OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

E-Government Security and Privacy Issues
Imdad Ali Shah, Sobia Wassan, Muhammad Hamza Usmani
Advances in electronic government, digital divide, and regional development book series (2022), pp. 61-76
Closed Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Use of AI-Based Drones in Smart Cities
Imdad Ali Shah, N. Z. Jhanjhi, Sarfraz Nawaz Brohi
Advances in information security, privacy, and ethics book series (2024), pp. 362-380
Closed Access | Times Cited: 16

Drone Technology
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 14

Cybersecurity and Blockchain Usage in Contemporary Business
Imdad Ali Shah, N. Z. Jhanjhi, Areeba Laraib
Advances in information security, privacy, and ethics book series (2022), pp. 49-64
Closed Access | Times Cited: 38

IoT Devices in Drones
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in information security, privacy, and ethics book series (2024), pp. 217-235
Closed Access | Times Cited: 13

Artificial Intelligence Applications in the Context of the Security Framework for the Logistics Industry
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in computational intelligence and robotics book series (2024), pp. 297-316
Closed Access | Times Cited: 11

Drone Industry Security Issues and Challenges in the Context of IoD
Imdad Ali Shah
Advances in information security, privacy, and ethics book series (2024), pp. 310-323
Closed Access | Times Cited: 11

Enabling Explainable AI in Cybersecurity Solutions
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in computational intelligence and robotics book series (2024), pp. 255-275
Closed Access | Times Cited: 9

Use of AI Applications for the Drone Industry
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9

Drone Technology in the Context of the Internet of Things
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 88-107
Closed Access | Times Cited: 9

Use of Deep Learning Applications for Drone Technology
Imdad Ali Shah, N. Z. Jhanjhi, Samina Rajper
Advances in information security, privacy, and ethics book series (2024), pp. 128-147
Closed Access | Times Cited: 8

Digitalization in Emerging Economies
Mark Esposito, Yusaf H. Akbar, Francis Xavier Campbell
(2025)
Closed Access

The Role of the IoT and Digital Twin in the Healthcare Digitalization Process
Imdad Ali Shah, Quratulain Sial, N. Z. Jhanjhi, et al.
Advances in medical technologies and clinical practice book series (2022), pp. 20-34
Closed Access | Times Cited: 22

Supply Chain Management Security Issues and Challenges in the Context of AI Applications
Imdad Ali Shah, Raja Kumar Murugesan, Samina Rajper
Advances in information security, privacy, and ethics book series (2024), pp. 59-89
Closed Access | Times Cited: 4

Logistics Industry in the Context of the Blockchain Technology
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 3

Cybersecurity Issues and Challenges in Civil Aviation Security
Imdad Ali Shah, N. Z. Jhanjhi, Sarfraz Nawaz Brohi
(2024), pp. 1-23
Closed Access | Times Cited: 3

Use Cases for Digital Twin
Imdad Ali Shah, Quratulain Sial, N. Z. Jhanjhi, et al.
Advances in medical technologies and clinical practice book series (2022), pp. 102-118
Closed Access | Times Cited: 15

Privacy and Security Challenges in Unmanned Aerial Vehicles (UAVs)
Imdad Ali Shah
(2024), pp. 93-115
Closed Access | Times Cited: 2

The Internet of Things (IoT) Is Revolutionizing Inventory Management
Imdad Ali Shah, Areesha Sial, Sarfraz Nawaz Brohi
Advances in information security, privacy, and ethics book series (2024), pp. 123-147
Closed Access | Times Cited: 1

Emerging Electric Vehicles and Challenges
Areeba Laraib, Raja Majid Ali Ujjan
(2024), pp. 165-186
Closed Access | Times Cited: 1

IoT‐Based Railway Logistics
N. Z. Jhanjhi, Loveleen Gaur, Imran Taj
(2024), pp. 143-163
Closed Access | Times Cited: 1

Importance of E‐Maintenance for Railways Logistic
Areeba Laraib
(2024), pp. 69-92
Closed Access | Times Cited: 1

Enhancing Legally-Based E-Government Services in Education Through Artificial Intelligence
Žaklina Spalević, Jelena Kaljević, S. Vucetic, et al.
International Journal of Cognitive Research in Science Engineering and Education (2023) Vol. 11, Iss. 3, pp. 511-518
Open Access | Times Cited: 2

Smart Web Dictionary using OCR
Sahil Verma, Azhar Ashraf, Babita Rawat, et al.
(2024) Vol. 13, pp. 1-7
Closed Access

Digital inclusivity: exploring e-government use among businesses in Ghana
Anthony Agyemang Acquah
Transforming Government People Process and Policy (2024) Vol. 18, Iss. 4, pp. 856-873
Closed Access

Security Challenges in Mobile Cloud Computing
Ravinder, Mohammad Shuaib Khan, J. Singh
(2024) Vol. 10, pp. 1-9
Closed Access

Page 1 - Next Page

Scroll to top