
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Reputation-Based Security System For Edge Computing
Francis N. Nwebonyi, Rolando Martins, Manuel E. Correia
Proceedings of the 17th International Conference on Availability, Reliability and Security (2018), pp. 1-8
Closed Access | Times Cited: 7
Francis N. Nwebonyi, Rolando Martins, Manuel E. Correia
Proceedings of the 17th International Conference on Availability, Reliability and Security (2018), pp. 1-8
Closed Access | Times Cited: 7
Showing 7 citing articles:
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Muktar Yahuza, Mohd Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, et al.
IEEE Access (2020) Vol. 8, pp. 76541-76567
Open Access | Times Cited: 63
Muktar Yahuza, Mohd Yamani Idna Idris, Ainuddin Wahid Abdul Wahab, et al.
IEEE Access (2020) Vol. 8, pp. 76541-76567
Open Access | Times Cited: 63
CBiLSTM: A Hybrid Deep Learning Model for Efficient Reputation Assessment of Cloud Services
Reem Al Saleh, Maha Driss, Iman Almomani
IEEE Access (2022) Vol. 10, pp. 35321-35335
Open Access | Times Cited: 16
Reem Al Saleh, Maha Driss, Iman Almomani
IEEE Access (2022) Vol. 10, pp. 35321-35335
Open Access | Times Cited: 16
A Blockchain-based Trust and Reputation Model with Dynamic Evaluation Mechanism for IoT
Zhe Tu, Huachun Zhou, Kun Li, et al.
Computer Networks (2022) Vol. 218, pp. 109404-109404
Closed Access | Times Cited: 12
Zhe Tu, Huachun Zhou, Kun Li, et al.
Computer Networks (2022) Vol. 218, pp. 109404-109404
Closed Access | Times Cited: 12
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud
Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, et al.
Mobile Networks and Applications (2019) Vol. 25, Iss. 1, pp. 153-163
Open Access | Times Cited: 15
Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, et al.
Mobile Networks and Applications (2019) Vol. 25, Iss. 1, pp. 153-163
Open Access | Times Cited: 15
Multi-level Security Threats Projection in Edge Computing
Arpit Kanungo, Priyansu Mohanty, Sushruta Mishra, et al.
Lecture notes in networks and systems (2024), pp. 173-185
Closed Access
Arpit Kanungo, Priyansu Mohanty, Sushruta Mishra, et al.
Lecture notes in networks and systems (2024), pp. 173-185
Closed Access
Security and Fairness in IoT Based e-Health System: A Case Study of Mobile Edge-Clouds
Francis N. Nwebonyi, Rolando Martins, Manuel E. Correia
(2019), pp. 318-323
Closed Access | Times Cited: 4
Francis N. Nwebonyi, Rolando Martins, Manuel E. Correia
(2019), pp. 318-323
Closed Access | Times Cited: 4
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing
Poornima Mahadevappa, Raja Kumar Murugesan
Communications in computer and information science (2021), pp. 505-514
Closed Access | Times Cited: 4
Poornima Mahadevappa, Raja Kumar Murugesan
Communications in computer and information science (2021), pp. 505-514
Closed Access | Times Cited: 4