
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy preserving framework using Gaussian mutation based firebug optimization in cloud computing
Kartik Anand, A. Vijayaraj, M. Anand
The Journal of Supercomputing (2022) Vol. 78, Iss. 7, pp. 9414-9437
Closed Access | Times Cited: 11
Kartik Anand, A. Vijayaraj, M. Anand
The Journal of Supercomputing (2022) Vol. 78, Iss. 7, pp. 9414-9437
Closed Access | Times Cited: 11
Showing 11 citing articles:
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Abdul Majeed
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 638-661
Open Access | Times Cited: 15
Abdul Majeed
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 638-661
Open Access | Times Cited: 15
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud
Kartik Anand, A. Vijayaraj, M. Anand
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 4, pp. 2007-2020
Closed Access | Times Cited: 11
Kartik Anand, A. Vijayaraj, M. Anand
Peer-to-Peer Networking and Applications (2022) Vol. 15, Iss. 4, pp. 2007-2020
Closed Access | Times Cited: 11
Wireless 6G Cloud Communication Based Security Analysis Using Machine Learning in Internet of Medical Things (IoMT)
Jicheng Chen, Yi‐Han Xu, Xun Zhu, et al.
Wireless Personal Communications (2024)
Closed Access
Jicheng Chen, Yi‐Han Xu, Xun Zhu, et al.
Wireless Personal Communications (2024)
Closed Access
Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization
Kavitha Dhanushkodi, Raushan Kumar, P. Mittal, et al.
Cluster Computing (2024)
Closed Access
Kavitha Dhanushkodi, Raushan Kumar, P. Mittal, et al.
Cluster Computing (2024)
Closed Access
Enhancing Security for Dual Access Control for Cloud based Data Storage and Sharing
A. Vijayaraj, V. Murugan, R Sudhir, et al.
(2024), pp. 1-6
Closed Access
A. Vijayaraj, V. Murugan, R Sudhir, et al.
(2024), pp. 1-6
Closed Access
Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems
Waleed K. Abdulraheem
International Journal of Advances in Soft Computing and its Applications (2022) Vol. 14, Iss. 3, pp. 18-30
Open Access | Times Cited: 3
Waleed K. Abdulraheem
International Journal of Advances in Soft Computing and its Applications (2022) Vol. 14, Iss. 3, pp. 18-30
Open Access | Times Cited: 3
Secure Data Transmission in Wireless Adhoc Networks by Detecting Wormhole Attack
K. Deepa Thilak, S. Saranya, K. Kalaiselvi, et al.
2022 8th International Conference on Smart Structures and Systems (ICSSS) (2022), pp. 1-5
Closed Access | Times Cited: 1
K. Deepa Thilak, S. Saranya, K. Kalaiselvi, et al.
2022 8th International Conference on Smart Structures and Systems (ICSSS) (2022), pp. 1-5
Closed Access | Times Cited: 1
Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients
Sultan Mesfer Aldossary
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 3, pp. 3387-3404
Open Access
Sultan Mesfer Aldossary
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 3, pp. 3387-3404
Open Access
Enhanced Hybrid Optimal and Intelligent Technique for Data Storage in Cloud
R. Kavitha, A. Valarmathi
Lecture notes in mechanical engineering (2023), pp. 189-203
Closed Access
R. Kavitha, A. Valarmathi
Lecture notes in mechanical engineering (2023), pp. 189-203
Closed Access
Organic and Recyclable Waste Classification Using Integrated Feature Selection Method
A. Vijayaraj, S. Shreya, G. Deepana, et al.
(2023), pp. 1-7
Closed Access
A. Vijayaraj, S. Shreya, G. Deepana, et al.
(2023), pp. 1-7
Closed Access
Wireless Sensor Networks Consistent and Honest Routing Scheme
A. Vijayaraj, B. Reethika, K. Santhiya, et al.
(2023), pp. 1-7
Closed Access
A. Vijayaraj, B. Reethika, K. Santhiya, et al.
(2023), pp. 1-7
Closed Access