OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SecureEngine: Spammer classification in cyber defence for leveraging green computing in Sustainable city
Aaisha Makkar
Sustainable Cities and Society (2022) Vol. 79, pp. 103658-103658
Closed Access | Times Cited: 7

Showing 7 citing articles:

Experts and intelligent systems for smart homes’ Transformation to Sustainable Smart Cities: A comprehensive review
Noor Ul Huda, Ijaz Ahmed, Muhammad Adnan, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122380-122380
Closed Access | Times Cited: 79

Static Multi Feature-Based Malware Detection Using Multi SPP-net in Smart IoT Environments
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2487-2500
Closed Access | Times Cited: 13

Heuristic green computing based energy management with security enhancement using hybrid greedy secure optimal routing protocol
A. Sheryl Oliver, Bhavani Ravi, R. Manikandan, et al.
Energy Reports (2023) Vol. 9, pp. 2494-2505
Open Access | Times Cited: 8

Information Security Applications in Smart Cities: A Bibliometric Analysis of Emerging Research
Thiago Poleto, Thyago Celso Cavalcante Nepomuceno, Victor Diogho Heuer de Carvalho, et al.
Future Internet (2023) Vol. 15, Iss. 12, pp. 393-393
Open Access | Times Cited: 4

Green Computing and Security Practices for Optimizing Crawler Efficiency
Mai Ramadan Ibraheem
2022 International Telecommunications Conference (ITC-Egypt) (2023), pp. 151-156
Closed Access | Times Cited: 1

Enhancing System Security by Intrusion Detection Using Deep Learning
Lakshit Sama, Hua Wang, Paul Watters
Lecture notes in computer science (2022), pp. 169-176
Closed Access | Times Cited: 2

Developing a Deep Learning Model to Classify Malicious User on Social Networks
Samant Verma, Shailja Shukla
(2023), pp. 1-6
Closed Access

Page 1

Scroll to top