
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A survey on security of Hadoop
Masoumeh Rezaei Jam, Leyli Mohammad Khanli, Morteza Sargolzaei Javan, et al.
(2014)
Closed Access | Times Cited: 40
Masoumeh Rezaei Jam, Leyli Mohammad Khanli, Morteza Sargolzaei Javan, et al.
(2014)
Closed Access | Times Cited: 40
Showing 1-25 of 40 citing articles:
A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle
Longhua Guo, Mianxiong Dong, Kaoru Ota, et al.
IEEE Internet of Things Journal (2017) Vol. 4, Iss. 2, pp. 601-610
Open Access | Times Cited: 141
Longhua Guo, Mianxiong Dong, Kaoru Ota, et al.
IEEE Internet of Things Journal (2017) Vol. 4, Iss. 2, pp. 601-610
Open Access | Times Cited: 141
Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
Gayatri Kapil, Alka Agrawal, Abdulaziz Attaallah, et al.
PeerJ Computer Science (2020) Vol. 6, pp. e259-e259
Open Access | Times Cited: 39
Gayatri Kapil, Alka Agrawal, Abdulaziz Attaallah, et al.
PeerJ Computer Science (2020) Vol. 6, pp. e259-e259
Open Access | Times Cited: 39
An approach for enhancing data confidentiality in Hadoop
Shahab Wahhab Kareem, Raghad Zuhair Yousif, Shadan Mohammed Jihad Abdalwahid
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 20, Iss. 3, pp. 1547-1547
Open Access | Times Cited: 27
Shahab Wahhab Kareem, Raghad Zuhair Yousif, Shadan Mohammed Jihad Abdalwahid
Indonesian Journal of Electrical Engineering and Computer Science (2020) Vol. 20, Iss. 3, pp. 1547-1547
Open Access | Times Cited: 27
Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?
Sethuraman Srinivas, Archana R Nair
(2015) Vol. 2, pp. 739-744
Closed Access | Times Cited: 25
Sethuraman Srinivas, Archana R Nair
(2015) Vol. 2, pp. 739-744
Closed Access | Times Cited: 25
HEAP: An Efficient and Fault-Tolerant Authentication and Key Exchange Protocol for Hadoop-Assisted Big Data Platform
Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das, et al.
IEEE Access (2018) Vol. 6, pp. 75342-75382
Open Access | Times Cited: 19
Durbadal Chattaraj, Monalisa Sarma, Ashok Kumar Das, et al.
IEEE Access (2018) Vol. 6, pp. 75342-75382
Open Access | Times Cited: 19
ENHANCING APPROACH USING HYBRID PAILLER AND RSA FOR INFORMATION SECURITY IN BIGDATA
Shadan Mohammed Jihad Abdalwahid, Raghad Zuhair Yousif, Shahab Wahhab Kareem
Applied Computer Science (2019) Vol. 15, Iss. 4, pp. 63-74
Open Access | Times Cited: 14
Shadan Mohammed Jihad Abdalwahid, Raghad Zuhair Yousif, Shahab Wahhab Kareem
Applied Computer Science (2019) Vol. 15, Iss. 4, pp. 63-74
Open Access | Times Cited: 14
Internet of Things' (IoT's) Impact on Decision Oriented Applications of Big Data Sentiment Analysis
Akhilesh Dwivedi, R. P. Pant, Senam Pandey, et al.
(2018), pp. 1-10
Closed Access | Times Cited: 13
Akhilesh Dwivedi, R. P. Pant, Senam Pandey, et al.
