
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing
Shailendra Rathore, Pradip Kumar Sharma, Arun Kumar Sangaiah, et al.
IEEE Access (2017) Vol. 6, pp. 688-701
Open Access | Times Cited: 35
Shailendra Rathore, Pradip Kumar Sharma, Arun Kumar Sangaiah, et al.
IEEE Access (2017) Vol. 6, pp. 688-701
Open Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 196-248
Open Access | Times Cited: 471
Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 196-248
Open Access | Times Cited: 471
Machine Learning Meets Computation and Communication Control in Evolving Edge and Cloud: Challenges and Future Perspective
Tiago Koketsu Rodrigues, Katsuya Suto, Hiroki Nishiyama, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 38-67
Closed Access | Times Cited: 229
Tiago Koketsu Rodrigues, Katsuya Suto, Hiroki Nishiyama, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 38-67
Closed Access | Times Cited: 229
AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope
Ashish Singh, Suresh Chandra Satapathy, Arnab Roy, et al.
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9801-9831
Closed Access | Times Cited: 78
Ashish Singh, Suresh Chandra Satapathy, Arnab Roy, et al.
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9801-9831
Closed Access | Times Cited: 78
Zero Touch Management: A Survey of Network Automation Solutions for 5G and 6G Networks
Estefanía Coronado, Rasoul Behravesh, Tejas Subramanya, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2535-2578
Open Access | Times Cited: 70
Estefanía Coronado, Rasoul Behravesh, Tejas Subramanya, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2535-2578
Open Access | Times Cited: 70
Fuzzy Workload Orchestration for Edge Computing
Cagatay Sonmez, Atay Özgövde, Cem Ersoy
IEEE Transactions on Network and Service Management (2019) Vol. 16, Iss. 2, pp. 769-782
Closed Access | Times Cited: 125
Cagatay Sonmez, Atay Özgövde, Cem Ersoy
IEEE Transactions on Network and Service Management (2019) Vol. 16, Iss. 2, pp. 769-782
Closed Access | Times Cited: 125
A Blockchain Tokenizer for Industrial IOT trustless applications
Daniele Mazzei, Giacomo Baldi, Gualtiero Fantoni, et al.
Future Generation Computer Systems (2019) Vol. 105, pp. 432-445
Closed Access | Times Cited: 106
Daniele Mazzei, Giacomo Baldi, Gualtiero Fantoni, et al.
Future Generation Computer Systems (2019) Vol. 105, pp. 432-445
Closed Access | Times Cited: 106
BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network
Shailendra Rathore, Yi Pan, Jong Hyuk Park
Sustainability (2019) Vol. 11, Iss. 14, pp. 3974-3974
Open Access | Times Cited: 82
Shailendra Rathore, Yi Pan, Jong Hyuk Park
Sustainability (2019) Vol. 11, Iss. 14, pp. 3974-3974
Open Access | Times Cited: 82
CPT‐TODIM method for bipolar fuzzy multi‐attribute group decision making and its application to network security service provider selection
Mengwei Zhao, Guiwu Wei, Cun Wei, et al.
International Journal of Intelligent Systems (2021) Vol. 36, Iss. 5, pp. 1943-1969
Open Access | Times Cited: 48
Mengwei Zhao, Guiwu Wei, Cun Wei, et al.
International Journal of Intelligent Systems (2021) Vol. 36, Iss. 5, pp. 1943-1969
Open Access | Times Cited: 48
Intelligent monitoring for infectious diseases with fuzzy systems and edge computing: A survey
Qinting Jiang, Xuanhong Zhou, Ruili Wang, et al.
Applied Soft Computing (2022) Vol. 123, pp. 108835-108835
Closed Access | Times Cited: 33
Qinting Jiang, Xuanhong Zhou, Ruili Wang, et al.
Applied Soft Computing (2022) Vol. 123, pp. 108835-108835
Closed Access | Times Cited: 33
An integrated Fuzzy-BWM, Fuzzy-LBWA and V-Fuzzy-CoCoSo-LD model for gateway selection in fog-bolstered Internet of Things
Sunday Oyinlola Ogundoyin, Ismaila Adeniyi Kamil
Applied Soft Computing (2023) Vol. 143, pp. 110393-110393
Closed Access | Times Cited: 19
Sunday Oyinlola Ogundoyin, Ismaila Adeniyi Kamil
Applied Soft Computing (2023) Vol. 143, pp. 110393-110393
Closed Access | Times Cited: 19
A Review on the Immediate Advancement of the Internet of Things in Wireless Telecommunications
Kamalrulnizam Abu Bakar, Fatima Tul Zuhra, Babangida Isyaku, et al.
IEEE Access (2023) Vol. 11, pp. 21020-21048
Open Access | Times Cited: 18
Kamalrulnizam Abu Bakar, Fatima Tul Zuhra, Babangida Isyaku, et al.
IEEE Access (2023) Vol. 11, pp. 21020-21048
Open Access | Times Cited: 18
An approach for the secure management of hybrid cloud–edge environments
Antonio Celesti, Maria Fazio, Antonino Galletta, et al.
Future Generation Computer Systems (2018) Vol. 90, pp. 1-19
Closed Access | Times Cited: 50
Antonio Celesti, Maria Fazio, Antonino Galletta, et al.
