
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Security and Privacy Issues in Modern Healthcare Systems
Akm Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, et al.
ACM Transactions on Computing for Healthcare (2021) Vol. 2, Iss. 3, pp. 1-44
Closed Access | Times Cited: 149
Akm Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, et al.
ACM Transactions on Computing for Healthcare (2021) Vol. 2, Iss. 3, pp. 1-44
Closed Access | Times Cited: 149
Showing 1-25 of 149 citing articles:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions
Harun Oz, Ahmet Arış, Albert Lévi, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-37
Open Access | Times Cited: 176
Harun Oz, Ahmet Arış, Albert Lévi, et al.
ACM Computing Surveys (2022) Vol. 54, Iss. 11s, pp. 1-37
Open Access | Times Cited: 176
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 150
Javier Franco, Ahmet Arış, Berk Canberk, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2351-2383
Open Access | Times Cited: 150
Security and privacy issues in smart cities/industries: technologies, applications, and challenges
Patruni Muralidhara Rao, B. D. Deebak
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 8, pp. 10517-10553
Closed Access | Times Cited: 114
Patruni Muralidhara Rao, B. D. Deebak
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 8, pp. 10517-10553
Closed Access | Times Cited: 114
A survey on security and privacy issues of UAVs
Yassine Mekdad, Ahmet Arış, Leonardo Babun, et al.
Computer Networks (2023) Vol. 224, pp. 109626-109626
Open Access | Times Cited: 102
Yassine Mekdad, Ahmet Arış, Leonardo Babun, et al.
Computer Networks (2023) Vol. 224, pp. 109626-109626
Open Access | Times Cited: 102
Survey of Machine Learning based intrusion detection methods for Internet of Medical Things
Ayoub Si-Ahmed, Mohammed Ali Al-Garadi, Narhimène Boustia
Applied Soft Computing (2023) Vol. 140, pp. 110227-110227
Open Access | Times Cited: 76
Ayoub Si-Ahmed, Mohammed Ali Al-Garadi, Narhimène Boustia
Applied Soft Computing (2023) Vol. 140, pp. 110227-110227
Open Access | Times Cited: 76
A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
Hassan Jalil Hadi, Yue Cao, Khaleeq Un Nisa, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103607-103607
Closed Access | Times Cited: 75
Hassan Jalil Hadi, Yue Cao, Khaleeq Un Nisa, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103607-103607
Closed Access | Times Cited: 75
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Hugo Riggs, Shahid Tufail, Imtiaz Parvez, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4060-4060
Open Access | Times Cited: 52
Hugo Riggs, Shahid Tufail, Imtiaz Parvez, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4060-4060
Open Access | Times Cited: 52
A review of multi-factor authentication in the Internet of Healthcare Things
Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, et al.
Digital Health (2023) Vol. 9, pp. 205520762311771-205520762311771
Open Access | Times Cited: 52
Tance Suleski, Mohiuddin Ahmed, Wencheng Yang, et al.
Digital Health (2023) Vol. 9, pp. 205520762311771-205520762311771
Open Access | Times Cited: 52
A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT
Fazlullah Khan, Mian Ahmad Jan, Ryan Alturki, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 19, Iss. 10, pp. 10125-10132
Closed Access | Times Cited: 51
Fazlullah Khan, Mian Ahmad Jan, Ryan Alturki, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 19, Iss. 10, pp. 10125-10132
Closed Access | Times Cited: 51
Enhancing Cybersecurity Protocols in Modern Healthcare Systems
Muhammad Usman Tariq
Advances in healthcare information systems and administration book series (2024), pp. 223-241
Closed Access | Times Cited: 41
Muhammad Usman Tariq
Advances in healthcare information systems and administration book series (2024), pp. 223-241
Closed Access | Times Cited: 41
Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review
Sotiris Messinis, Nikos Temenos, Nicholas Ε. Protonotarios, et al.
Computers in Biology and Medicine (2024) Vol. 170, pp. 108036-108036
Open Access | Times Cited: 23
Sotiris Messinis, Nikos Temenos, Nicholas Ε. Protonotarios, et al.
