
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic
Sudakshina Mandal, Danish Ali Khan
2020 International Conference on Smart Electronics and Communication (ICOSEC) (2020), pp. 837-842
Closed Access | Times Cited: 30
Sudakshina Mandal, Danish Ali Khan
2020 International Conference on Smart Electronics and Communication (ICOSEC) (2020), pp. 837-842
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Cyber Security Threats in Cloud: Literature Review
Roaa Al Nafea, Mohammed Amin Almaiah
(2021), pp. 779-786
Closed Access | Times Cited: 63
Roaa Al Nafea, Mohammed Amin Almaiah
(2021), pp. 779-786
Closed Access | Times Cited: 63
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21
Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration
Hamad Almaghrabi, Ben Soh, Alice Li
Information (2024) Vol. 15, Iss. 4, pp. 218-218
Open Access | Times Cited: 4
Hamad Almaghrabi, Ben Soh, Alice Li
Information (2024) Vol. 15, Iss. 4, pp. 218-218
Open Access | Times Cited: 4
Delitos informáticos: Caso Ecuador
Manuel Alexander Ponce Tubay
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 119-123
Open Access | Times Cited: 2
Manuel Alexander Ponce Tubay
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 119-123
Open Access | Times Cited: 2
Microservice Security Framework for IoT by Mimic Defense Mechanism
Fei Ying, Shengjie Zhao, Hao Deng
Sensors (2022) Vol. 22, Iss. 6, pp. 2418-2418
Open Access | Times Cited: 8
Fei Ying, Shengjie Zhao, Hao Deng
Sensors (2022) Vol. 22, Iss. 6, pp. 2418-2418
Open Access | Times Cited: 8
Advanced Cyber Security Helpdesk Using Machine Learning Techniques
V. Ceronmani Sharmila, E. Maha Vishnu, M. R. King Udayaraj, et al.
Lecture notes in networks and systems (2024), pp. 371-381
Closed Access | Times Cited: 1
V. Ceronmani Sharmila, E. Maha Vishnu, M. R. King Udayaraj, et al.
Lecture notes in networks and systems (2024), pp. 371-381
Closed Access | Times Cited: 1
El concepto de democracia, desde su relación con los derechos humanos y la participación política
Dayton Francisco Farfán Pinoargote, Karen Lorena Briones Cedeño, Brenner Fabián Diaz Rodríguez, et al.
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 124-131
Open Access | Times Cited: 1
Dayton Francisco Farfán Pinoargote, Karen Lorena Briones Cedeño, Brenner Fabián Diaz Rodríguez, et al.
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 124-131
Open Access | Times Cited: 1
Znanstveno-raziskovalni trendi na področju digitalne preobrazbe
Uroš Rajkovič, Аленка Баггиа
University of Maribor, University Press eBooks (2021)
Open Access | Times Cited: 9
Uroš Rajkovič, Аленка Баггиа
University of Maribor, University Press eBooks (2021)
Open Access | Times Cited: 9
Cloud Computing Data Breaches in News Media: Disclosure of Personal and Sensitive Data
David Kolevski, Katina Michael, Roba Abbas, et al.
(2022), pp. 1-11
Closed Access | Times Cited: 6
David Kolevski, Katina Michael, Roba Abbas, et al.
(2022), pp. 1-11
Closed Access | Times Cited: 6
Smart Secure: A Novel Risk based Maturity Model for Enterprise Risk Management during Global Pandemic
Varun Deshpande, Ashwath Desai
(2021), pp. 1-7
Closed Access | Times Cited: 7
Varun Deshpande, Ashwath Desai
(2021), pp. 1-7
Closed Access | Times Cited: 7
Blockchain-Enabled Secure and Efficient Data Sharing Scheme for Trust Management in Healthcare Smartphone Network
Rati Bhan Rati Bhan, Rajendra Pamula Rajendra Pamula, Parvez Faruki Parvez Faruki, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 4
Rati Bhan Rati Bhan, Rajendra Pamula Rajendra Pamula, Parvez Faruki Parvez Faruki, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 4
Securing Privacy During a World Health Emergency: Exploring How to Create a Balance Between the Need to Save the World and People’s Right to Privacy
Shasha Yu, Fiona Carroll
Springer eBooks (2023), pp. 145-167
Closed Access | Times Cited: 2
Shasha Yu, Fiona Carroll
Springer eBooks (2023), pp. 145-167
Closed Access | Times Cited: 2
Relevance of Zero Trust Network Architecture amidts and it’s rapid adoption amidts Work From Home enforced by COVID-19
Aniket Deshpande
Psychology and Education Journal (2021) Vol. 58, Iss. 1, pp. 5672-5677
Closed Access | Times Cited: 5
Aniket Deshpande
Psychology and Education Journal (2021) Vol. 58, Iss. 1, pp. 5672-5677
Closed Access | Times Cited: 5
Cloud computing data breaches: A review of U.S. regulation and data breach notification literature
David Kolevski, Katina Michael, Roba Abbas, et al.
