OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 17 citing articles:

A novel 2D Log-Logistic–Sine chaotic map for image encryption
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 7

Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Telecommunication Systems (2025) Vol. 88, Iss. 1
Open Access

Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques
Kousik Barik, Sanjay Misra, Sabarathinam Chockalingam
Communications in computer and information science (2025), pp. 87-105
Closed Access

VLSI architecture of a True Random Number Generator with hierarchical Von Neumann corrector and hybrid run length-Golomb coding for data compression
G. Manavaalan, Sankar Jayaram, S. Gunasekaran
Analog Integrated Circuits and Signal Processing (2025) Vol. 123, Iss. 3
Closed Access

Robust Encryption Framework for IoT Devices Based on Bit-plane Extraction, Chaotic Sine Models, and Quantum Operations
Mujeeb Ur Rehman, Arslan Shafqiue
Internet of Things (2024) Vol. 27, pp. 101241-101241
Open Access | Times Cited: 3

A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling
Pengfei Cao, Lin Teng
Nonlinear Dynamics (2024) Vol. 112, Iss. 15, pp. 13539-13569
Closed Access | Times Cited: 2

Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
Sakshi Dhall, Khushboo Yadav
Nonlinear Dynamics (2024) Vol. 112, Iss. 17, pp. 14719-14744
Closed Access | Times Cited: 2

Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access | Times Cited: 1

Enhancing Internet of Things communications: Development of a new S-box and multi-layer encryption framework
Adel R. Alharbi, Amer Aljaedi, Abdullah Aljuhni, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 10, pp. 102265-102265
Open Access | Times Cited: 1

Survey on medical image encryption: From classical to deep learning-based approaches
Shiv Prasad, Amit Kumar Singh
Computers & Electrical Engineering (2024) Vol. 123, pp. 110011-110011
Closed Access | Times Cited: 1

Quantum Computing and Machine Learning for Advanced Cybersecurity Solutions
S. Deepajothi, Caroline Selvi, P. Shanmugaraja, et al.
Advances in computer and electrical engineering book series (2024), pp. 309-338
Closed Access

Quantum Machine Learning for Enhanced Cybersecurity: Proposing a Hypothetical Framework for Next-Generation Security Solutions
Md. Forhad Hossain, Kamrul Hasan, Al Amin, et al.
Journal of Technologies Information and Communication (2024) Vol. 4, Iss. 1, pp. 32222-32222
Closed Access

Counter-Offset mode: A new paradigm in resisting differential cryptanalysis
Faisal Muhammad, Nawaz Yasir
Trends in Computer Science and Information Technology (2024) Vol. 9, Iss. 1, pp. 034-041
Open Access

Exploring the Frontier
Navya Sree Anagani, Rajesh Doriya, Chandrasekhar Jatoth
Advances in information security, privacy, and ethics book series (2024), pp. 1-36
Closed Access

Page 1

Scroll to top