
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Private blockchain-based encryption framework using computational intelligence approach
Taher M. Ghazal, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, et al.
Egyptian Informatics Journal (2022) Vol. 23, Iss. 4, pp. 69-75
Open Access | Times Cited: 62
Taher M. Ghazal, Mohammad Kamrul Hasan, Siti Norul Huda Sheikh Abdullah, et al.
Egyptian Informatics Journal (2022) Vol. 23, Iss. 4, pp. 69-75
Open Access | Times Cited: 62
Showing 1-25 of 62 citing articles:
Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert System
Nidal A. Al-Dmour, Mohammad Salahat, Harish K G Nair, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-6
Closed Access | Times Cited: 60
Nidal A. Al-Dmour, Mohammad Salahat, Harish K G Nair, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-6
Closed Access | Times Cited: 60
A Systematic Literature Review of Security in 5G based Social Networks
Muhammad Alshurideh, Bader Yousef Obeidat, Victoria Vorobeva, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 44
Muhammad Alshurideh, Bader Yousef Obeidat, Victoria Vorobeva, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 44
Smartphone Security Hardening: Threats to Organizational Security and Risk Mitigation
Atif Ali, Nafees Ahmed Somroo, Umer Farooq, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-12
Closed Access | Times Cited: 39
Atif Ali, Nafees Ahmed Somroo, Umer Farooq, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-12
Closed Access | Times Cited: 39
Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat
Areej Fatima, Tahir Abbas Khan, Tamer Mohamed Abdellatif, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 31
Areej Fatima, Tahir Abbas Khan, Tamer Mohamed Abdellatif, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-8
Closed Access | Times Cited: 31
A Decentralized Approach to Smart Home Security: Blockchain With Red-Tailed Hawk-Enabled Deep Learning
Fahad F. Alruwaili, Manal Abdullah Alohali, Nouf Aljaffan, et al.
IEEE Access (2024) Vol. 12, pp. 14146-14156
Open Access | Times Cited: 6
Fahad F. Alruwaili, Manal Abdullah Alohali, Nouf Aljaffan, et al.
IEEE Access (2024) Vol. 12, pp. 14146-14156
Open Access | Times Cited: 6
Secure sharing of health records stored in cloud using cryptographic secret sharing schemes through computational intelligence
Sameera Mahammad, K. Usha Rani
Elsevier eBooks (2025), pp. 281-301
Closed Access
Sameera Mahammad, K. Usha Rani
Elsevier eBooks (2025), pp. 281-301
Closed Access
Secure e-health framework using artificial intelligence and blockchain technology
Reham Almukhlifi, Mahmoud Ahmad Al‐Khasawneh, Amal Bukhari, et al.
International Journal of ADVANCED AND APPLIED SCIENCES (2025) Vol. 12, Iss. 2, pp. 52-61
Open Access
Reham Almukhlifi, Mahmoud Ahmad Al‐Khasawneh, Amal Bukhari, et al.
International Journal of ADVANCED AND APPLIED SCIENCES (2025) Vol. 12, Iss. 2, pp. 52-61
Open Access
Smart Agricultural–Industrial Crop-Monitoring System Using Unmanned Aerial Vehicle–Internet of Things Classification Techniques
K. Vijayalakshmi, Shaha Al‐Otaibi, Leena Arya, et al.
Sustainability (2023) Vol. 15, Iss. 14, pp. 11242-11242
Open Access | Times Cited: 13
K. Vijayalakshmi, Shaha Al‐Otaibi, Leena Arya, et al.
Sustainability (2023) Vol. 15, Iss. 14, pp. 11242-11242
Open Access | Times Cited: 13
Network security framework for Internet of medical things applications: A survey
Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
Hiba A. Tarish, Rosilah Hassan, Khairul Akram Zainol Ariffin, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 4
Algorithms for Enhanced Security and Data Sharing in Blockchain-Driven Healthcare Systems
G. J. Ugander Reddy, T. Uma Devi
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 2
Open Access
G. J. Ugander Reddy, T. Uma Devi
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 2
Open Access
IPFS-Blockchain Smart Contracts Based Conceptual Framework to Reduce Certificate Frauds in the Academic Field
S Sultana, Ch. Rupa, R. Pavana Malleswari, et al.
Information (2023) Vol. 14, Iss. 8, pp. 446-446
Open Access | Times Cited: 12
S Sultana, Ch. Rupa, R. Pavana Malleswari, et al.
Information (2023) Vol. 14, Iss. 8, pp. 446-446
Open Access | Times Cited: 12
Data security in smart devices: Advancement, constraints and future recommendations
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, et al.