(2021), pp. 1-7
Closed Access | Times Cited: 5
David Kolevski, Katina Michael, Roba Abbas, et al.
(2021), pp. 1-7
Closed Access | Times Cited: 5
Cross-Border E-Commerce Diffusion and Usage During the period of the COVID-19 Pandemic: A literature Review
Isaac Kofi Mensah, Deborah Simon Mwakapesa
(2021), pp. 59-65
Closed Access | Times Cited: 5
Isaac Kofi Mensah, Deborah Simon Mwakapesa
(2021), pp. 59-65
Closed Access | Times Cited: 5
Safeguarding the Future
Rita Komalasari
Advances in healthcare information systems and administration book series (2024), pp. 48-72
Closed Access
Rita Komalasari
Advances in healthcare information systems and administration book series (2024), pp. 48-72
Closed Access
Secure and Compatible Integration of Cloud-Based ERP Solution: A Comprehensive Survey
Udita Malhotra, Ritu Nagpal
Communications in computer and information science (2024), pp. 239-250
Closed Access
Udita Malhotra, Ritu Nagpal
Communications in computer and information science (2024), pp. 239-250
Closed Access
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
Dincy R. Arikkat, P. K. Vinod, K. A. Rafidha Rehiman, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access
Dincy R. Arikkat, P. K. Vinod, K. A. Rafidha Rehiman, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access
SoK: The Impact of Educational Data Mining on Organisational Administration
Hamad Almaghrabi, Ben Soh, Alice Li, et al.
Information (2024) Vol. 15, Iss. 11, pp. 738-738
Open Access
Hamad Almaghrabi, Ben Soh, Alice Li, et al.
Information (2024) Vol. 15, Iss. 11, pp. 738-738
Open Access
Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11610-11610
Open Access
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11610-11610
Open Access
Applications of artificial intelligence with cloud computing in promoting social distancing to combat COVID-19
Mohammed G. Al-Hamiri, Hayder Fadhil Abdulsada, Laith A. Abdul-Rahaim
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 24, Iss. 3, pp. 1550-1550
Open Access | Times Cited: 4
Mohammed G. Al-Hamiri, Hayder Fadhil Abdulsada, Laith A. Abdul-Rahaim
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 24, Iss. 3, pp. 1550-1550
Open Access | Times Cited: 4
The Increase in Security Breaches through Remote Working
Syed Adnan Jawaid
(2022)
Open Access | Times Cited: 2
Syed Adnan Jawaid
(2022)
Open Access | Times Cited: 2
PROBLEMS IN THE USE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) FACED BY THE COMMUNITY IN SABAH
Bagang Tony Paridi, Gregory Natalie Ann, Mohd Tamring Budi Anto, et al.
Borneo AKademika (2022) Vol. 6, Iss. 1, pp. 48-54
Open Access | Times Cited: 2
Bagang Tony Paridi, Gregory Natalie Ann, Mohd Tamring Budi Anto, et al.
Borneo AKademika (2022) Vol. 6, Iss. 1, pp. 48-54
Open Access | Times Cited: 2
Biometrics for Enterprise Security Risk Mitigation
Mikhail Gofman, Sinjini Mitra, Berhanu Tadesse, et al.
Springer eBooks (2021), pp. 163-195
Closed Access | Times Cited: 1
Mikhail Gofman, Sinjini Mitra, Berhanu Tadesse, et al.
Springer eBooks (2021), pp. 163-195
Closed Access | Times Cited: 1