
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cyber security Vulnerabilities and Remediation Through Cloud Security Tools
FNU Jimmy
Deleted Journal (2024) Vol. 3, Iss. 1, pp. 196-233
Open Access | Times Cited: 8
FNU Jimmy
Deleted Journal (2024) Vol. 3, Iss. 1, pp. 196-233
Open Access | Times Cited: 8
Showing 8 citing articles:
The Power of Digitalization, the Hainan Free Trade Port, and Regulations for Modern Economic Development in Turkmenistan Are Significant
Shumin Wang, Odenyazova Maysa, Muhammad Bilawal Khaskheli, et al.
Sustainability (2024) Vol. 16, Iss. 14, pp. 5947-5947
Open Access | Times Cited: 3
Shumin Wang, Odenyazova Maysa, Muhammad Bilawal Khaskheli, et al.
Sustainability (2024) Vol. 16, Iss. 14, pp. 5947-5947
Open Access | Times Cited: 3
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks
Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad, et al.
Symmetry (2024) Vol. 16, Iss. 5, pp. 605-605
Open Access | Times Cited: 1
Syeda Wajiha Zahra, Muhammad Nadeem, Ali Arshad, et al.
Symmetry (2024) Vol. 16, Iss. 5, pp. 605-605
Open Access | Times Cited: 1
Patient Privacy Protection Maturity Evaluation Framework
Güney Gürsel, Nükhet BAYER, Ömer Turunç, et al.
(2024)
Open Access | Times Cited: 1
Güney Gürsel, Nükhet BAYER, Ömer Turunç, et al.
(2024)
Open Access | Times Cited: 1
SEPCVN: Secure and Efficient Protocol for Cloud Vehicular Networking
Vinod Kumar, Seema, Kamal Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 108657-108672
Open Access | Times Cited: 1
Vinod Kumar, Seema, Kamal Kumar, et al.
IEEE Access (2024) Vol. 12, pp. 108657-108672
Open Access | Times Cited: 1
Cyber Security and Cyber Threats in the Jordan Business Context
Alanoud Amer Saleem Alrkeebat
International Journal of Academic Research in Business and Social Sciences (2024) Vol. 14, Iss. 6
Open Access | Times Cited: 1
Alanoud Amer Saleem Alrkeebat
International Journal of Academic Research in Business and Social Sciences (2024) Vol. 14, Iss. 6
Open Access | Times Cited: 1
An Evaluation of Patient Privacy Protection with Fuzzy Conjoint Analysis—A Case Study from Nurses’ Perspective
Güney Gürsel, Nükhet BAYER, Ömer Turunç, et al.
Healthcare (2024) Vol. 12, Iss. 13, pp. 1363-1363
Open Access | Times Cited: 1
Güney Gürsel, Nükhet BAYER, Ömer Turunç, et al.
Healthcare (2024) Vol. 12, Iss. 13, pp. 1363-1363
Open Access | Times Cited: 1
Behind the Code: Identifying Zero-Day Exploits in WordPress
Mohamed Azarudheen Mohamed Mohideen, Muhammad Shahroz Nadeem, James Hardy, et al.
Future Internet (2024) Vol. 16, Iss. 7, pp. 256-256
Open Access
Mohamed Azarudheen Mohamed Mohideen, Muhammad Shahroz Nadeem, James Hardy, et al.
Future Internet (2024) Vol. 16, Iss. 7, pp. 256-256
Open Access
Reverse Engineering: Techniques, Applications, Challenges, Opportunities
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access