
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy-Preserving Blockchain Framework for Supply Chain Management: Perceptive Craving Game Search Optimization (PCGSO)
Basim Aljabhan, Muath Obaidat
Sustainability (2023) Vol. 15, Iss. 8, pp. 6905-6905
Open Access | Times Cited: 16
Basim Aljabhan, Muath Obaidat
Sustainability (2023) Vol. 15, Iss. 8, pp. 6905-6905
Open Access | Times Cited: 16
Showing 16 citing articles:
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20
Designing the Location–Routing Problem for a Cold Supply Chain Considering the COVID-19 Disaster
Sina Abbasi, Maryam Moosivand, Ilias Vlachos, et al.
Sustainability (2023) Vol. 15, Iss. 21, pp. 15490-15490
Open Access | Times Cited: 17
Sina Abbasi, Maryam Moosivand, Ilias Vlachos, et al.
Sustainability (2023) Vol. 15, Iss. 21, pp. 15490-15490
Open Access | Times Cited: 17
Enhanced Network Intrusion Detection System Using PCGSO-Optimized BI-GRU Model in AI-Driven Cybersecurity
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 5
Priyan Malarvizhi Kumar, Kavya Vedantham, S. Jeeva, et al.
(2024)
Closed Access | Times Cited: 5
Integrating ESG Principles into Smart Logistics: Toward Sustainable Supply Chains
Leogrande Angelo
(2025)
Open Access
Leogrande Angelo
(2025)
Open Access
Blockchain-Based and Value-Driven Enterprise Data Governance: A Collaborative Framework
Zhi Li, Fuhe Liang, Henan Hu
Sustainability (2023) Vol. 15, Iss. 11, pp. 8578-8578
Open Access | Times Cited: 11
Zhi Li, Fuhe Liang, Henan Hu
Sustainability (2023) Vol. 15, Iss. 11, pp. 8578-8578
Open Access | Times Cited: 11
Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval
Archana Chhabra, Rahul Saha, Gulshan Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 32089-32110
Open Access | Times Cited: 1
Archana Chhabra, Rahul Saha, Gulshan Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 32089-32110
Open Access | Times Cited: 1
Research on Transparency and Optimization of Aviation Materials Supply Chain based on Blockchain
Chunpeng Zhang
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2024), pp. 334-339
Closed Access | Times Cited: 1
Chunpeng Zhang
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2024), pp. 334-339
Closed Access | Times Cited: 1
Security challenges in civil registration: safeguarding vital information in an evolving landscape
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Como avaliar o impacto do blockchain sobre segurança e privacidade de dados na cadeia de suprimentos digital? Uma resivão do estado da arte
Eliane Somavilla, Gisele de Lorena Diniz Chaves
Brazilian Journal of Production Engineering (2024) Vol. 10, Iss. 2, pp. 196-224
Open Access
Eliane Somavilla, Gisele de Lorena Diniz Chaves
Brazilian Journal of Production Engineering (2024) Vol. 10, Iss. 2, pp. 196-224
Open Access
IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm
Devi Paramasivam, Sathyalakshmi Sivaji, Venkata Subramanian Dayanandan, et al.
Multimedia Tools and Applications (2024)
Closed Access
Devi Paramasivam, Sathyalakshmi Sivaji, Venkata Subramanian Dayanandan, et al.
Multimedia Tools and Applications (2024)
Closed Access
Exploring IoT and Blockchain: A Comprehensive Survey on Security, Integration Strategies, Applications and Future Research Directions
Muath Obaidat, Majdi Rawashdeh, Mohammad Alja’afreh, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 12, pp. 174-174
Open Access
Muath Obaidat, Majdi Rawashdeh, Mohammad Alja’afreh, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 12, pp. 174-174
Open Access
An agile solution for enhancing cybersecurity attack detection using deep learning privacy-preservation in IoT-smart city
V. Jaganraja, R. Srinivasan
Wireless Networks (2024)
Closed Access
V. Jaganraja, R. Srinivasan
Wireless Networks (2024)
Closed Access
Sustainable Entrepreneurship in Emerging Economies (BRICS)
Sachin Prakash Srivastava, Sonali Srivastava, Himanshu Varshney, et al.
Advances in business strategy and competitive advantage book series (2024), pp. 255-284
Closed Access
Sachin Prakash Srivastava, Sonali Srivastava, Himanshu Varshney, et al.
Advances in business strategy and competitive advantage book series (2024), pp. 255-284
Closed Access
An Enhanced Neural Network Algorithm with Quasi-Oppositional-Based and Chaotic Sine-Cosine Learning Strategies
X. A. Xiong, Shaobo Li, Fengbin Wu
Entropy (2023) Vol. 25, Iss. 9, pp. 1255-1255
Open Access | Times Cited: 1
X. A. Xiong, Shaobo Li, Fengbin Wu
Entropy (2023) Vol. 25, Iss. 9, pp. 1255-1255
Open Access | Times Cited: 1
Supply chain management with secured data transmission via improved DNA cryptosystem
Priti S. Lahane, Shivaji R. Lahane
Web Intelligence (2023) Vol. 22, Iss. 3, pp. 401-424
Closed Access
Priti S. Lahane, Shivaji R. Lahane
Web Intelligence (2023) Vol. 22, Iss. 3, pp. 401-424
Closed Access
Research on Power Supply Chain Security Risk Monitoring based on Particle Swarm Optimization
Junyi Li, Yating Jin, Huiying Weng, et al.
2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC) (2023)
Closed Access
Junyi Li, Yating Jin, Huiying Weng, et al.
2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC) (2023)
Closed Access