OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Insider Threats and Cryptographic Techniques in Secure Information Management
Lidia Ogiela, Marek R. Ogiela
IEEE Systems Journal (2015) Vol. 11, Iss. 2, pp. 405-414
Closed Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

Cognitive security paradigm for cloud computing applications
Lidia Ogiela, Marek R. Ogiela
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 8
Closed Access | Times Cited: 57

Intelligent Data Management and Security in Cloud Computing
Lidia Ogiela, Marek R. Ogiela, Hoon Ko
Sensors (2020) Vol. 20, Iss. 12, pp. 3458-3458
Open Access | Times Cited: 50

Fair hierarchical secret sharing scheme based on smart contract
En Zhang, Ming Li, Siu‐Ming Yiu, et al.
Information Sciences (2020) Vol. 546, pp. 166-176
Closed Access | Times Cited: 35

Cognitive cryptography for data security in cloud computing
Urszula Ogiela
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 31

A Design Approach to IoT Endpoint Security for Production Machinery Monitoring
Stefano Tedeschi, Christos Emmanouilidis, Jörn Mehnen, et al.
Sensors (2019) Vol. 19, Iss. 10, pp. 2355-2355
Open Access | Times Cited: 28

Securing PIN‐based authentication in smartwatches with just two gestures
Meriem Guerar, Mauro Migliardi, Francesco Palmieri, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Open Access | Times Cited: 26

Data Analysis for Emotion Classification Based on Bio-Information in Self-Driving Vehicles
Tae-Yeun Kim, Hoon Ko, Sung-Hwan Kim
Journal of Advanced Transportation (2020) Vol. 2020, pp. 1-11
Open Access | Times Cited: 21

Dynamic (t,n) threshold quantum secret sharing based on d-dimensional Bell state
Fulin Li, Tingyan Chen, Shixin Zhu
Physica A Statistical Mechanics and its Applications (2022) Vol. 606, pp. 128122-128122
Closed Access | Times Cited: 13

A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately
Shambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal
Multimedia Tools and Applications (2019) Vol. 78, Iss. 16, pp. 23179-23201
Closed Access | Times Cited: 21

Secure Interference Exploitation Precoding in MISO Wiretap Channel: Destructive Region Redefinition With Efficient Solutions
Ye Fan, Ang Li, Xuewen Liao, et al.
IEEE Transactions on Information Forensics and Security (2020) Vol. 16, pp. 402-417
Open Access | Times Cited: 20

A (t, n) Threshold Quantum Secret Sharing Scheme with Fairness
Fulin Li, Tingyan Chen, Shixin Zhu
International Journal of Theoretical Physics (2023) Vol. 62, Iss. 6
Closed Access | Times Cited: 5

Reversible data hiding in binary images based on image magnification
Fang Zhang, Wei Lu, Hongmei Liu, et al.
Multimedia Tools and Applications (2019) Vol. 78, Iss. 15, pp. 21891-21915
Closed Access | Times Cited: 11

Cognitive solutions for security and cryptography
Marek R. Ogiela
Cognitive Systems Research (2019) Vol. 55, pp. 258-261
Closed Access | Times Cited: 10

New public auditing protocol based on homomorphic tags for secure cloud storage
Jindan Zhang, Baocang Wang, Marek R. Ogiela, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 10

Visual CAPTCHA application in linguistic cryptography
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 2
Closed Access | Times Cited: 8

Security analysis of a chaos triggered image encryption scheme
Yong Zhang
Multimedia Tools and Applications (2019) Vol. 78, Iss. 22, pp. 31303-31318
Closed Access | Times Cited: 8

Intelligent and semantic threshold schemes for security in cloud computing
Lidia Ogiela, Václav Snåšel
Concurrency and Computation Practice and Experience (2019) Vol. 33, Iss. 2
Closed Access | Times Cited: 6

An efficient and secure dynamic quantum direct two-secrets sharing scheme
Fulin Li, Tingyan Chen, Shixin Zhu
Modern Physics Letters B (2023) Vol. 37, Iss. 34
Closed Access | Times Cited: 2

Authentication Protocols Using Multi-level Cognitive CAPTCHA
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2019), pp. 114-119
Closed Access | Times Cited: 4

Cognitive and biologically cryptographic protocols for data security
Lidia Ogiela, Urszula Ogiela
Cognitive Systems Research (2019) Vol. 56, pp. 1-6
Closed Access | Times Cited: 4

Minority oversampling based on the attraction‐repulsion Weber problem
Ugo Fiore
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 4

Exploration of Enterprise Informatization Management Innovation Strategy Model Driven by Big Data Technology
Zheng Xu, Jiancong Wang
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

Towards cognitive service management and semantic information sharing in the Cloud
Lidia Ogiela, Marek R. Ogiela
Multimedia Tools and Applications (2017) Vol. 77, Iss. 14, pp. 18625-18635
Closed Access | Times Cited: 3

Cognitive Personal Security Systems
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 87-90
Closed Access | Times Cited: 3

Cognitive Approaches for Sensor Data Analysis in Transformative Computing
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2020), pp. 210-214
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top