
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center
Deepika Saxena, Ishu Gupta, Jitendra Kumar, et al.
IEEE Systems Journal (2021) Vol. 16, Iss. 2, pp. 3163-3174
Open Access | Times Cited: 99
Deepika Saxena, Ishu Gupta, Jitendra Kumar, et al.
IEEE Systems Journal (2021) Vol. 16, Iss. 2, pp. 3163-3174
Open Access | Times Cited: 99
Showing 1-25 of 99 citing articles:
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud
Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, et al.
IEEE Transactions on Parallel and Distributed Systems (2023) Vol. 34, Iss. 4, pp. 1313-1330
Open Access | Times Cited: 40
Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, et al.
IEEE Transactions on Parallel and Distributed Systems (2023) Vol. 34, Iss. 4, pp. 1313-1330
Open Access | Times Cited: 40
A Bio-Inspired Virtual Machine Placement Toward Sustainable Cloud Resource Management
Ashutosh Kumar Singh, Smruti Rekha Swain, Deepika Saxena, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 3894-3905
Closed Access | Times Cited: 34
Ashutosh Kumar Singh, Smruti Rekha Swain, Deepika Saxena, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 3894-3905
Closed Access | Times Cited: 34
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity
Deepika Saxena, Ishu Gupta, Rishabh Gupta, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 53, Iss. 11, pp. 6815-6827
Open Access | Times Cited: 20
Deepika Saxena, Ishu Gupta, Rishabh Gupta, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 53, Iss. 11, pp. 6815-6827
Open Access | Times Cited: 20
A sustainable and secure load management model for green cloud data centres
Deepika Saxena, Ashutosh Kumar Singh, Chung‐Nan Lee, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 17
Deepika Saxena, Ashutosh Kumar Singh, Chung‐Nan Lee, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 17
Secure VM Migration in Cloud: Multi-Criteria Perspective with Improved Optimization Model
Garima Verma
Wireless Personal Communications (2022) Vol. 124, Iss. 1, pp. 75-102
Closed Access | Times Cited: 27
Garima Verma
Wireless Personal Communications (2022) Vol. 124, Iss. 1, pp. 75-102
Closed Access | Times Cited: 27
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments
Deepika Saxena, Ashutosh Kumar Singh
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8003-8024
Open Access | Times Cited: 25
Deepika Saxena, Ashutosh Kumar Singh
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8003-8024
Open Access | Times Cited: 25
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications
Deepika Saxena, Ashutosh Kumar Singh
IEEE Transactions on Services Computing (2022), pp. 1-12
Open Access | Times Cited: 25
Deepika Saxena, Ashutosh Kumar Singh
IEEE Transactions on Services Computing (2022), pp. 1-12
Open Access | Times Cited: 25
A metaheuristic virtual machine placement framework toward power efficiency of sustainable cloud environment
Ashutosh Kumar Singh, Smruti Rekha Swain, Chung Nan Lee
Soft Computing (2022) Vol. 27, Iss. 7, pp. 3817-3828
Closed Access | Times Cited: 23
Ashutosh Kumar Singh, Smruti Rekha Swain, Chung Nan Lee
Soft Computing (2022) Vol. 27, Iss. 7, pp. 3817-3828
Closed Access | Times Cited: 23
SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection
Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, et al.
IEEE Systems Journal (2023), pp. 1-12
Closed Access | Times Cited: 15
Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, et al.
IEEE Systems Journal (2023), pp. 1-12
Closed Access | Times Cited: 15
A Utilization Based Genetic Algorithm for virtual machine placement in cloud systems
Mustafa Can Çavdar, İbrahim Körpeoǧlu, Özgür Ulusoy
Computer Communications (2023) Vol. 214, pp. 136-148
Closed Access | Times Cited: 13
Mustafa Can Çavdar, İbrahim Körpeoǧlu, Özgür Ulusoy
Computer Communications (2023) Vol. 214, pp. 136-148
Closed Access | Times Cited: 13
Secured VM Deployment in the Cloud: Benchmarking the Enhanced Simulation Model
Umer Nauman, Zhang Yu-hong, Zhihui Li, et al.
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 540-540
Open Access | Times Cited: 5
Umer Nauman, Zhang Yu-hong, Zhihui Li, et al.
