
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cognitive systems and bio-inspired computing in homeland security
Lidia Ogiela, Marek R. Ogiela
Journal of Network and Computer Applications (2013) Vol. 38, pp. 34-42
Closed Access | Times Cited: 42
Lidia Ogiela, Marek R. Ogiela
Journal of Network and Computer Applications (2013) Vol. 38, pp. 34-42
Closed Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
A content service deployment plan for metaverse museum exhibitions—Centering on the combination of beacons and HMDs
Hee-soo Choi, Sang‐Heon Kim
International Journal of Information Management (2016) Vol. 37, Iss. 1, pp. 1519-1527
Closed Access | Times Cited: 267
Hee-soo Choi, Sang‐Heon Kim
International Journal of Information Management (2016) Vol. 37, Iss. 1, pp. 1519-1527
Closed Access | Times Cited: 267
Insider Threats and Cryptographic Techniques in Secure Information Management
Lidia Ogiela, Marek R. Ogiela
IEEE Systems Journal (2015) Vol. 11, Iss. 2, pp. 405-414
Closed Access | Times Cited: 56
Lidia Ogiela, Marek R. Ogiela
IEEE Systems Journal (2015) Vol. 11, Iss. 2, pp. 405-414
Closed Access | Times Cited: 56
On Using Cognitive Models in Cryptography
Marek R. Ogiela, Lidia Ogiela
(2016), pp. 1055-1058
Closed Access | Times Cited: 56
Marek R. Ogiela, Lidia Ogiela
(2016), pp. 1055-1058
Closed Access | Times Cited: 56
Intelligent techniques for secure financial management in cloud computing
Lidia Ogiela
Electronic Commerce Research and Applications (2015) Vol. 14, Iss. 6, pp. 456-464
Closed Access | Times Cited: 44
Lidia Ogiela
Electronic Commerce Research and Applications (2015) Vol. 14, Iss. 6, pp. 456-464
Closed Access | Times Cited: 44
False and multi-secret steganography in digital images
Marek R. Ogiela, Katarzyna Koptyra
Soft Computing (2015) Vol. 19, Iss. 11, pp. 3331-3339
Open Access | Times Cited: 42
Marek R. Ogiela, Katarzyna Koptyra
Soft Computing (2015) Vol. 19, Iss. 11, pp. 3331-3339
Open Access | Times Cited: 42
Bio-Inspired Cryptographic Techniques in Information Management Applications
Lidia Ogiela, Marek R. Ogiela
(2016) Vol. 38, pp. 1059-1063
Closed Access | Times Cited: 40
Lidia Ogiela, Marek R. Ogiela
(2016) Vol. 38, pp. 1059-1063
Closed Access | Times Cited: 40
Cryptographic techniques of strategic data splitting and secure information management
Lidia Ogiela
Pervasive and Mobile Computing (2015) Vol. 29, pp. 130-141
Closed Access | Times Cited: 40
Lidia Ogiela
Pervasive and Mobile Computing (2015) Vol. 29, pp. 130-141
Closed Access | Times Cited: 40
Biometric Methods for Advanced Strategic Data Sharing Protocols
Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
(2015), pp. 179-183
Closed Access | Times Cited: 38
Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela
(2015), pp. 179-183
Closed Access | Times Cited: 38
Efficiency of Strategic Data Sharing and Management Protocols
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
(2016), pp. 198-201
Closed Access | Times Cited: 35
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
(2016), pp. 198-201
Closed Access | Times Cited: 35
Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks
Vishal Sharma, Hsing‐Chung Chen, Rajesh Kumar
Journal of Computer and System Sciences (2016) Vol. 86, pp. 3-32
Open Access | Times Cited: 34
Vishal Sharma, Hsing‐Chung Chen, Rajesh Kumar
Journal of Computer and System Sciences (2016) Vol. 86, pp. 3-32
Open Access | Times Cited: 34
Some generalized interval-valued hesitant uncertain linguistic aggregation operators and their applications to multiple attribute group decision making
Xiaoyue Liu, Yanbing Ju, Shanghong Yang
Soft Computing (2014) Vol. 20, Iss. 2, pp. 495-510
Closed Access | Times Cited: 20
Xiaoyue Liu, Yanbing Ju, Shanghong Yang
Soft Computing (2014) Vol. 20, Iss. 2, pp. 495-510
Closed Access | Times Cited: 20
Including cognitive aspects in multiple criteria decision analysis
João Carneiro, Luís Conceição, Diogo Martinho, et al.
Annals of Operations Research (2016) Vol. 265, Iss. 2, pp. 269-291
Closed Access | Times Cited: 14
João Carneiro, Luís Conceição, Diogo Martinho, et al.
