
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyberattacks and Security of Cloud Computing: A Complete Guideline
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, et al.
Symmetry (2023) Vol. 15, Iss. 11, pp. 1981-1981
Open Access | Times Cited: 21
Showing 21 citing articles:
Secure and Efficient Outsourced Computation in Cloud Computing Environments
Varun Dixit, Davinderjit Kaur
Journal of Software Engineering and Applications (2024) Vol. 17, Iss. 09, pp. 750-762
Closed Access | Times Cited: 19
Varun Dixit, Davinderjit Kaur
Journal of Software Engineering and Applications (2024) Vol. 17, Iss. 09, pp. 750-762
Closed Access | Times Cited: 19
LEADING SAAS INNOVATION WITHIN U.S. REGULATORY BOUNDARIES: THE ROLE OF TPMS IN NAVIGATING COMPLIANCE
Excel G Chukwurah
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 4, pp. 1372-1385
Open Access | Times Cited: 11
Excel G Chukwurah
Engineering Science & Technology Journal (2024) Vol. 5, Iss. 4, pp. 1372-1385
Open Access | Times Cited: 11
Evidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning
Suhaila Abuowaida, Hamza Abu Owida, Sulieman Ibraheem Shelash Al-Hawary, et al.
Data & Metadata (2025) Vol. 4, pp. 699-699
Closed Access
Suhaila Abuowaida, Hamza Abu Owida, Sulieman Ibraheem Shelash Al-Hawary, et al.
Data & Metadata (2025) Vol. 4, pp. 699-699
Closed Access
Utilizing natural language processing for precision prevention of mental health disorders among youth: A systematic review
Sheriff Tolulope Ibrahim, Madeline Li, Jamin Patel, et al.
Computers in Biology and Medicine (2025) Vol. 188, pp. 109859-109859
Open Access
Sheriff Tolulope Ibrahim, Madeline Li, Jamin Patel, et al.
Computers in Biology and Medicine (2025) Vol. 188, pp. 109859-109859
Open Access
Perspective Chapter: Intrusion Detection Systems in Cloud Environment
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access
Waleed Almuseelem
IntechOpen eBooks (2025)
Closed Access
Enhancing Phishing Detection in Cloud Environments Using RNN-LSTM in a Deep Learning Framework
Oussama Senouci, Nadjib Benaouda
Journal of Telecommunications and Information Technology (2025)
Open Access
Oussama Senouci, Nadjib Benaouda
Journal of Telecommunications and Information Technology (2025)
Open Access
Enhancing Cybersecurity Through Compliance and Auditing: A Strategic Approach to Resilience
Dani Itani, Rania Itani, Ahmed Ae Eltweri, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
Dani Itani, Rania Itani, Ahmed Ae Eltweri, et al.
(2024), pp. 1-10
Closed Access | Times Cited: 1
Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Revolutionizing Higher Education in Malaysia With the Game-Changing Impact of Cloud Computing
Glaret Shirley Sinnappan, Raenu Kolandaisamy, Maran Marimuthu, et al.
Advances in educational technologies and instructional design book series (2024), pp. 80-106
Closed Access
Glaret Shirley Sinnappan, Raenu Kolandaisamy, Maran Marimuthu, et al.
Advances in educational technologies and instructional design book series (2024), pp. 80-106
Closed Access
Multi User Authentication for Reliable Data Storage in Cloud Computing
Richa Shah, Shatendra Dubey
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 2, pp. 82-89
Open Access
Richa Shah, Shatendra Dubey
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 2, pp. 82-89
Open Access
Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Timothy Murkomen
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 3, pp. 234-264
Open Access
Characterization and Risk Assessment of Cyber Security Threats in Cloud Computing: A Comparative Evaluation of Mitigation Techniques
Oludele Awodele, Chibueze Ogbonna, Emmanuel O. Ogu, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 2, pp. 106-118
Open Access
Oludele Awodele, Chibueze Ogbonna, Emmanuel O. Ogu, et al.
Acadlore Transactions on AI and Machine Learning (2024) Vol. 3, Iss. 2, pp. 106-118
Open Access
Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments
Saroj Mali
Internet of Things and Cloud Computing (2024) Vol. 12, Iss. 2, pp. 17-27
Open Access
Saroj Mali
Internet of Things and Cloud Computing (2024) Vol. 12, Iss. 2, pp. 17-27
Open Access
Infrastructure and Network Security
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
Mosiur Rahaman, Sai Sravanthi Bakkireddygari, Sourasis Chattopadhyay, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 108-144
Closed Access
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things
Chong Guo, Bei Gong, Muhammad Waqas, et al.
Sensors (2024) Vol. 24, Iss. 21, pp. 6843-6843
Open Access
Chong Guo, Bei Gong, Muhammad Waqas, et al.
Sensors (2024) Vol. 24, Iss. 21, pp. 6843-6843
Open Access
A Study of Data Leakage Prevention Techniques in Remote Collaborative Work Application
Wenfang Xu, Zhao Si-ru
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2024), pp. 193-197
Closed Access
Wenfang Xu, Zhao Si-ru
Proceedings of the 7th International Conference on Cyber Security and Information Engineering (2024), pp. 193-197
Closed Access
Cyber Security Threats and its Analysis
Bhumika Manhas, A. Sharma, Hardika Dixit
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 453-460
Open Access
Bhumika Manhas, A. Sharma, Hardika Dixit
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 453-460
Open Access
Evaluating Current Cloud Security Challenges and IAAS Optimization
Charu, Sandeep Mathur, Alok Singh Sengar
(2024), pp. 951-956
Closed Access
Charu, Sandeep Mathur, Alok Singh Sengar
(2024), pp. 951-956
Closed Access
Security and Privacy of Cloud Data Auditing Protocols: A Review, State-of-the-art, Open Issues, and Future Research Directions
Muhammad Farooq, Mohd Rushdi Idrus, Adi Ahmad, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access
Muhammad Farooq, Mohd Rushdi Idrus, Adi Ahmad, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access
Enterprise Data Security in the Cloud Environment: Threat Analysis
Т. В. Капелюшна
Oblik i finansi (2023), Iss. 4(102), pp. 97-104
Open Access
Т. В. Капелюшна
Oblik i finansi (2023), Iss. 4(102), pp. 97-104
Open Access