information System and Computer Science (2024) Vol. 1, Iss. 03, pp. 136-146
Open Access | Times Cited: 1
Loso Judijanto, Fritz Gamaliel
The Eastasouth Journal of Information System and Computer Science (2024) Vol. 1, Iss. 03, pp. 136-146
Open Access | Times Cited: 1
In-Depth Investigation of Artificial Intelligence - Blockchain Integration Strategies for Security Enhancement
C. R. Jothy, J. E. Judith
(2024) Vol. 10, pp. 942-947
Closed Access | Times Cited: 1
C. R. Jothy, J. E. Judith
(2024) Vol. 10, pp. 942-947
Closed Access | Times Cited: 1
A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers
Mohd Azeem Faizi Noor, Khurram Mustafa
Concurrency and Computation Practice and Experience (2024)
Closed Access
Mohd Azeem Faizi Noor, Khurram Mustafa
Concurrency and Computation Practice and Experience (2024)
Closed Access
A formal specification language and automatic modeling method of asset securitization contract
Yang Li, Kai Hu, Jie Li, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 8, pp. 102163-102163
Open Access
Yang Li, Kai Hu, Jie Li, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 8, pp. 102163-102163
Open Access
When Trustless meets Trust: Blockchain Consensus Review and Reconsideration
Hind Bangui, Mouzhi Ge, Barbora Bühnová
Procedia Computer Science (2024) Vol. 246, pp. 3351-3360
Open Access
Hind Bangui, Mouzhi Ge, Barbora Bühnová
Procedia Computer Science (2024) Vol. 246, pp. 3351-3360
Open Access
A Systematic Security Analysis of Existing Sybil Attack-Resilient Defensive Methodologies in Blockchain Network
Sparsh Kasana, Monika Sharma, S. P. Gupta
Advances in information security, privacy, and ethics book series (2024), pp. 191-224
Closed Access
Sparsh Kasana, Monika Sharma, S. P. Gupta
Advances in information security, privacy, and ethics book series (2024), pp. 191-224
Closed Access