IET Networks (2023) Vol. 12, Iss. 6, pp. 269-281
Open Access | Times Cited: 9
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, et al.
IET Networks (2023) Vol. 12, Iss. 6, pp. 269-281
Open Access | Times Cited: 9
Triple-Entry Accounting (TEA) and Blockchain Implementation in Accounting and Finance - A Survey
Robinson Joseph, Rahul Sharma, Muhammad Imran Sarwar, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-7
Closed Access | Times Cited: 8
Robinson Joseph, Rahul Sharma, Muhammad Imran Sarwar, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-7
Closed Access | Times Cited: 8
The Threat of Deep Fake Technology to Trusted Identity Management
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Atif Ali, Yasir Khan Jadoon, Zulqarnain Farid, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 10
Blockchain and LDP Based Smart Healthcare IoT Applications: Architecture, Challenges and Future Works
Maham Iftikhar, Sidra Tahir, Fatima Al-Quayed, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-6
Closed Access | Times Cited: 5
Maham Iftikhar, Sidra Tahir, Fatima Al-Quayed, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-6
Closed Access | Times Cited: 5
Blockchain-Assisted Secure Smart Home Network Using Gradient-Based Optimizer With Hybrid Deep Learning Model
Latifah Almuqren, Khalid Mahmood, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 86999-87008
Open Access | Times Cited: 5
Latifah Almuqren, Khalid Mahmood, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 86999-87008
Open Access | Times Cited: 5
Deep Learning Method for Power Side-Channel Analysis on Chip Leakages
Amjed Abbas Ahmed, Rana Ali Salim, Mohammad Kamrul Hasan
Elektronika ir Elektrotechnika (2023) Vol. 29, Iss. 6, pp. 50-57
Open Access | Times Cited: 5
Amjed Abbas Ahmed, Rana Ali Salim, Mohammad Kamrul Hasan
Elektronika ir Elektrotechnika (2023) Vol. 29, Iss. 6, pp. 50-57
Open Access | Times Cited: 5
Utilization of Blockchain Technology In Human Resource Management
Elham Abdulwahab Anaam, Taher M. Ghazal, Su-Cheng Haw, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Elham Abdulwahab Anaam, Taher M. Ghazal, Su-Cheng Haw, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 5
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks
Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, et al.
(2023), pp. 80-83
Closed Access | Times Cited: 4
Amjed Abbas Ahmed, Mohammad Kamrul Hasan, Nazmus Shaker Nafi, et al.
(2023), pp. 80-83
Closed Access | Times Cited: 4
A Smart and Privacy-Preserving Logistics System Based on IoT and Blockchain Technologies
Mohammed Balfaqih, Zain Balfagih, Akram A. Almohammedi, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 3
Mohammed Balfaqih, Zain Balfagih, Akram A. Almohammedi, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 3
Estate Price Predictor for Multan City Townships Using Machine Learning
Barween Al Kurdi, Hammad Raza, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5
Barween Al Kurdi, Hammad Raza, Salman Muneer, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-5
Closed Access | Times Cited: 5
Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity Sensors
Muhammad Tahir, Abdul Salam Mohammed, Sunita Marwaha, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-9
Closed Access | Times Cited: 5
Muhammad Tahir, Abdul Salam Mohammed, Sunita Marwaha, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-9
Closed Access | Times Cited: 5
Drones network security enhancement using smart based block-chain technology
Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-6
Closed Access | Times Cited: 4
Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, et al.
2022 International Conference on Cyber Resilience (ICCR) (2022), pp. 1-6
Closed Access | Times Cited: 4
Private Blockchain in the Field of Health Services
Purwono Purwono, Khoirun Nisa, Sony Kartika Wibisono, et al.
Journal of Advanced Health Informatics Research (2023) Vol. 1, Iss. 1, pp. 10-15
Open Access | Times Cited: 2
Purwono Purwono, Khoirun Nisa, Sony Kartika Wibisono, et al.
Journal of Advanced Health Informatics Research (2023) Vol. 1, Iss. 1, pp. 10-15
Open Access | Times Cited: 2
Resource Provisioning in Cloud Computing using Fuzzy Logic Control System: An adaptive approach
Saif E. A. Alnawayseh, Muhammad Hassan Ghulam Muhammad, Md. Zahid Hassan, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-9
Closed Access | Times Cited: 2
Saif E. A. Alnawayseh, Muhammad Hassan Ghulam Muhammad, Md. Zahid Hassan, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-9
Closed Access | Times Cited: 2