Annals of Operations Research (2016) Vol. 265, Iss. 2, pp. 269-291
Closed Access | Times Cited: 14
Multiply information coding and hiding using fuzzy vault
Katarzyna Koptyra, Marek R. Ogiela
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4357-4366
Closed Access | Times Cited: 14
Katarzyna Koptyra, Marek R. Ogiela
Soft Computing (2018) Vol. 23, Iss. 12, pp. 4357-4366
Closed Access | Times Cited: 14
A Distinguishing Arterial Pulse Waves Approach by Using Image Processing and Feature Extraction Technique
Hsing‐Chung Chen, Shyi-Shiun Kuo, Shen-Ching Sun, et al.
Journal of Medical Systems (2016) Vol. 40, Iss. 10
Closed Access | Times Cited: 12
Hsing‐Chung Chen, Shyi-Shiun Kuo, Shen-Ching Sun, et al.
Journal of Medical Systems (2016) Vol. 40, Iss. 10
Closed Access | Times Cited: 12
Knowledge Bricks—Educational immersive reality environment
Tomasz Hachaj, Danuta Baraniewicz
International Journal of Information Management (2015) Vol. 35, Iss. 3, pp. 396-406
Closed Access | Times Cited: 11
Tomasz Hachaj, Danuta Baraniewicz
International Journal of Information Management (2015) Vol. 35, Iss. 3, pp. 396-406
Closed Access | Times Cited: 11
Fuzzy Vault Schemes in Multi-secret Digital Steganography
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 183-186
Closed Access | Times Cited: 11
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 183-186
Closed Access | Times Cited: 11
Voronoi-based Range-k NN search with Map Grid in a mobile environment
Zhou Shao, David Taniar, Kiki Maulana Adhinugraha
Future Generation Computer Systems (2016) Vol. 67, pp. 305-314
Closed Access | Times Cited: 9
Zhou Shao, David Taniar, Kiki Maulana Adhinugraha
Future Generation Computer Systems (2016) Vol. 67, pp. 305-314
Closed Access | Times Cited: 9
Comparison of Cognitive Information Systems Supporting Management Tasks
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 49-56
Closed Access | Times Cited: 8
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 49-56
Closed Access | Times Cited: 8
Bio-inspired approaches for secret data sharing techniques
Marek R. Ogiela, Lidia Ogiela
(2015), pp. 75-78
Closed Access | Times Cited: 7
Marek R. Ogiela, Lidia Ogiela
(2015), pp. 75-78
Closed Access | Times Cited: 7
Heuristic approach for computer-aided lesion detection in mammograms
Marek R. Ogiela, Natalia Krzyworzeka
Soft Computing (2016) Vol. 20, Iss. 10, pp. 4193-4202
Closed Access | Times Cited: 7
Marek R. Ogiela, Natalia Krzyworzeka
Soft Computing (2016) Vol. 20, Iss. 10, pp. 4193-4202
Closed Access | Times Cited: 7
Key Generation for Multi-Secret Steganography
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 1-4
Closed Access | Times Cited: 5
Katarzyna Koptyra, Marek R. Ogiela
(2015), pp. 1-4
Closed Access | Times Cited: 5
Semantic Data Analysis Algorithms Supporting Decision-Making Processes
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 494-496
Closed Access | Times Cited: 5
Lidia Ogiela, Marek R. Ogiela
(2015), pp. 494-496
Closed Access | Times Cited: 5
Data Understanding Techniques for Management Application and Cryptography
Marek R. Ogiela, Lidia Ogiela
(2016), pp. 40-43
Closed Access | Times Cited: 5
Marek R. Ogiela, Lidia Ogiela
(2016), pp. 40-43
Closed Access | Times Cited: 5
A service model for nutrition supplement prediction based on Fuzzy Bayes model using bigdata in livestock
Saraswathi Sivamani, Jongsun Choi, Yongyun Cho
Annals of Operations Research (2017) Vol. 265, Iss. 2, pp. 257-268
Closed Access | Times Cited: 5
Saraswathi Sivamani, Jongsun Choi, Yongyun Cho
Annals of Operations Research (2017) Vol. 265, Iss. 2, pp. 257-268
Closed Access | Times Cited: 5
Layered multicast for reliable event notification over large-scale networks
Christian Esposito, Aniello Castiglione, Francesco Palmieri
Information Sciences (2016) Vol. 379, pp. 177-194
Closed Access | Times Cited: 4
Christian Esposito, Aniello Castiglione, Francesco Palmieri
Information Sciences (2016) Vol. 379, pp. 177-194
Closed Access | Times Cited: 4