
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Device Security Assessment of Internet of Healthcare Things
Abdulaziz Attaallah, Masood Ahmad, Md Tarique Jamal Ansari, et al.
Intelligent Automation & Soft Computing (2021) Vol. 27, Iss. 2, pp. 593-603
Open Access | Times Cited: 32
Abdulaziz Attaallah, Masood Ahmad, Md Tarique Jamal Ansari, et al.
Intelligent Automation & Soft Computing (2021) Vol. 27, Iss. 2, pp. 593-603
Open Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
Hi, May AI help you? An analysis of the barriers impeding the implementation and use of artificial intelligence-enabled virtual assistants in retail
Sana Zehra Kamoonpuri, Anita Sengar
Journal of Retailing and Consumer Services (2023) Vol. 72, pp. 103258-103258
Closed Access | Times Cited: 72
Sana Zehra Kamoonpuri, Anita Sengar
Journal of Retailing and Consumer Services (2023) Vol. 72, pp. 103258-103258
Closed Access | Times Cited: 72
Ensuring data integrity of healthcare information in the era of digital health
Mohammad Zarour, Mamdouh Alenezi, Md Tarique Jamal Ansari, et al.
Healthcare Technology Letters (2021) Vol. 8, Iss. 3, pp. 66-77
Open Access | Times Cited: 82
Mohammad Zarour, Mamdouh Alenezi, Md Tarique Jamal Ansari, et al.
Healthcare Technology Letters (2021) Vol. 8, Iss. 3, pp. 66-77
Open Access | Times Cited: 82
Analyzing the Implications of Healthcare Data Breaches through Computational Technique
Ahmed Almulihi, Fawaz Alassery, Asif Irshad Khan, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1763-1779
Open Access | Times Cited: 57
Ahmed Almulihi, Fawaz Alassery, Asif Irshad Khan, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1763-1779
Open Access | Times Cited: 57
A survey on federated learning for security and privacy in healthcare applications
Kristtopher K. Coelho, Michele Nogueira, Alex Borges Vieira, et al.
Computer Communications (2023) Vol. 207, pp. 113-127
Closed Access | Times Cited: 23
Kristtopher K. Coelho, Michele Nogueira, Alex Borges Vieira, et al.
Computer Communications (2023) Vol. 207, pp. 113-127
Closed Access | Times Cited: 23
Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model
Hashem Alyami, Md Tarique Jamal Ansari, Abdullah Alharbi, et al.
Electronics (2022) Vol. 11, Iss. 6, pp. 859-859
Open Access | Times Cited: 24
Hashem Alyami, Md Tarique Jamal Ansari, Abdullah Alharbi, et al.
Electronics (2022) Vol. 11, Iss. 6, pp. 859-859
Open Access | Times Cited: 24
Toward a Unified Model Approach for Evaluating Different Electric Vehicles
Wael Alosaimi, Md Tarique Jamal Ansari, Abdullah M. Alharbi, et al.
Energies (2021) Vol. 14, Iss. 19, pp. 6120-6120
Open Access | Times Cited: 28
Wael Alosaimi, Md Tarique Jamal Ansari, Abdullah M. Alharbi, et al.
Energies (2021) Vol. 14, Iss. 19, pp. 6120-6120
Open Access | Times Cited: 28
Analyzing the Impact of Cybersecurity on Monitoring and Control Systems in the Energy Sector
Mohammed A. Alghassab
Energies (2021) Vol. 15, Iss. 1, pp. 218-218
Open Access | Times Cited: 23
Mohammed A. Alghassab
Energies (2021) Vol. 15, Iss. 1, pp. 218-218
Open Access | Times Cited: 23
An empirical investigation into the altering health perspectives in the internet of health things
Nour Mahmoud Bahbouh, Sandra Sendra Compte, Juan Valenzuela Valdes, et al.
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 67-77
Open Access | Times Cited: 17
Nour Mahmoud Bahbouh, Sandra Sendra Compte, Juan Valenzuela Valdes, et al.
International Journal of Information Technology (2022) Vol. 15, Iss. 1, pp. 67-77
Open Access | Times Cited: 17
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT
Bandar Alamri, Katie Crowley, Ita Richardson
Sensors (2022) Vol. 23, Iss. 1, pp. 218-218
Open Access | Times Cited: 16
Bandar Alamri, Katie Crowley, Ita Richardson
Sensors (2022) Vol. 23, Iss. 1, pp. 218-218
Open Access | Times Cited: 16
Decision support for healthcare cyber security
Ferda Özdemir Sönmez, Chris Hankin, Pasquale Malacaria
Computers & Security (2022) Vol. 122, pp. 102865-102865
Open Access | Times Cited: 15
Ferda Özdemir Sönmez, Chris Hankin, Pasquale Malacaria
Computers & Security (2022) Vol. 122, pp. 102865-102865
Open Access | Times Cited: 15
Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach
Stefano Chiaradonna, Petar Jevtić, Nicolas Lanchier
Risk Analysis (2023) Vol. 43, Iss. 12, pp. 2450-2485
Open Access | Times Cited: 8
Stefano Chiaradonna, Petar Jevtić, Nicolas Lanchier
Risk Analysis (2023) Vol. 43, Iss. 12, pp. 2450-2485
Open Access | Times Cited: 8
Toward Selection of Trustworthy and Efficient E-Learning Platform
Bader Alojaiman
IEEE Access (2021) Vol. 9, pp. 133889-133901
Open Access | Times Cited: 19
Bader Alojaiman
IEEE Access (2021) Vol. 9, pp. 133889-133901
Open Access | Times Cited: 19
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic
Mohammed Baz, Sabita Khatri, Abdullah Baz, et al.