Future Generation Computer Systems (2018) Vol. 90, pp. 1-19
Closed Access | Times Cited: 50
Design and exploration of load balancers for fog computing using fuzzy logic
Simar Preet Singh, Anju Sharma, Rajesh Kumar
Simulation Modelling Practice and Theory (2019) Vol. 101, pp. 102017-102017
Closed Access | Times Cited: 48
Simar Preet Singh, Anju Sharma, Rajesh Kumar
Simulation Modelling Practice and Theory (2019) Vol. 101, pp. 102017-102017
Closed Access | Times Cited: 48
Social mining-based clustering process for big-data integration
Hoill Jung, Kyungyong Chung
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 1, pp. 589-600
Closed Access | Times Cited: 41
Hoill Jung, Kyungyong Chung
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 12, Iss. 1, pp. 589-600
Closed Access | Times Cited: 41
Understanding user acceptance of blockchain-based smart locker
Jiunn-Woei Lian, Chih-Teng Chen, Shen Lifang, et al.
The Electronic Library (2020) Vol. 38, Iss. 2, pp. 353-366
Closed Access | Times Cited: 33
Jiunn-Woei Lian, Chih-Teng Chen, Shen Lifang, et al.
The Electronic Library (2020) Vol. 38, Iss. 2, pp. 353-366
Closed Access | Times Cited: 33
A neutrosophic theory based security approach for fog and mobile-edge computing
Mohamed Abdel‐Basset, Gunasekaran Manogaran, Mai Mohamed
Computer Networks (2019) Vol. 157, pp. 122-132
Closed Access | Times Cited: 34
Mohamed Abdel‐Basset, Gunasekaran Manogaran, Mai Mohamed
Computer Networks (2019) Vol. 157, pp. 122-132
Closed Access | Times Cited: 34
Sustainable Assessment for Selecting the Best Alternative of Reclaimed Water Use Under Hesitant Fuzzy Multi-Criteria Decision Making
Samayan Narayanamoorthy, Veerappan Annapoorani, Daekook Kang, et al.
IEEE Access (2019) Vol. 7, pp. 137217-137231
Open Access | Times Cited: 25
Samayan Narayanamoorthy, Veerappan Annapoorani, Daekook Kang, et al.
IEEE Access (2019) Vol. 7, pp. 137217-137231
Open Access | Times Cited: 25
Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing
Md. Delowar Hossain, Tangina Sultana, VanDung Nguyen, et al.
Applied Sciences (2020) Vol. 10, Iss. 9, pp. 3115-3115
Open Access | Times Cited: 21
Md. Delowar Hossain, Tangina Sultana, VanDung Nguyen, et al.
Applied Sciences (2020) Vol. 10, Iss. 9, pp. 3115-3115
Open Access | Times Cited: 21
AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing
Han‐Chieh Chao, Hsin‐Te Wu, Fan‐Hsun Tseng
Sustainability (2021) Vol. 13, Iss. 6, pp. 3048-3048
Open Access | Times Cited: 13
Han‐Chieh Chao, Hsin‐Te Wu, Fan‐Hsun Tseng
Sustainability (2021) Vol. 13, Iss. 6, pp. 3048-3048
Open Access | Times Cited: 13
Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications
VanDung Nguyen, Tran Trong Khanh, T. D. Nguyen, et al.
Journal of Cloud Computing Advances Systems and Applications (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 13
VanDung Nguyen, Tran Trong Khanh, T. D. Nguyen, et al.
Journal of Cloud Computing Advances Systems and Applications (2020) Vol. 9, Iss. 1
Open Access | Times Cited: 13
A blockchain-based trusted security zone architecture
Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia, et al.
The Electronic Library (2019) Vol. 37, Iss. 5, pp. 796-810
Closed Access | Times Cited: 10
Jeong Hoon Jo, Shailendra Rathore, Vincenzo Loia, et al.
The Electronic Library (2019) Vol. 37, Iss. 5, pp. 796-810
Closed Access | Times Cited: 10
A Novel Approach to Support Failure Mode, Effects, and Criticality Analysis Based on Complex Networks
Lixiang Wang, Wei Dai, Guixiu Luo, et al.
Entropy (2019) Vol. 21, Iss. 12, pp. 1230-1230
Open Access | Times Cited: 9
Lixiang Wang, Wei Dai, Guixiu Luo, et al.
Entropy (2019) Vol. 21, Iss. 12, pp. 1230-1230
Open Access | Times Cited: 9
Remote Identity Verification Using Gait Analysis and Face Recognition
Wen Si, Jing Zhang, Yudong Li, et al.
Wireless Communications and Mobile Computing (2020) Vol. 2020, pp. 1-10
Open Access | Times Cited: 8
Wen Si, Jing Zhang, Yudong Li, et al.
Wireless Communications and Mobile Computing (2020) Vol. 2020, pp. 1-10
Open Access | Times Cited: 8
Fuzzy‐Based Mobile Edge Orchestrators in Heterogeneous IoT Environments: An Online Workload Balancing Approach
Tran Trong Khanh, VanDung Nguyen, Eui‐Nam Huh
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 7
Tran Trong Khanh, VanDung Nguyen, Eui‐Nam Huh
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 7
Construction of U2S communications system based on edge fog computing
Yang Li
Computer Communications (2020) Vol. 153, pp. 569-579
Closed Access | Times Cited: 7
Yang Li
Computer Communications (2020) Vol. 153, pp. 569-579
Closed Access | Times Cited: 7