(2018), pp. 1-10
Closed Access | Times Cited: 13
Big Data and its Analyzing Tools : A Perspective
Ayshwarya Jaiswal, Vijay Kumar Dwivedi, Om Prakash Yadav
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2020), pp. 560-565
Closed Access | Times Cited: 10
Ayshwarya Jaiswal, Vijay Kumar Dwivedi, Om Prakash Yadav
2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) (2020), pp. 560-565
Closed Access | Times Cited: 10
Enhancing Approach for Information Security in Hadoop
Raghad Zuhair Yousif, Shahab Wahhab Kareem, Shadan Mohammed Jihad Abdalwahid
Polytechnic Journal (2020) Vol. 10, Iss. 1, pp. 81-87
Open Access | Times Cited: 9
Raghad Zuhair Yousif, Shahab Wahhab Kareem, Shadan Mohammed Jihad Abdalwahid
Polytechnic Journal (2020) Vol. 10, Iss. 1, pp. 81-87
Open Access | Times Cited: 9
RC4 in Hadoop security using MapReduce
Anandu Jayan, Bhargavi R. Upadhyay
(2017), pp. 1-5
Closed Access | Times Cited: 7
Anandu Jayan, Bhargavi R. Upadhyay
(2017), pp. 1-5
Closed Access | Times Cited: 7
Modeling and Verifying Identity Authentication Security of HDFS Using CSP
Chao Xu, Huibiao Zhu, Wanling Xie
(2017) Vol. 11, pp. 259-268
Closed Access | Times Cited: 6
Chao Xu, Huibiao Zhu, Wanling Xie
(2017) Vol. 11, pp. 259-268
Closed Access | Times Cited: 6
Secure Data Access in Hadoop Using Elliptic Curve Cryptography
A. F. Díaz, Ilia Blokhin, Julio Ortega, et al.
Lecture notes in computer science (2016), pp. 136-145
Closed Access | Times Cited: 4
A. F. Díaz, Ilia Blokhin, Julio Ortega, et al.
Lecture notes in computer science (2016), pp. 136-145
Closed Access | Times Cited: 4
Conceptual Model Suggestions for Privacy Preserving Big Data Publishing
Yavuz Canbay, Yılmaz Vural, Şeref Sağıroğlu
Journal of Polytechnic (2019) Vol. 23, Iss. 3, pp. 785-798
Open Access | Times Cited: 5
Yavuz Canbay, Yılmaz Vural, Şeref Sağıroğlu
Journal of Polytechnic (2019) Vol. 23, Iss. 3, pp. 785-798
Open Access | Times Cited: 5
MapReduced Based A New Stream Cipher Technique for Data Encryption
Galal A. AL Rummana, G. N. Shinde, Abdulrazzaq H. A. Al Ahdal
International Journal of Engineering and Advanced Technology (2020) Vol. 9, Iss. 5, pp. 763-769
Open Access | Times Cited: 5
Galal A. AL Rummana, G. N. Shinde, Abdulrazzaq H. A. Al Ahdal
International Journal of Engineering and Advanced Technology (2020) Vol. 9, Iss. 5, pp. 763-769
Open Access | Times Cited: 5
AES – MR: A Novel Encryption Scheme for securing Data in HDFS Environment using MapReduce
Viplove Kadre, S. K. Chaturvedi
International Journal of Computer Applications (2015) Vol. 129, Iss. 12, pp. 12-19
Open Access | Times Cited: 4
Viplove Kadre, S. K. Chaturvedi
International Journal of Computer Applications (2015) Vol. 129, Iss. 12, pp. 12-19
Open Access | Times Cited: 4
Comprehensive Survey on Hadoop Security
Maria Martis, Namratha V. Pai, R. S. Pragathi, et al.
Advances in intelligent systems and computing (2019), pp. 227-236
Closed Access | Times Cited: 4
Maria Martis, Namratha V. Pai, R. S. Pragathi, et al.
Advances in intelligent systems and computing (2019), pp. 227-236
Closed Access | Times Cited: 4
Big Data Networking : Requirements, Architecture and Issues
Mohammed S. Al-kahtani
International Journal of Wireless & Mobile Networks (2016) Vol. 8, Iss. 6, pp. 35-49
Open Access | Times Cited: 3
Mohammed S. Al-kahtani
International Journal of Wireless & Mobile Networks (2016) Vol. 8, Iss. 6, pp. 35-49
Open Access | Times Cited: 3
Authentication of base station by HDFS using trust based model in WSN
Vijay Paul Singh, Muzzammil Hussain, Charanjeet Kour Raina
(2016), pp. 1-5
Closed Access | Times Cited: 3
Vijay Paul Singh, Muzzammil Hussain, Charanjeet Kour Raina
(2016), pp. 1-5
Closed Access | Times Cited: 3
Securing big healthcare data using attribute and honey-based encryption in cloud environment
Gayatri Kapil, Neeraj Kumar, Ashish Kumar Mourya, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Gayatri Kapil, Neeraj Kumar, Ashish Kumar Mourya, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Seamless Automation and Integration of Machine Learning Capabilities for Big Data Analytics
Amril Nazir
International Journal of Distributed and Parallel systems (2017) Vol. 8, Iss. 3, pp. 01-18
Open Access | Times Cited: 3
Amril Nazir
International Journal of Distributed and Parallel systems (2017) Vol. 8, Iss. 3, pp. 01-18
Open Access | Times Cited: 3
A secure data allocation solution for heterogeneous Hadoop systems: SecHDFS
Bowen Tian, Yun Tian, Yijie Sun, et al.
(2016), pp. 1-8
Closed Access | Times Cited: 2
Bowen Tian, Yun Tian, Yijie Sun, et al.
(2016), pp. 1-8
Closed Access | Times Cited: 2
A New Efficient Method for Information Security in Hadoop
Shadan Muhammed Jihad Abdalwahid, Banar Fareed Ibrahim, Sami Hassan Ismael, et al.
Qalaai Zanist Scientific Journal (2022) Vol. 7, Iss. 2
Open Access | Times Cited: 2
Shadan Muhammed Jihad Abdalwahid, Banar Fareed Ibrahim, Sami Hassan Ismael, et al.
Qalaai Zanist Scientific Journal (2022) Vol. 7, Iss. 2
Open Access | Times Cited: 2
Security of Big Data in Internet of Things
B. Rakesh, H. Parveen Sultana
Studies in big data (2018), pp. 29-52
Closed Access | Times Cited: 2
B. Rakesh, H. Parveen Sultana
Studies in big data (2018), pp. 29-52
Closed Access | Times Cited: 2
Analysis of Novel Hybrid Encryption Algorithm for Providing Security in Big Data
Nikhil Dwivedi, Arun Malik
Communications in computer and information science (2019), pp. 158-169
Closed Access | Times Cited: 2
Nikhil Dwivedi, Arun Malik
Communications in computer and information science (2019), pp. 158-169
Closed Access | Times Cited: 2
Technologies for Trustworthy Machine Learning: A Survey in a Socio-Technical Context.
Ehsan Toreini, Mhairi Aitken, Kovila Coopamootoo, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2
Ehsan Toreini, Mhairi Aitken, Kovila Coopamootoo, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 2