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 2, pp. 691-702
Closed Access | Times Cited: 18
Mohammed Baz, Sabita Khatri, Abdullah Baz, et al.
Computer Systems Science and Engineering (2021) Vol. 40, Iss. 2, pp. 691-702
Closed Access | Times Cited: 18
Healthcare Device Security Assessment through Computational Methodology
Masood Ahmad, Jehad F. Al-Amri, Ahmad F. Subahi, et al.
Computer Systems Science and Engineering (2021) Vol. 41, Iss. 2, pp. 811-828
Open Access | Times Cited: 18
Masood Ahmad, Jehad F. Al-Amri, Ahmad F. Subahi, et al.
Computer Systems Science and Engineering (2021) Vol. 41, Iss. 2, pp. 811-828
Open Access | Times Cited: 18
Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques
Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7017-7039
Open Access | Times Cited: 2
Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7017-7039
Open Access | Times Cited: 2
Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment
Mohd Nadeem, Jehad F. Al-Amri, Ahmad F. Subahi, et al.
Intelligent Automation & Soft Computing (2021) Vol. 31, Iss. 1, pp. 61-82
Open Access | Times Cited: 16
Mohd Nadeem, Jehad F. Al-Amri, Ahmad F. Subahi, et al.
Intelligent Automation & Soft Computing (2021) Vol. 31, Iss. 1, pp. 61-82
Open Access | Times Cited: 16
DURASec: Durable Security Blueprints for Web-Applications Empowering Digital India Initiative
Md Tarique Jamal Ansari, Alka Agrawal, Raees Ahmad Khan
ICST Transactions on Scalable Information Systems (2018), pp. 172816-172816
Open Access | Times Cited: 19
Md Tarique Jamal Ansari, Alka Agrawal, Raees Ahmad Khan
ICST Transactions on Scalable Information Systems (2018), pp. 172816-172816
Open Access | Times Cited: 19
Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model
Fawaz Alassery, Ahmed Alzahrani, Asif Irshad Khan, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1701-1715
Open Access | Times Cited: 15
Fawaz Alassery, Ahmed Alzahrani, Asif Irshad Khan, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1701-1715
Open Access | Times Cited: 15
Enhancing IoT Security: Quantum-Level Resilience against Threats
Hosam Alhakami
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 329-356
Open Access | Times Cited: 3
Hosam Alhakami
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 78, Iss. 1, pp. 329-356
Open Access | Times Cited: 3
Network Quality Assessment in Heterogeneous Wireless Settings: An Optimization Approach
Ibrahim M. Mehedi, Mohd Heidir Mohd Shah, Soon Xin Ng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 71, Iss. 1, pp. 439-455
Open Access | Times Cited: 6
Ibrahim M. Mehedi, Mohd Heidir Mohd Shah, Soon Xin Ng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 71, Iss. 1, pp. 439-455
Open Access | Times Cited: 6
A Usability Management Framework for Securing Healthcare Information System
Hosam Alhakami, Abdullah Baz, Wajdi Alhakami, et al.
Computer Systems Science and Engineering (2022) Vol. 42, Iss. 3, pp. 1015-1030
Open Access | Times Cited: 4
Hosam Alhakami, Abdullah Baz, Wajdi Alhakami, et al.
Computer Systems Science and Engineering (2022) Vol. 42, Iss. 3, pp. 1015-1030
Open Access | Times Cited: 4
Speak-Correct: A Computerized Interface for the Analysis of Mispronounced Errors
Kamal Jambi, Hassanin M. Al-Barhamtoshy, Wajdi Aljedaibi, et al.
Computer Systems Science and Engineering (2022) Vol. 43, Iss. 3, pp. 1155-1173
Open Access | Times Cited: 3
Kamal Jambi, Hassanin M. Al-Barhamtoshy, Wajdi Aljedaibi, et al.
Computer Systems Science and Engineering (2022) Vol. 43, Iss. 3, pp. 1155-1173
Open Access | Times Cited: 3
Design and Implementation of Intelligent Data Security Risk Assessment and Management System
Xiaolu Zhang, Lei Cui, Wuqiang Shen, et al.
Procedia Computer Science (2024) Vol. 243, pp. 148-155
Open Access
Xiaolu Zhang, Lei Cui, Wuqiang Shen, et al.
Procedia Computer Science (2024) Vol. 243, pp. 148-155
Open Access
Computer Network Information Security Supervision and Protection Strategy with Internet of Things Information Technology
Xiang Nan, Rajamohan Parthasarathy, Chu Wang
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 258-262
Closed Access
Xiang Nan, Rajamohan Parthasarathy, Chu Wang
2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP) (2024), pp. 258-262
Closed Access
A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective
Hosam Alhakami, Abdullah Baz, Mohammad Al-shareef, et al.
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 3, pp. 2773-2786
Open Access | Times Cited: 1
Hosam Alhakami, Abdullah Baz, Mohammad Al-shareef, et al.
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 3, pp. 2773-2786
Open Access | Times Cited: 1