
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of recurring vulnerabilities in computing services
Sarvesh Kumar, Kamlesh Kumar Dubey, Arun Kumar Gautam, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2022) Vol. 25, Iss. 4, pp. 1063-1071
Closed Access | Times Cited: 11
Sarvesh Kumar, Kamlesh Kumar Dubey, Arun Kumar Gautam, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2022) Vol. 25, Iss. 4, pp. 1063-1071
Closed Access | Times Cited: 11
Showing 11 citing articles:
A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
C.T.Dora Pravina, Mrunalini Buradkar, Md Khalid Jamal, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 24
C.T.Dora Pravina, Mrunalini Buradkar, Md Khalid Jamal, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 24
Internet of thing uses in materialistic ameliorate farming through AI
Prabhat Kumar Srivastava, Sarvesh Kumar, Ashish Tiwari, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020133-020133
Closed Access | Times Cited: 15
Prabhat Kumar Srivastava, Sarvesh Kumar, Ashish Tiwari, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020133-020133
Closed Access | Times Cited: 15
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17
Strengthening Cybersecurity in Smart Homes
R. Vanidha Sri, Kathirvel Ayyaswamy
Advances in information security, privacy, and ethics book series (2025), pp. 437-448
Closed Access
R. Vanidha Sri, Kathirvel Ayyaswamy
Advances in information security, privacy, and ethics book series (2025), pp. 437-448
Closed Access
High-Availability Encryption-Based Cloud Resource Provisioning System
K. Ranjith Singh, Abdul Shareef Pallivalappil, Pooja Singh, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 11
K. Ranjith Singh, Abdul Shareef Pallivalappil, Pooja Singh, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 11
Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication
Papiya Dutta, Jvl Ramyasree, V. Sridhar, et al.
Sustainability (2022) Vol. 15, Iss. 1, pp. 236-236
Open Access | Times Cited: 5
Papiya Dutta, Jvl Ramyasree, V. Sridhar, et al.
Sustainability (2022) Vol. 15, Iss. 1, pp. 236-236
Open Access | Times Cited: 5
Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage
Ravi Kumar, T. Sathiya, Harish Chandra Mohanta, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 4
Ravi Kumar, T. Sathiya, Harish Chandra Mohanta, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 4
Medical Image Fusion Solid Works Supporting Multiple Techniques with Feature-Level Transforms
Rakhi Mutha, Devendra Nath Pathak, Vandana Ahuja, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 937-942
Closed Access | Times Cited: 1
Rakhi Mutha, Devendra Nath Pathak, Vandana Ahuja, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 937-942
Closed Access | Times Cited: 1
A novel approach for an efficient and secure image identity-based signature computing system
Bilal Ahmed Mir, S Ramesh Raja, Gunjan Sardana, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020130-020130
Closed Access
Bilal Ahmed Mir, S Ramesh Raja, Gunjan Sardana, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020130-020130
Closed Access
Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment
Mohit Tiwari, Tripti Tiwari, Amrita Ticku, et al.
(2023), pp. 1-7
Closed Access
Mohit Tiwari, Tripti Tiwari, Amrita Ticku, et al.
(2023), pp. 1-7
Closed Access
Analysis and Design A framework identifying Crop nutrients Using KNN Approach
Shivam Tiwari, Barinderjit Singh, Sunita Pachar, et al.
(2022), pp. 1-4
Closed Access
Shivam Tiwari, Barinderjit Singh, Sunita Pachar, et al.
(2022), pp. 1-4
Closed Access