OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cyberattacks and Security of Cloud Computing: A Complete Guideline
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21

Showing 21 citing articles:

Secure and Efficient Outsourced Computation in Cloud Computing Environments
Varun Dixit, Davinderjit Kaur
Journal of Software Engineering and Applications (2024) Vol. 17, Iss. 09, pp. 750-762
Closed Access | Times Cited: 19

LEADING SAAS INNOVATION WITHIN U.S. REGULATORY BOUNDARIES: THE ROLE OF TPMS IN NAVIGATING COMPLIANCE
Excel G Chukwurah
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 4, pp. 1372-1385
Open Access | Times Cited: 11

Evidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning
Suhaila Abuowaida, Hamza Abu Owida, Sulieman Ibraheem Shelash Al-Hawary, et al.
Data & Metadata (2025) Vol. 4, pp. 699-699
Closed Access

Utilizing natural language processing for precision prevention of mental health disorders among youth: A systematic review
Sheriff Tolulope Ibrahim, Madeline Li, Jamin Patel, et al.
Computers in Biology and Medicine (2025) Vol. 188, pp. 109859-109859
Open Access

Perspective Chapter: Intrusion Detection Systems in Cloud Environment
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access

Enhancing Phishing Detection in Cloud Environments Using RNN-LSTM in a Deep Learning Framework
Oussama Senouci, Nadjib Benaouda
Journal of Telecommunications and Information Technology (2025)
Open Access

Enhancing Cybersecurity Through Compliance and Auditing: A Strategic Approach to Resilience
Dani Itani, Rania Itani, Ahmed Ae Eltweri, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1

Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3

Revolutionizing Higher Education in Malaysia With the Game-Changing Impact of Cloud Computing
Glaret Shirley Sinnappan, Raenu Kolandaisamy, Maran Marimuthu, et al.
Advances in educational technologies and instructional design book series (2024), pp. 80-106
Closed Access

Multi User Authentication for Reliable Data Storage in Cloud Computing
Richa Shah, Shatendra Dubey
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 2, pp. 82-89
Open Access

Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access

Characterization and Risk Assessment of Cyber Security Threats in Cloud Computing: A Comparative Evaluation of Mitigation Techniques
Oludele Awodele, Chibueze Ogbonna, Emmanuel O. Ogu, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 2, pp. 106-118
Open Access

Bulut Bilişim Mimarisi ve Güvenliği
Kemal Yigit, Faruk Ayata
Computer Science (2024)
Open Access

Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments
Saroj Mali
Internet of Things and Cloud Computing (2024) Vol. 12, Iss. 2, pp. 17-27
Open Access

Infrastructure and Network Security
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access

An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things
Chong Guo, Bei Gong, Muhammad Waqas, et al.
Sensors (2024) Vol. 24, Iss. 21, pp. 6843-6843
Open Access

A Study of Data Leakage Prevention Techniques in Remote Collaborative Work Application
Wenfang Xu, Zhao Si-ru
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2024), pp. 193-197
Closed Access

Cyber Security Threats and its Analysis
Bhumika Manhas, A. Sharma, Hardika Dixit
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 453-460
Open Access

Evaluating Current Cloud Security Challenges and IAAS Optimization
Charu, Sandeep Mathur, Alok Singh Sengar
(2024), pp. 951-956
Closed Access

Security and Privacy of Cloud Data Auditing Protocols: A Review, State-of-the-art, Open Issues, and Future Research Directions
Muhammad Farooq, Mohd Rushdi Idrus, Adi Ahmad, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access

Enterprise Data Security in the Cloud Environment: Threat Analysis
Т. В. Капелюшна
Oblik i finansi (2023), Iss. 4(102), pp. 97-104
Open Access

Page 1

Scroll to top