
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
Jiaqi Zhao, Lizhe Wang, Jie Tao, et al.
Journal of Computer and System Sciences (2014) Vol. 80, Iss. 5, pp. 994-1007
Open Access | Times Cited: 123
Jiaqi Zhao, Lizhe Wang, Jie Tao, et al.
Journal of Computer and System Sciences (2014) Vol. 80, Iss. 5, pp. 994-1007
Open Access | Times Cited: 123
Showing 1-25 of 123 citing articles:
Big Data and cloud computing: innovation opportunities and challenges
Chaowei Yang, Qunying Huang, Zhenlong Li, et al.
International Journal of Digital Earth (2016) Vol. 10, Iss. 1, pp. 13-53
Open Access | Times Cited: 737
Chaowei Yang, Qunying Huang, Zhenlong Li, et al.
International Journal of Digital Earth (2016) Vol. 10, Iss. 1, pp. 13-53
Open Access | Times Cited: 737
A hybrid solution for privacy preserving medical data sharing in the cloud environment
Ji‐Jiang Yang, Jianqiang Li, Yu Niu
Future Generation Computer Systems (2014) Vol. 43-44, pp. 74-86
Closed Access | Times Cited: 287
Ji‐Jiang Yang, Jianqiang Li, Yu Niu
Future Generation Computer Systems (2014) Vol. 43-44, pp. 74-86
Closed Access | Times Cited: 287
Blockchain-Enabled Information Sharing Within a Supply Chain: A Systematic Literature Review
Paul Kengfai Wan, Lizhen Huang, Halvor Holtskog
IEEE Access (2020) Vol. 8, pp. 49645-49656
Open Access | Times Cited: 139
Paul Kengfai Wan, Lizhen Huang, Halvor Holtskog
IEEE Access (2020) Vol. 8, pp. 49645-49656
Open Access | Times Cited: 139
Big Earth Data: a new challenge and opportunity for Digital Earth’s development
Huadong Guo, Zhen Liu, Hao Jiang, et al.
International Journal of Digital Earth (2016) Vol. 10, Iss. 1, pp. 1-12
Open Access | Times Cited: 148
Huadong Guo, Zhen Liu, Hao Jiang, et al.
International Journal of Digital Earth (2016) Vol. 10, Iss. 1, pp. 1-12
Open Access | Times Cited: 148
bcBIM: A Blockchain‐Based Big Data Model for BIM Modification Audit and Provenance in Mobile Cloud
Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, et al.
Mathematical Problems in Engineering (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 137
Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, et al.
Mathematical Problems in Engineering (2019) Vol. 2019, Iss. 1
Open Access | Times Cited: 137
Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing
Min Chen, Yongfeng Qian, Jing Chen, et al.
IEEE Transactions on Cloud Computing (2016) Vol. 8, Iss. 4, pp. 1274-1283
Closed Access | Times Cited: 96
Min Chen, Yongfeng Qian, Jing Chen, et al.
IEEE Transactions on Cloud Computing (2016) Vol. 8, Iss. 4, pp. 1274-1283
Closed Access | Times Cited: 96
Security and privacy aspects in MapReduce on clouds: A survey
Philip Derbeko, Shlomi Dolev, Ehud Gudes, et al.
Computer Science Review (2016) Vol. 20, pp. 1-28
Open Access | Times Cited: 90
Philip Derbeko, Shlomi Dolev, Ehud Gudes, et al.
Computer Science Review (2016) Vol. 20, pp. 1-28
Open Access | Times Cited: 90
Big data handling mechanisms in the healthcare applications: A comprehensive and systematic literature review
Asma Pashazadeh, Nima Jafari Navimipour
Journal of Biomedical Informatics (2018) Vol. 82, pp. 47-62
Open Access | Times Cited: 88
Asma Pashazadeh, Nima Jafari Navimipour
Journal of Biomedical Informatics (2018) Vol. 82, pp. 47-62
Open Access | Times Cited: 88
Improving network intrusion detection system performance through quality of service configuration and parallel technology
Waleed Bul’ajoul, Anne James, Mandeep Pannu
Journal of Computer and System Sciences (2014) Vol. 81, Iss. 6, pp. 981-999
Open Access | Times Cited: 90
Waleed Bul’ajoul, Anne James, Mandeep Pannu
Journal of Computer and System Sciences (2014) Vol. 81, Iss. 6, pp. 981-999
Open Access | Times Cited: 90
A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures
Zhijiang Chen, Guobin Xu, Vivek Mahalingam, et al.
Big Data Research (2015) Vol. 3, pp. 10-23
Closed Access | Times Cited: 90
Zhijiang Chen, Guobin Xu, Vivek Mahalingam, et al.
Big Data Research (2015) Vol. 3, pp. 10-23
Closed Access | Times Cited: 90
An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem
Maanak Gupta, Farhan Patwa, Ravi Sandhu
(2018), pp. 13-24
Closed Access | Times Cited: 79
Maanak Gupta, Farhan Patwa, Ravi Sandhu
(2018), pp. 13-24
Closed Access | Times Cited: 79
A scalable and fast OPTICS for clustering trajectory big data
Ze Deng, Yangyang Hu, Mao Zhu, et al.
Cluster Computing (2014) Vol. 18, Iss. 2, pp. 549-562
Closed Access | Times Cited: 73
Ze Deng, Yangyang Hu, Mao Zhu, et al.
