OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cloud Security Threats and Solutions: A Survey
Umer Ahmed Butt, Rashid Amin, Muhammad Mehmood, et al.
Wireless Personal Communications (2022) Vol. 128, Iss. 1, pp. 387-413
Closed Access | Times Cited: 50

Showing 1-25 of 50 citing articles:

Cloud Access Security Brokers: An easy-implement Method for Accessing Cloud Services Securely
Israa Basim, Ahmed Fakhfakh, Amel Meddeb-Makhlouf
WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS (2025) Vol. 22, pp. 189-202
Open Access | Times Cited: 1

Cyberattacks and Security of Cloud Computing: A Complete Guideline
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21

Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 20

Security in Cloud-Native Services: A Survey
Θεόδωρος Θεοδωρόπουλος, Luís Rosa, Chafika Benzaıd, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 4, pp. 758-793
Open Access | Times Cited: 17

An integrated SDN framework for early detection of DDoS attacks in cloud computing
Asha Varma Songa, Ganesh Reddy Karri
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5

A systematic review on blockchain-based access control systems in cloud environment
Aarti Punia, Preeti Gulia, Nasib Singh Gill, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 5

Federated Learning for Cloud and Edge Security: A Systematic Review of Challenges and AI Opportunities
Latifa Albshaier, Seetah Almarri, Abdullah Albuali
Electronics (2025) Vol. 14, Iss. 5, pp. 1019-1019
Open Access

A novel ML based structure for mitigating security risks in a cloud environment
Gurjit Kaur, Gurbinder Singh Brar, Shalli Rani
AIP conference proceedings (2025) Vol. 3227, pp. 060013-060013
Closed Access

MINDPRES: A Hybrid Prototype System for Comprehensive Data Protection in the User Layer of the Mobile Cloud
Noah Oghenefego Ogwara, Krassie Petrova, Mee Loong Yang, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 670-670
Open Access

A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs based on Machine Learning
Neeraj Chandnani, Chandrakant N. Khairnar
Wireless Personal Communications (2023) Vol. 130, Iss. 4, pp. 2589-2622
Closed Access | Times Cited: 10

Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network
Sandesh Achar, Nuruzzaman Faruqui, Anusha Bodepudi, et al.
IEEE Access (2023) Vol. 11, pp. 89205-89217
Open Access | Times Cited: 7

Integration of the Internet of Things and Cloud
Chellammal Surianarayanan, Pethuru Raj Chelliah
International Journal of Cloud Applications and Computing (2023) Vol. 13, Iss. 1, pp. 1-30
Open Access | Times Cited: 5

Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment
Syed Ismail Abdul Lathif, D. John Pradeep, J. Ashok, et al.
KSII Transactions on Internet and Information Systems (2023) Vol. 17, Iss. 10
Open Access | Times Cited: 4

Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security
M Rekha, Shoba Rani P
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1

Firm actions and Media tenor after a data breach: A quasi replication and extension of Zavyalova et al.'s (2012) product harm study
Jiaju Yan, Xinran Wang, Timothy P. Munyon, et al.
Journal of Management Scientific Reports (2024) Vol. 2, Iss. 1, pp. 27-61
Closed Access | Times Cited: 1

Navigating Cloud Security Risks, Threats, and Solutions for Seamless Business Logistics
Shalbani Das, Shreyashi Mukherjee
Advances in information security, privacy, and ethics book series (2024), pp. 252-275
Closed Access | Times Cited: 1

A trusted computing framework for cloud data security using role-based access and pattern recognition
G. K. Pradhan, Madhukrishna Priyadarsini
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6609-6622
Closed Access | Times Cited: 1

Machine Learning–Based Identity and Access Management for Cloud Security
Harun Jamil, Abid Ali, Meryem Ammi, et al.
EAI/Springer Innovations in Communication and Computing (2024), pp. 195-207
Closed Access | Times Cited: 1

Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend
Frimpong Twum, James Benjamin Hayfron Acquah, Yaw Marfo Missah, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0301760-e0301760
Open Access | Times Cited: 1

Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks
Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad, et al.
Symmetry (2024) Vol. 16, Iss. 5, pp. 605-605
Open Access | Times Cited: 1

Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
El Mehdi Kandoussi, Adam Houmairi, Iman El Mir, et al.
Cluster Computing (2024)
Closed Access | Times Cited: 1

Blockchain‐based transparent and certificateless data integrity auditing for cloud storage
Yapeng Miao, Ying Miao, Xuexue Miao
Concurrency and Computation Practice and Experience (2024)
Closed Access | Times Cited: 1

Cloud Security Essentials
Abhishek Singh Vardia, Aarti Chaudhary, Shikha Agarwal, et al.
(2024), pp. 413-432
Closed Access | Times Cited: 1

Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3

Securing HTTP/3 Web Architecture in the Cloud
Jacob Koch, Emmanuel Kojo Gyamfi
2022 IEEE World AI IoT Congress (AIIoT) (2023), pp. 0158-0166
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top