OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of recurring vulnerabilities in computing services
Sarvesh Kumar, Kamlesh Kumar Dubey, Arun Kumar Gautam, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2022) Vol. 25, Iss. 4, pp. 1063-1071
Closed Access | Times Cited: 11

Showing 11 citing articles:

A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption
C.T.Dora Pravina, Mrunalini Buradkar, Md Khalid Jamal, et al.
(2022), pp. 1-5
Closed Access | Times Cited: 24

Internet of thing uses in materialistic ameliorate farming through AI
Prabhat Kumar Srivastava, Sarvesh Kumar, Ashish Tiwari, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020133-020133
Closed Access | Times Cited: 15

Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques
D. Veeraiah, Rajanikanta Mohanty, Shakti Kundu, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 17

Strengthening Cybersecurity in Smart Homes
R. Vanidha Sri, Kathirvel Ayyaswamy
Advances in information security, privacy, and ethics book series (2025), pp. 437-448
Closed Access

High-Availability Encryption-Based Cloud Resource Provisioning System
K. Ranjith Singh, Abdul Shareef Pallivalappil, Pooja Singh, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 11

Evaluating the Efficiency of Non-Orthogonal MU-MIMO Methods in Smart Cities Technologies & 5G Communication
Papiya Dutta, Jvl Ramyasree, V. Sridhar, et al.
Sustainability (2022) Vol. 15, Iss. 1, pp. 236-236
Open Access | Times Cited: 5

Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage
Ravi Kumar, T. Sathiya, Harish Chandra Mohanta, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 4

Medical Image Fusion Solid Works Supporting Multiple Techniques with Feature-Level Transforms
Rakhi Mutha, Devendra Nath Pathak, Vandana Ahuja, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 937-942
Closed Access | Times Cited: 1

A novel approach for an efficient and secure image identity-based signature computing system
Bilal Ahmed Mir, S Ramesh Raja, Gunjan Sardana, et al.
AIP conference proceedings (2023) Vol. 2782, pp. 020130-020130
Closed Access

Methodologies and Challenges of Cybersecurity Techniques in Cloud Computing Environment
Mohit Tiwari, Tripti Tiwari, Amrita Ticku, et al.
(2023), pp. 1-7
Closed Access

Analysis and Design A framework identifying Crop nutrients Using KNN Approach
Shivam Tiwari, Barinderjit Singh, Sunita Pachar, et al.
(2022), pp. 1-4
Closed Access

Page 1

Scroll to top