
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, et al.
IEEE Access (2021) Vol. 9, pp. 57792-57807
Open Access | Times Cited: 225
Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, et al.
IEEE Access (2021) Vol. 9, pp. 57792-57807
Open Access | Times Cited: 225
Showing 1-25 of 225 citing articles:
From Corrective to Predictive Maintenance—A Review of Maintenance Approaches for the Power Industry
Marek Molęda, Bożena Małysiak-Mrozek, Weiping Ding, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 5970-5970
Open Access | Times Cited: 69
Marek Molęda, Bożena Małysiak-Mrozek, Weiping Ding, et al.
Sensors (2023) Vol. 23, Iss. 13, pp. 5970-5970
Open Access | Times Cited: 69
On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security
Alexandr Kuznetsov, Paolo Sernani, Luca Romeo, et al.
IEEE Access (2024) Vol. 12, pp. 3881-3897
Open Access | Times Cited: 30
Alexandr Kuznetsov, Paolo Sernani, Luca Romeo, et al.
IEEE Access (2024) Vol. 12, pp. 3881-3897
Open Access | Times Cited: 30
Possible Applications of Edge Computing in the Manufacturing Industry—Systematic Literature Review
Kacper Kubiak, Grzegorz Dec, Dorota Stadnicka
Sensors (2022) Vol. 22, Iss. 7, pp. 2445-2445
Open Access | Times Cited: 38
Kacper Kubiak, Grzegorz Dec, Dorota Stadnicka
Sensors (2022) Vol. 22, Iss. 7, pp. 2445-2445
Open Access | Times Cited: 38
Decoding the data economy: a literature review of its impact on business, society and digital transformation
Andrea Sestino, Adham Kahlawi, Andrea De Mauro
European Journal of Innovation Management (2023)
Closed Access | Times Cited: 36
Andrea Sestino, Adham Kahlawi, Andrea De Mauro
European Journal of Innovation Management (2023)
Closed Access | Times Cited: 36
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 28
Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 28
Achieving Balance Between Innovation and Security in the Cloud With Artificial Intelligence of Things
R. Sundar, P. Balaji Srikaanth, Darshana A. Naik, et al.
Advances in web technologies and engineering book series (2024), pp. 1-26
Closed Access | Times Cited: 14
R. Sundar, P. Balaji Srikaanth, Darshana A. Naik, et al.
Advances in web technologies and engineering book series (2024), pp. 1-26
Closed Access | Times Cited: 14
Human–machine interaction towards Industry 5.0: Human-centric smart manufacturing
Jialu Yang, Ying Liu, Phillip L. Morgan
Digital engineering. (2024) Vol. 2, pp. 100013-100013
Open Access | Times Cited: 13
Jialu Yang, Ying Liu, Phillip L. Morgan
Digital engineering. (2024) Vol. 2, pp. 100013-100013
Open Access | Times Cited: 13
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges
Annas Wasim Malik, David Samuel Bhatti, Tae‐Jin Park, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 433-433
Open Access | Times Cited: 12
Annas Wasim Malik, David Samuel Bhatti, Tae‐Jin Park, et al.
Sensors (2024) Vol. 24, Iss. 2, pp. 433-433
Open Access | Times Cited: 12
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl Safran, et al.
IEEE Access (2024) Vol. 12, pp. 26334-26343
Open Access | Times Cited: 9
Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl Safran, et al.
IEEE Access (2024) Vol. 12, pp. 26334-26343
Open Access | Times Cited: 9
An Imperative Role of Digitalization in Monitoring Cattle Health for Sustainability
Devendra Singh, Rajesh Singh, Anita Gehlot, et al.
Electronics (2022) Vol. 11, Iss. 17, pp. 2702-2702
Open Access | Times Cited: 34
Devendra Singh, Rajesh Singh, Anita Gehlot, et al.
Electronics (2022) Vol. 11, Iss. 17, pp. 2702-2702
Open Access | Times Cited: 34
Design of Hybrid Authentication Protocol for High Secure Applications in Cloud Environments
Sai Srinivas Vellela, R. Balamanigandan
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (2022), pp. 408-414
Closed Access | Times Cited: 34
Sai Srinivas Vellela, R. Balamanigandan
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (2022), pp. 408-414
Closed Access | Times Cited: 34
Cloud data security and various cryptographic algorithms
Yahia Alemami, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 2, pp. 1867-1867
Open Access | Times Cited: 31
Yahia Alemami, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2022) Vol. 13, Iss. 2, pp. 1867-1867
Open Access | Times Cited: 31
Privilege Escalation Attack Detection and Mitigation in Cloud Using Machine Learning
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 21
Muhammad Mehmood, Rashid Amin, Muhana Magboul Ali Muslam, et al.
