OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intelligent techniques for secure financial management in cloud computing
Lidia Ogiela
Electronic Commerce Research and Applications (2015) Vol. 14, Iss. 6, pp. 456-464
Closed Access | Times Cited: 44

Showing 1-25 of 44 citing articles:

Malware detection in mobile environments based on Autoencoders and API-images
Gianni D’Angelo, Massimo Ficco, Francesco Palmieri
Journal of Parallel and Distributed Computing (2019) Vol. 137, pp. 26-33
Closed Access | Times Cited: 99

Cognitive security paradigm for cloud computing applications
Lidia Ogiela, Marek R. Ogiela
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 57

Intelligent Data Management and Security in Cloud Computing
Lidia Ogiela, Marek R. Ogiela, Hoon Ko
Sensors (2020) Vol. 20, Iss. 12, pp. 3458-3458
Open Access | Times Cited: 50

A new random subspace method incorporating sentiment and textual information for financial distress prediction
Gang Wang, Gang Chen, Yan Chu
Electronic Commerce Research and Applications (2018) Vol. 29, pp. 30-49
Closed Access | Times Cited: 58

Transformative computing in advanced data analysis processes in the cloud
Lidia Ogiela
Information Processing & Management (2020) Vol. 57, Iss. 5, pp. 102260-102260
Closed Access | Times Cited: 37

Linguistic techniques for cryptographic data sharing algorithms
Urszula Ogiela, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 3
Open Access | Times Cited: 39

Information flow control in object‐based peer‐to‐peer publish/subscribe systems
Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 27

Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT
Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
International Journal of Mobile Computing and Multimedia Communications (2019) Vol. 10, Iss. 4, pp. 13-25
Closed Access | Times Cited: 23

Forecasting credit default risk with graph attention networks
Binbin Zhou, Jiayun Jin, Hang Zhou, et al.
Electronic Commerce Research and Applications (2023) Vol. 62, pp. 101332-101332
Closed Access | Times Cited: 6

Cognitive cryptography techniques for intelligent information management
Marek R. Ogiela, Lidia Ogiela
International Journal of Information Management (2018) Vol. 40, pp. 21-27
Closed Access | Times Cited: 18

Causally ordering delivery of event messages in P2PPSO systems
Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa
Cognitive Systems Research (2019) Vol. 56, pp. 167-178
Closed Access | Times Cited: 12

ECG-Based Advanced Personal Identification Study With Adjusted (Q i * S i )
Hoon Ko, Marek R. Ogiela, Lidia Ogiela, et al.
IEEE Access (2019) Vol. 7, pp. 40078-40084
Open Access | Times Cited: 11

Comparison of Cognitive Information Systems Supporting Management Tasks
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 49-56
Closed Access | Times Cited: 8

Visual CAPTCHA application in linguistic cryptography
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 2
Closed Access | Times Cited: 8

Personal identification study for touchable devices with ECG
Hoon Ko, Sung Bum Pan, Libor Měsíček
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 8

Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 166-170
Closed Access | Times Cited: 6

Intelligent and semantic threshold schemes for security in cloud computing
Lidia Ogiela, Václav Snåšel
Concurrency and Computation Practice and Experience (2019) Vol. 33, Iss. 2
Closed Access | Times Cited: 6

Semantic Data Analysis Algorithms Supporting Decision-Making Processes
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 494-496
Closed Access | Times Cited: 5

Extraction of abstracted sensory data to reduce the execution time of context‐aware services in wearable computing environments
Yoosang Park, Jaehyung Ye, Jongsun Choi, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 5

Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks
Yuan Gao, Haixia He, Rongjun Tan, et al.
Digital Communications and Networks (2020) Vol. 7, Iss. 2, pp. 201-213
Open Access | Times Cited: 5

Intelligent Cognitive Information Systems in Management Applications
Lidia Ogiela
Elsevier eBooks (2017), pp. 79-122
Closed Access | Times Cited: 4

Cognitive and biologically cryptographic protocols for data security
Lidia Ogiela, Urszula Ogiela
Cognitive Systems Research (2019) Vol. 56, pp. 1-6
Closed Access | Times Cited: 4

Capability-Based Information Flow Control Model in the IoT
Shigenari Nakamura, Tomoya Enokido, Leonard Barolli, et al.
Advances in intelligent systems and computing (2019), pp. 63-71
Closed Access | Times Cited: 4

Towards cognitive service management and semantic information sharing in the Cloud
Lidia Ogiela, Marek R. Ogiela
Multimedia Tools and Applications (2017) Vol. 77, Iss. 14, pp. 18625-18635
Closed Access | Times Cited: 3

A Scientometric Study of Research Development on Cloud Computing-Based Data Management Technique
Subhra Prosun Paul, D. Vetrithangam
Lecture notes in networks and systems (2023), pp. 617-625
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top