
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications
Haroon Elahi, Guojun Wang, Yang Xu, et al.
Computer Standards & Interfaces (2021) Vol. 78, pp. 103538-103538
Closed Access | Times Cited: 7
Haroon Elahi, Guojun Wang, Yang Xu, et al.
Computer Standards & Interfaces (2021) Vol. 78, pp. 103538-103538
Closed Access | Times Cited: 7
Showing 7 citing articles:
Artificial Intelligence Trust, Risk and Security Management (AI TRiSM): Frameworks, applications, challenges and future research directions
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 160
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 160
Artificial intelligence for system security assurance: A systematic literature review
Shao-Fang Wen, Ankur Shukla, Basel Katt
International Journal of Information Security (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
Shao-Fang Wen, Ankur Shukla, Basel Katt
International Journal of Information Security (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
Artificial intelligence for system security assurance: A systematic literature review
Shao-Fang Wen, Ankur Shukla, Basel Katt
Research Square (Research Square) (2024)
Closed Access | Times Cited: 1
Shao-Fang Wen, Ankur Shukla, Basel Katt
Research Square (Research Square) (2024)
Closed Access | Times Cited: 1
A Qualitative Study of App Acquisition and Management
Haroon Elahi, Guojun Wang, Wenjun Jiang, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 1907-1925
Closed Access | Times Cited: 1
Haroon Elahi, Guojun Wang, Wenjun Jiang, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 1907-1925
Closed Access | Times Cited: 1
AI-Based Methods to Detect and Counter Cyber Threats in Cloud Environments to Strengthen Cloud Security
Diwakar Chaudhary, Sanjeev Verma, Vijay Mohan Shrimal, et al.
(2024), pp. 1-6
Closed Access
Diwakar Chaudhary, Sanjeev Verma, Vijay Mohan Shrimal, et al.
(2024), pp. 1-6
Closed Access
Risk Assessment Method of Cloud Environment
Martin ZboĆil
Computing and Informatics (2022) Vol. 41, Iss. 5, pp. 1186-1206
Open Access | Times Cited: 1
Martin ZboĆil
Computing and Informatics (2022) Vol. 41, Iss. 5, pp. 1186-1206
Open Access | Times Cited: 1
Research on Network Psychological Education Model Based on Cloud Computing
Lina Liu
Learning and analytics in intelligent systems (2023), pp. 475-484
Closed Access
Lina Liu
Learning and analytics in intelligent systems (2023), pp. 475-484
Closed Access