
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Stackelberg games for modeling defense scenarios against cloud security threats
Agnieszka Jakóbik, Francesco Palmieri, Joanna Kołodziej
Journal of Network and Computer Applications (2018) Vol. 110, pp. 99-107
Closed Access | Times Cited: 19
Agnieszka Jakóbik, Francesco Palmieri, Joanna Kołodziej
Journal of Network and Computer Applications (2018) Vol. 110, pp. 99-107
Closed Access | Times Cited: 19
Showing 19 citing articles:
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things
Guowen Wu, Lanlan Xie, Hong Zhang, et al.
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103608-103608
Closed Access | Times Cited: 43
Guowen Wu, Lanlan Xie, Hong Zhang, et al.
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103608-103608
Closed Access | Times Cited: 43
A Risk Management Approach to Defending Against the Advanced Persistent Threat
Lu‐Xing Yang, Pengdeng Li, Xiaofan Yang, et al.
IEEE Transactions on Dependable and Secure Computing (2018) Vol. 17, Iss. 6, pp. 1163-1172
Closed Access | Times Cited: 65
Lu‐Xing Yang, Pengdeng Li, Xiaofan Yang, et al.
IEEE Transactions on Dependable and Secure Computing (2018) Vol. 17, Iss. 6, pp. 1163-1172
Closed Access | Times Cited: 65
Stackelberg game-based task offloading and pricing with computing capacity constraint in mobile edge computing
Zhao Tong, Xin Deng, Jing Mei, et al.
Journal of Systems Architecture (2023) Vol. 137, pp. 102847-102847
Closed Access | Times Cited: 21
Zhao Tong, Xin Deng, Jing Mei, et al.
Journal of Systems Architecture (2023) Vol. 137, pp. 102847-102847
Closed Access | Times Cited: 21
A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 5
Komal Singh Gill, Anju Sharma, Sharad Saxena
Archives of Computational Methods in Engineering (2024)
Closed Access | Times Cited: 5
Efficient on-the-fly Web bot detection
Grażyna Suchacka, Alberto Cabri, Stefano Rovetta, et al.
Knowledge-Based Systems (2021) Vol. 223, pp. 107074-107074
Open Access | Times Cited: 24
Grażyna Suchacka, Alberto Cabri, Stefano Rovetta, et al.
Knowledge-Based Systems (2021) Vol. 223, pp. 107074-107074
Open Access | Times Cited: 24
GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot
Komal Singh Gill, Sharad Saxena, Anju Sharma
Computers & Security (2020) Vol. 92, pp. 101732-101732
Closed Access | Times Cited: 24
Komal Singh Gill, Sharad Saxena, Anju Sharma
Computers & Security (2020) Vol. 92, pp. 101732-101732
Closed Access | Times Cited: 24
Stackelberg game modeling of cloud security defending strategy in the case of information leaks and corruption
Agnieszka Jakóbik
Simulation Modelling Practice and Theory (2020) Vol. 103, pp. 102071-102071
Closed Access | Times Cited: 10
Agnieszka Jakóbik
Simulation Modelling Practice and Theory (2020) Vol. 103, pp. 102071-102071
Closed Access | Times Cited: 10
Multi-Player Evolutionary Game of Network Attack and Defense Based on System Dynamics
Pengxi Yang, Fei Gao, Hua Zhang
Mathematics (2021) Vol. 9, Iss. 23, pp. 3014-3014
Open Access | Times Cited: 9
Pengxi Yang, Fei Gao, Hua Zhang
Mathematics (2021) Vol. 9, Iss. 23, pp. 3014-3014
Open Access | Times Cited: 9
CATS: A Serious Game in Industry Towards Stronger Cloud Security
Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, et al.
Communications in computer and information science (2023), pp. 64-82
Closed Access | Times Cited: 3
Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque, et al.
Communications in computer and information science (2023), pp. 64-82
Closed Access | Times Cited: 3
Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing
Abdelkarim Ait Temghart, Mbarek Marwan, Mohamed Baslam
Security and Communication Networks (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 3
Abdelkarim Ait Temghart, Mbarek Marwan, Mohamed Baslam
Security and Communication Networks (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 3
Multi-level Authentication-Based Secure Aware Data Transaction on Cloud Using Cyclic Shift Transposition Algorithm
Prasanta Kumar Bal, Sateesh Kumar Pradhan
Lecture notes in networks and systems (2020), pp. 384-393
Closed Access | Times Cited: 8
Prasanta Kumar Bal, Sateesh Kumar Pradhan
Lecture notes in networks and systems (2020), pp. 384-393
Closed Access | Times Cited: 8
The optimal privacy strategy of cloud service based on evolutionary game
Pan Sun
Cluster Computing (2020) Vol. 25, Iss. 1, pp. 13-31
Closed Access | Times Cited: 7
Pan Sun
Cluster Computing (2020) Vol. 25, Iss. 1, pp. 13-31
Closed Access | Times Cited: 7
Modeling Virtual Machine Migration as a Security Mechanism by using Continuous-Time Markov Chain Model
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, et al.
(2019), pp. 1-6
Closed Access | Times Cited: 5
El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, et al.
(2019), pp. 1-6
Closed Access | Times Cited: 5
Special issue on security in cloud computing
Jin Li, Aniello Castiglione, Changyu Dong
Journal of Network and Computer Applications (2018) Vol. 110, pp. 97-98
Closed Access | Times Cited: 4
Jin Li, Aniello Castiglione, Changyu Dong
Journal of Network and Computer Applications (2018) Vol. 110, pp. 97-98
Closed Access | Times Cited: 4
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Pan Sun
Security and Communication Networks (2020) Vol. 2020, pp. 1-18
Open Access | Times Cited: 4
Pan Sun
Security and Communication Networks (2020) Vol. 2020, pp. 1-18
Open Access | Times Cited: 4
Game Theoretic Approaches to Mitigate Cloud Security Risks: An Initial Insight
Abdelkarim Ait Temghart, M’hamed Outanoute, Mbarek Marwan
Lecture notes in business information processing (2021), pp. 335-347
Closed Access | Times Cited: 4
Abdelkarim Ait Temghart, M’hamed Outanoute, Mbarek Marwan
Lecture notes in business information processing (2021), pp. 335-347
Closed Access | Times Cited: 4
Understanding User Behavior for Enhancing Cybersecurity Training with Immersive Gamified Platforms
Nikitha Donekal Chandrashekar, A. Maughan Lee, Mohamed Azab, et al.
Information (2024) Vol. 15, Iss. 12, pp. 814-814
Open Access
Nikitha Donekal Chandrashekar, A. Maughan Lee, Mohamed Azab, et al.
Information (2024) Vol. 15, Iss. 12, pp. 814-814
Open Access
Analysis of Stackelberg Leadership Model Output Behavior under the Mechanism of Expanding Market Price
Tyrone T. Lin, Shu-Yen Hsu, Chiao‐Chen Chang
2021 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2018), pp. 1603-1607
Closed Access | Times Cited: 1
Tyrone T. Lin, Shu-Yen Hsu, Chiao‐Chen Chang
2021 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) (2018), pp. 1603-1607
Closed Access | Times Cited: 1
Defending against fake VIP in scant-transparency information systems with QoS differentiation
Jerzy Konorski
Information Sciences (2022) Vol. 607, pp. 831-848
Open Access
Jerzy Konorski
Information Sciences (2022) Vol. 607, pp. 831-848
Open Access