OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis
Alka Agrawal, Abhishek Pandey, Abdullah Baz, et al.
IEEE Access (2020) Vol. 8, pp. 135770-135783
Open Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Systematic Mapping Study on Security Approaches in Secure Software Engineering
Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, et al.
IEEE Access (2021) Vol. 9, pp. 19139-19160
Open Access | Times Cited: 56

Hybrid MCDM Model for Location of Logistics Hub: A Case in China Under the Belt and Road Initiative
Xinfang Zhang, Jing Lu, Yan Peng
IEEE Access (2021) Vol. 9, pp. 41227-41245
Open Access | Times Cited: 42

Internet of Things in healthcare: An adaptive ethical framework for IoT in digital health
Abubakar Wakili, Sara Bakkali
Clinical eHealth (2024) Vol. 7, pp. 92-105
Open Access | Times Cited: 6

An integrated rough-fuzzy WINGS-ISM method with an application in ASSCM
Muwen Wang, Yiwen Zhang, Yuan Tian, et al.
Expert Systems with Applications (2022) Vol. 212, pp. 118843-118843
Open Access | Times Cited: 22

A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia
Ahmad Alshammari
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 4, pp. 11445-11450
Open Access | Times Cited: 12

Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach
Pritika Pritika, Bharanidharan Shanmugam, Sami Azam
Sensors (2024) Vol. 24, Iss. 10, pp. 3223-3223
Open Access | Times Cited: 3

Research on privacy protection in the context of healthcare data based on knowledge map
Ting Ouyang, Jianhua Yang, Zongyun Gu, et al.
Medicine (2024) Vol. 103, Iss. 33, pp. e39370-e39370
Open Access | Times Cited: 3

Information Security Maturity Model for Healthcare Organizations in the United States
Bridget Barnes, Tuğrul Daim
IEEE Transactions on Engineering Management (2022) Vol. 71, pp. 928-939
Open Access | Times Cited: 13

Security management of BYOD and cloud environment in Saudi Arabia
Khalid Ali Almarhabi, Adel A. Bahaddad, Ahmed Mohammed Alghamdi
Alexandria Engineering Journal (2022) Vol. 63, pp. 103-114
Open Access | Times Cited: 13

A Framework of Software Project Scope Definition Elements: An ISM-DEMATEL Approach
Isma ul Hassan, Sohail Asghar
IEEE Access (2021) Vol. 9, pp. 26839-26870
Open Access | Times Cited: 17

Cybersecurity in health sector: a systematic review of the literature
Catherine Vanessa Peve Herrera, J. Valcárcel, Mónica Díaz, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2023) Vol. 31, Iss. 2, pp. 1099-1099
Open Access | Times Cited: 5

Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
Aljuaid Turkea Ayedh M, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8048-8048
Open Access | Times Cited: 5

A neuro-fuzzy based healthcare framework for disease analysis and prediction
Rajganesh Nagarajan, Ramkumar Thirunavukarasu
Multimedia Tools and Applications (2022) Vol. 81, Iss. 8, pp. 11737-11753
Closed Access | Times Cited: 8

Clinical Text Data Categorization and Feature Extraction Using Medical-Fissure Algorithm and Neg-Seq Algorithm
Naveen S Pagad, N. Pradeep, Khalid K. Almuzaini, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8

Data Analytics, Digital Transformation, and Cybersecurity Perspectives in Healthcare
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam, et al.
Communications in computer and information science (2024), pp. 71-89
Closed Access | Times Cited: 1

Designing A Standard-Based Approach for Security of Healthcare Systems
Sara Abuasal, Kh Alsarayra, Z Alyabroodie
Journal of Statistics Applications & Probability (2023) Vol. 13, Iss. 1, pp. 419-434
Open Access | Times Cited: 3

Estimating Security Risk of Healthcare Web Applications: A Design Perspective
Fahad Alzahrani
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 67, Iss. 1, pp. 187-209
Open Access | Times Cited: 6

Maximum Decision Support Regression-Based Advance Secure Data Encrypt Transmission for Healthcare Data Sharing in the Cloud Computing
V. Anusuya, B. J. Bejoy, Mahalingam Ramkumar, et al.
Lecture notes in networks and systems (2023), pp. 39-51
Closed Access | Times Cited: 2

Prioritization of Medical Image Security Features: Fuzzy AHP Approaches
Satish Kumar, M. Shenbaga Devi, Sunil K. Singh, et al.
(2023) Vol. 54, pp. 540-545
Closed Access | Times Cited: 2

Evaluating the Impact of Software Security Tactics: A Design Perspective
Mamdouh Alenezi, Abhishek Pandey, Richa Verma, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 66, Iss. 3, pp. 2283-2299
Open Access | Times Cited: 4

Blood Bank with Philanthropic Match Maker in Cloud Computing
Dino Giftlin Daniel, M. Rajasekar
(2024), pp. 844-849
Closed Access

A method and validation for auditing e-Health applications based on reusable software security requirements specifications
Carlos Michael Mejía-Granda, José Luis Fernández‐Alemán, Juan Manuel Carrillo de Gea, et al.
International Journal of Medical Informatics (2024) Vol. 194, pp. 105699-105699
Closed Access

Designing Effective User Interfaces for Technology-based IPO Investment Platforms
Sachin Prakash Srivastava, Sonali Srivastava, Gurmanjot Singh
(2024), pp. 1-5
Closed Access

Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective
Wajdi Alhakami, Abdullah Baz, Hosam Alhakami, et al.
Symmetry (2020) Vol. 12, Iss. 12, pp. 2089-2089
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top