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 540-540
Open Access | Times Cited: 5
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach
Arezoo Ghasemi, Amin Keshavarzi
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14149-14166
Closed Access | Times Cited: 5
Arezoo Ghasemi, Amin Keshavarzi
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14149-14166
Closed Access | Times Cited: 5
Review and analysis of secure energy efficient resource optimization approaches for virtual machine migration in cloud computing
Harmeet Kaur, Abhineet Anand
Measurement Sensors (2022) Vol. 24, pp. 100504-100504
Closed Access | Times Cited: 21
Harmeet Kaur, Abhineet Anand
Measurement Sensors (2022) Vol. 24, pp. 100504-100504
Closed Access | Times Cited: 21
Performance enhancement of cloud security with migration algorithm for choosing virtual machines in cloud computing
R. Manivannan, S. Senthilkumar, K. Kalaivani, et al.
Engineering Research Express (2024) Vol. 6, Iss. 1, pp. 015204-015204
Open Access | Times Cited: 4
R. Manivannan, S. Senthilkumar, K. Kalaivani, et al.
Engineering Research Express (2024) Vol. 6, Iss. 1, pp. 015204-015204
Open Access | Times Cited: 4
Developing green computing awareness based on optimization techniques for environmental sustainability
A. Arivoli, B. Kalaavathi, Chen Joy Iong-Zong
Elsevier eBooks (2025), pp. 237-258
Closed Access
A. Arivoli, B. Kalaavathi, Chen Joy Iong-Zong
Elsevier eBooks (2025), pp. 237-258
Closed Access
Mitigating DDoS Attacks in Virtual Machine Migration: An In-Depth Security Framework Utilizing Deep Learning and Advanced Encryption Techniques
V. N., V. S. Shankar Sriram
International Journal of Innovative Technology and Exploring Engineering (2025) Vol. 14, Iss. 2, pp. 12-20
Closed Access
V. N., V. S. Shankar Sriram
International Journal of Innovative Technology and Exploring Engineering (2025) Vol. 14, Iss. 2, pp. 12-20
Closed Access
Secure Cloud Resource Management
Sakshi Patni, Deepika Saxena, Ashutosh Kumar Singh
(2025), pp. 89-110
Closed Access
Sakshi Patni, Deepika Saxena, Ashutosh Kumar Singh
(2025), pp. 89-110
Closed Access
Classified Dynamic Hierarchical Load Balancer for Cloud Data Centers
Sakshi Patni, Jitendra Kumar, Deepika Saxena, et al.
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Sakshi Patni, Jitendra Kumar, Deepika Saxena, et al.
SN Computer Science (2025) Vol. 6, Iss. 3
Closed Access
Towards dynamic virtual machine placement based on safety parameters and resource utilization fluctuation for energy savings and QoS improvement in cloud computing
Dan Wang, Jinjiang Wang, Xize Liu, et al.
Future Generation Computer Systems (2025), pp. 107853-107853
Closed Access
Dan Wang, Jinjiang Wang, Xize Liu, et al.
Future Generation Computer Systems (2025), pp. 107853-107853
Closed Access
Self-Improved Optimization Aided Bi-Gru Model for Resource Deployment & Deep Learning-Based Attack Detection on Cloud Data Centers
B. Prabha, Tiago Zonta, Mithileysh Sathiyanarayanan
(2025)
Closed Access
B. Prabha, Tiago Zonta, Mithileysh Sathiyanarayanan
(2025)
Closed Access
Credit Card Fraud Detection using Machine Learning: A Study
Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 25
Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 25
Secure and energy efficient dynamic hierarchical load balancing framework for cloud data centers
Sakshi Chhabra, Ashutosh Kumar Singh
Multimedia Tools and Applications (2023) Vol. 82, Iss. 19, pp. 29843-29856
Closed Access | Times Cited: 10
Sakshi Chhabra, Ashutosh Kumar Singh
Multimedia Tools and Applications (2023) Vol. 82, Iss. 19, pp. 29843-29856
Closed Access | Times Cited: 10
Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds
Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, et al.
IEEE Transactions on Automation Science and Engineering (2023) Vol. 21, Iss. 4, pp. 5837-5851
Closed Access | Times Cited: 10
Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, et al.
IEEE Transactions on Automation Science and Engineering (2023) Vol. 21, Iss. 4, pp. 5837-5851
Closed Access | Times Cited: 10
A High Up-Time and Security Centered Resource Provisioning Model Toward Sustainable Cloud Service Management
Deepika Saxena, Ashutosh Kumar Singh
IEEE Transactions on Green Communications and Networking (2024) Vol. 8, Iss. 3, pp. 1182-1195
Closed Access | Times Cited: 3
Deepika Saxena, Ashutosh Kumar Singh
IEEE Transactions on Green Communications and Networking (2024) Vol. 8, Iss. 3, pp. 1182-1195
Closed Access | Times Cited: 3
Compendium of Data Security in Cloud Storage By Applying Hybridization of Encryption Algorithm
Ishu Gupta, Deeksha Gurnani, Neha Gupta, et al.
(2022)
Open Access | Times Cited: 16
Ishu Gupta, Deeksha Gurnani, Neha Gupta, et al.
(2022)
Open Access | Times Cited: 16