IEEE Access (2023) Vol. 11, pp. 46561-46576
Open Access | Times Cited: 21
Blockchain based secure medical data outsourcing with data deduplication in cloud environment
T. Benil, J. Jasper
Computer Communications (2023) Vol. 209, pp. 1-13
Closed Access | Times Cited: 19
T. Benil, J. Jasper
Computer Communications (2023) Vol. 209, pp. 1-13
Closed Access | Times Cited: 19
Innovations in Security: A Study of Cloud Computing and IoT
Hamza Azam, Muhammed Ahnaf Tajwar, Sathesan Mayhialagan, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 18
Hamza Azam, Muhammed Ahnaf Tajwar, Sathesan Mayhialagan, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 18
A Survey on Resource Management for Cloud Native Mobile Computing: Opportunities and Challenges
Shih-Yun Huang, Cheng‐Yu Chen, Jen‐Yeu Chen, et al.
Symmetry (2023) Vol. 15, Iss. 2, pp. 538-538
Open Access | Times Cited: 17
Shih-Yun Huang, Cheng‐Yu Chen, Jen‐Yeu Chen, et al.
Symmetry (2023) Vol. 15, Iss. 2, pp. 538-538
Open Access | Times Cited: 17
Cloud Computing Network Empowered by Modern Topological Invariants
Khalid Hamid, Muhammad Waseem Iqbal, Qaiser Abbas, et al.
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1399-1399
Open Access | Times Cited: 13
Khalid Hamid, Muhammad Waseem Iqbal, Qaiser Abbas, et al.
Applied Sciences (2023) Vol. 13, Iss. 3, pp. 1399-1399
Open Access | Times Cited: 13
Cloud Computing Infrastructure, Platforms, and Software for Scientific Research
Prateek Mathur
Series in bioengineering (2024), pp. 89-127
Closed Access | Times Cited: 4
Prateek Mathur
Series in bioengineering (2024), pp. 89-127
Closed Access | Times Cited: 4
Advanced Deep Learning Models for 6G: Overview, Opportunities and Challenges
Licheng Jiao, Y Shao, Long Sun, et al.
IEEE Access (2024) Vol. 12, pp. 133245-133314
Open Access | Times Cited: 4
Licheng Jiao, Y Shao, Long Sun, et al.
IEEE Access (2024) Vol. 12, pp. 133245-133314
Open Access | Times Cited: 4
Survey on Secure Scientific Workflow Scheduling in Cloud Environments
Hadeel Amjed Saeed, Sufyan Al-Janabi, Esam Taha Yassen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 51-51
Open Access
Hadeel Amjed Saeed, Sufyan Al-Janabi, Esam Taha Yassen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 51-51
Open Access
Optimizing English translation processing of conceptual metaphors in big data technology texts
Wenbo Ma
Advances in Continuous and Discrete Models (2025) Vol. 2025, Iss. 1
Open Access
Wenbo Ma
Advances in Continuous and Discrete Models (2025) Vol. 2025, Iss. 1
Open Access
Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education
Abeer Qashou, Nurhidayah Bahar, Hazura Mohamed
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Abeer Qashou, Nurhidayah Bahar, Hazura Mohamed
Security and Privacy (2025) Vol. 8, Iss. 2
Closed Access
Restricting Unauthorised Access Using Aws Cloud
Ke Bai, Sumeet Bhargava, Vinay Kiran, et al.
Smart innovation, systems and technologies (2025), pp. 509-518
Closed Access
Ke Bai, Sumeet Bhargava, Vinay Kiran, et al.
Smart innovation, systems and technologies (2025), pp. 509-518
Closed Access
QoS-aware resource management in cloud computing based on fuzzy meta-heuristic method
Guiling Long, Shaorong Wang, Cong Lv
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Guiling Long, Shaorong Wang, Cong Lv
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Future Directions in Digital Forensics and Cybersecurity
Elipe Arjun, Priyanka Singh
(2025), pp. 333-365
Closed Access
Elipe Arjun, Priyanka Singh
(2025), pp. 333-365
Closed Access