Computers in Biology and Medicine (2024) Vol. 170, pp. 108036-108036
Open Access | Times Cited: 23
Blockchain-Based Privacy-Enhancing Federated Learning in Smart Healthcare: A Survey
Zounkaraneni Ngoupayou Limbepe, Keke Gai, Jing Yu
Blockchains (2025) Vol. 3, Iss. 1, pp. 1-1
Open Access | Times Cited: 2
Zounkaraneni Ngoupayou Limbepe, Keke Gai, Jing Yu
Blockchains (2025) Vol. 3, Iss. 1, pp. 1-1
Open Access | Times Cited: 2
Recent Advances in Wearable Sensing Technologies
Alfredo J. Pérez, Sherali Zeadally
Sensors (2021) Vol. 21, Iss. 20, pp. 6828-6828
Open Access | Times Cited: 72
Alfredo J. Pérez, Sherali Zeadally
Sensors (2021) Vol. 21, Iss. 20, pp. 6828-6828
Open Access | Times Cited: 72
An Efficient CNN-Based Deep Learning Model to Detect Malware Attacks (CNN-DMA) in 5G-IoT Healthcare Applications
Ankita Anand, Shalli Rani, Divya Anand, et al.
Sensors (2021) Vol. 21, Iss. 19, pp. 6346-6346
Open Access | Times Cited: 69
Ankita Anand, Shalli Rani, Divya Anand, et al.
Sensors (2021) Vol. 21, Iss. 19, pp. 6346-6346
Open Access | Times Cited: 69
Blockchain-Based Solutions Supporting Reliable Healthcare for Fog Computing and Internet of Medical Things (IoMT) Integration
Shadab Alam, Mohammed Shuaib, Sadaf Ahmad, et al.
Sustainability (2022) Vol. 14, Iss. 22, pp. 15312-15312
Open Access | Times Cited: 53
Shadab Alam, Mohammed Shuaib, Sadaf Ahmad, et al.
Sustainability (2022) Vol. 14, Iss. 22, pp. 15312-15312
Open Access | Times Cited: 53
Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT
Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 722-731
Open Access | Times Cited: 48
Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 722-731
Open Access | Times Cited: 48
A Survey on Blockchain for Healthcare: Challenges, Benefits, and Future Directions
Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 386-424
Open Access | Times Cited: 45
Mohammad Salar Arbabi, Chhagan Lal, Narasimha Raghavan Veeraragavan, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 386-424
Open Access | Times Cited: 45
Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations
Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, et al.
IEEE Access (2022) Vol. 10, pp. 12345-12364
Open Access | Times Cited: 38
Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, et al.
IEEE Access (2022) Vol. 10, pp. 12345-12364
Open Access | Times Cited: 38
Data Quality Detection Mechanism Against Label Flipping Attacks in Federated Learning
Yifeng Jiang, Weiwen Zhang, Yanxi Chen
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1625-1637
Closed Access | Times Cited: 35
Yifeng Jiang, Weiwen Zhang, Yanxi Chen
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1625-1637
Closed Access | Times Cited: 35
A Review on Protection and Cancelable Techniques in Biometric Systems
Juan Carlos Bernal-Romero, Juan Manuel Ramírez-Cortés, Jose Rangel‐Magdaleno, et al.
IEEE Access (2023) Vol. 11, pp. 8531-8568
Open Access | Times Cited: 26
Juan Carlos Bernal-Romero, Juan Manuel Ramírez-Cortés, Jose Rangel‐Magdaleno, et al.
IEEE Access (2023) Vol. 11, pp. 8531-8568
Open Access | Times Cited: 26
Secure data sharing with blockchain for remote health monitoring applications: a review
Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield
Journal of Reliable Intelligent Environments (2023) Vol. 9, Iss. 3, pp. 349-368
Open Access | Times Cited: 26
Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield
Journal of Reliable Intelligent Environments (2023) Vol. 9, Iss. 3, pp. 349-368
Open Access | Times Cited: 26
IoT Health Devices: Exploring Security Risks in the Connected Landscape
Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, et al.
IoT (2023) Vol. 4, Iss. 2, pp. 150-182
Open Access | Times Cited: 26
Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, et al.
IoT (2023) Vol. 4, Iss. 2, pp. 150-182
Open Access | Times Cited: 26
Drone Technology
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 14
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 14
A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing
Tasiu Muazu, Yingchi Mao, Abdullahi Uwaisu Muhammad, et al.
Computer Communications (2024) Vol. 216, pp. 168-182
Closed Access | Times Cited: 10
Tasiu Muazu, Yingchi Mao, Abdullahi Uwaisu Muhammad, et al.
Computer Communications (2024) Vol. 216, pp. 168-182
Closed Access | Times Cited: 10
Use of AI Applications for the Drone Industry
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9