OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Study of Security Threats in Cloud: Passive Impact of COVID-19 Pandemic
Sudakshina Mandal, Danish Ali Khan
2020 International Conference on Smart Electronics and Communication (ICOSEC) (2020), pp. 837-842
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Cyber Security Threats in Cloud: Literature Review
Roaa Al Nafea, Mohammed Amin Almaiah
(2021), pp. 779-786
Closed Access | Times Cited: 63

Cyberattacks and Security of Cloud Computing: A Complete Guideline
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21

Using ML to Predict User Satisfaction with ICT Technology for Educational Institution Administration
Hamad Almaghrabi, Ben Soh, Alice Li
Information (2024) Vol. 15, Iss. 4, pp. 218-218
Open Access | Times Cited: 4

Delitos informáticos: Caso Ecuador
Manuel Alexander Ponce Tubay
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 119-123
Open Access | Times Cited: 2

Microservice Security Framework for IoT by Mimic Defense Mechanism
Fei Ying, Shengjie Zhao, Hao Deng
Sensors (2022) Vol. 22, Iss. 6, pp. 2418-2418
Open Access | Times Cited: 8

Advanced Cyber Security Helpdesk Using Machine Learning Techniques
V. Ceronmani Sharmila, E. Maha Vishnu, M. R. King Udayaraj, et al.
Lecture notes in networks and systems (2024), pp. 371-381
Closed Access | Times Cited: 1

El concepto de democracia, desde su relación con los derechos humanos y la participación política
Dayton Francisco Farfán Pinoargote, Karen Lorena Briones Cedeño, Brenner Fabián Diaz Rodríguez, et al.
Revista San Gregorio (2024) Vol. 1, Iss. 58, pp. 124-131
Open Access | Times Cited: 1

Znanstveno-raziskovalni trendi na področju digitalne preobrazbe
Uroš Rajkovič, Аленка Баггиа
University of Maribor, University Press eBooks (2021)
Open Access | Times Cited: 9

Cloud Computing Data Breaches in News Media: Disclosure of Personal and Sensitive Data
David Kolevski, Katina Michael, Roba Abbas, et al.
(2022), pp. 1-11
Closed Access | Times Cited: 6

Cloud Computing and Covid-19
Raju Singh
(2021), pp. 552-557
Closed Access | Times Cited: 8

Smart Secure: A Novel Risk based Maturity Model for Enterprise Risk Management during Global Pandemic
Varun Deshpande, Ashwath Desai
(2021), pp. 1-7
Closed Access | Times Cited: 7

Blockchain-Enabled Secure and Efficient Data Sharing Scheme for Trust Management in Healthcare Smartphone Network
Rati Bhan Rati Bhan, Rajendra Pamula Rajendra Pamula, Parvez Faruki Parvez Faruki, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 4

Relevance of Zero Trust Network Architecture amidts and it’s rapid adoption amidts Work From Home enforced by COVID-19
Aniket Deshpande
Psychology and Education Journal (2021) Vol. 58, Iss. 1, pp. 5672-5677
Closed Access | Times Cited: 5

Cloud computing data breaches: A review of U.S. regulation and data breach notification literature
David Kolevski, Katina Michael, Roba Abbas, et al.
(2021), pp. 1-7
Closed Access | Times Cited: 5

Cross-Border E-Commerce Diffusion and Usage During the period of the COVID-19 Pandemic: A literature Review
Isaac Kofi Mensah, Deborah Simon Mwakapesa
(2021), pp. 59-65
Closed Access | Times Cited: 5

Safeguarding the Future
Rita Komalasari
Advances in healthcare information systems and administration book series (2024), pp. 48-72
Closed Access

Secure and Compatible Integration of Cloud-Based ERP Solution: A Comprehensive Survey
Udita Malhotra, Ritu Nagpal
Communications in computer and information science (2024), pp. 239-250
Closed Access

XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
Dincy R. Arikkat, P. K. Vinod, K. A. Rafidha Rehiman, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access

SoK: The Impact of Educational Data Mining on Organisational Administration
Hamad Almaghrabi, Ben Soh, Alice Li, et al.
Information (2024) Vol. 15, Iss. 11, pp. 738-738
Open Access

Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective
Samreen Mahmood, Mehmood Chadhar, Sally Firmin
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11610-11610
Open Access

Applications of artificial intelligence with cloud computing in promoting social distancing to combat COVID-19
Mohammed G. Al-Hamiri, Hayder Fadhil Abdulsada, Laith A. Abdul-Rahaim
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 24, Iss. 3, pp. 1550-1550
Open Access | Times Cited: 4

PROBLEMS IN THE USE OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) FACED BY THE COMMUNITY IN SABAH
Bagang Tony Paridi, Gregory Natalie Ann, Mohd Tamring Budi Anto, et al.
Borneo AKademika (2022) Vol. 6, Iss. 1, pp. 48-54
Open Access | Times Cited: 2

Biometrics for Enterprise Security Risk Mitigation
Mikhail Gofman, Sinjini Mitra, Berhanu Tadesse, et al.
Springer eBooks (2021), pp. 163-195
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top