Cluster Computing (2014) Vol. 18, Iss. 2, pp. 549-562
Closed Access | Times Cited: 73
An exploratory study for investigating the critical success factors for cloud migration in the Saudi Arabian higher education context
Abdulrahman Alharthi, Madini O. Alassafi, Robert John Walters, et al.
Telematics and Informatics (2016) Vol. 34, Iss. 2, pp. 664-678
Open Access | Times Cited: 73
Abdulrahman Alharthi, Madini O. Alassafi, Robert John Walters, et al.
Telematics and Informatics (2016) Vol. 34, Iss. 2, pp. 664-678
Open Access | Times Cited: 73
A self-adaptive scheduling algorithm for reduce start time
Zhuo Tang, Lingang Jiang, Junqing Zhou, et al.
Future Generation Computer Systems (2014) Vol. 43-44, pp. 51-60
Closed Access | Times Cited: 68
Zhuo Tang, Lingang Jiang, Junqing Zhou, et al.
Future Generation Computer Systems (2014) Vol. 43-44, pp. 51-60
Closed Access | Times Cited: 68
Main Issues in Big Data Security
Julio Moreno, Manuel Serrano, Eduardo Fernández‐Medina
Future Internet (2016) Vol. 8, Iss. 3, pp. 44-44
Open Access | Times Cited: 60
Julio Moreno, Manuel Serrano, Eduardo Fernández‐Medina
Future Internet (2016) Vol. 8, Iss. 3, pp. 44-44
Open Access | Times Cited: 60
Mining association rules in big data with NGEP
Yunliang Chen, Fangyuan Li, Junqing Fan
Cluster Computing (2015) Vol. 18, Iss. 2, pp. 577-585
Closed Access | Times Cited: 54
Yunliang Chen, Fangyuan Li, Junqing Fan
Cluster Computing (2015) Vol. 18, Iss. 2, pp. 577-585
Closed Access | Times Cited: 54
Cloud-Based Big Data Analytics—A Survey of Current Research and Future Directions
Samiya Khan, Kashish Ara Shakil, Mansaf Alam
Advances in intelligent systems and computing (2017), pp. 595-604
Closed Access | Times Cited: 52
Samiya Khan, Kashish Ara Shakil, Mansaf Alam
Advances in intelligent systems and computing (2017), pp. 595-604
Closed Access | Times Cited: 52
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
Gayatri Kapil, Alka Agrawal, Abdulaziz Attaallah, et al.
PeerJ Computer Science (2020) Vol. 6, pp. e259-e259
Open Access | Times Cited: 39
Gayatri Kapil, Alka Agrawal, Abdulaziz Attaallah, et al.
PeerJ Computer Science (2020) Vol. 6, pp. e259-e259
Open Access | Times Cited: 39
Object-Tagged RBAC Model for the Hadoop Ecosystem
Maanak Gupta, Farhan Patwa, Ravi Sandhu
Lecture notes in computer science (2017), pp. 63-81
Closed Access | Times Cited: 40
Maanak Gupta, Farhan Patwa, Ravi Sandhu
Lecture notes in computer science (2017), pp. 63-81
Closed Access | Times Cited: 40
A survey on security of Hadoop
Masoumeh Rezaei Jam, Leyli Mohammad Khanli, Morteza Sargolzaei Javan, et al.
(2014)
Closed Access | Times Cited: 40
Masoumeh Rezaei Jam, Leyli Mohammad Khanli, Morteza Sargolzaei Javan, et al.
(2014)
Closed Access | Times Cited: 40
Secure cloud computing algorithm using homomorphic encryption and multi-party computation
Debasis Das
2022 International Conference on Information Networking (ICOIN) (2018), pp. 391-396
Closed Access | Times Cited: 37
Debasis Das
2022 International Conference on Information Networking (ICOIN) (2018), pp. 391-396
Closed Access | Times Cited: 37
A Spark-based genetic algorithm for sensor placement in large scale drinking water distribution systems
Chengyu Hu, Guorui Ren, Chao Liu, et al.
Cluster Computing (2017) Vol. 20, Iss. 2, pp. 1089-1099
Closed Access | Times Cited: 36
Chengyu Hu, Guorui Ren, Chao Liu, et al.
Cluster Computing (2017) Vol. 20, Iss. 2, pp. 1089-1099
Closed Access | Times Cited: 36
A novel technique of cloud security based on hybrid encryption by Blowfish and MD5
Adviti Chauhan, Jyoti Gupta
(2017), pp. 349-355
Closed Access | Times Cited: 31
Adviti Chauhan, Jyoti Gupta
(2017), pp. 349-355
Closed Access | Times Cited: 31
A Knowledge-Driven Geospatially Enabled Framework for Geological Big Data
Liang Wu, Xue Lei, Chaoling Li, et al.
ISPRS International Journal of Geo-Information (2017) Vol. 6, Iss. 6, pp. 166-166
Open Access | Times Cited: 29
Liang Wu, Xue Lei, Chaoling Li, et al.
ISPRS International Journal of Geo-Information (2017) Vol. 6, Iss. 6, pp. 166-166
Open Access | Times Cited: 29
A New Architecture for Network Intrusion Detection and Prevention
Waleed Bul’ajoul, Anne James, Siraj Ahmed Shaikh
IEEE Access (2019) Vol. 7, pp. 18558-18573
Open Access | Times Cited: 29
Waleed Bul’ajoul, Anne James, Siraj Ahmed Shaikh
IEEE Access (2019) Vol. 7, pp. 18558-18573
Open Access | Times Cited: 29