
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cybersecurity and Data Privacy in the Cloudlet for Preliminary Healthcare Big Data Analytics
Tariq Javid, Muhammad Faris, Hira Beenish, et al.
2020 International Conference on Computing and Information Technology (ICCIT-1441) (2020), pp. 1-4
Closed Access | Times Cited: 16
Tariq Javid, Muhammad Faris, Hira Beenish, et al.
2020 International Conference on Computing and Information Technology (ICCIT-1441) (2020), pp. 1-4
Closed Access | Times Cited: 16
Showing 16 citing articles:
Utilization of mobile edge computing on the Internet of Medical Things: A survey
Ahmed I. Awad, Mostafa M. Fouda, Marwa M. Khashaba, et al.
ICT Express (2022) Vol. 9, Iss. 3, pp. 473-485
Open Access | Times Cited: 66
Ahmed I. Awad, Mostafa M. Fouda, Marwa M. Khashaba, et al.
ICT Express (2022) Vol. 9, Iss. 3, pp. 473-485
Open Access | Times Cited: 66
The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0
Kitty Kioskli, Theofanis Fotis, Sokratis Nifakos, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3410-3410
Open Access | Times Cited: 28
Kitty Kioskli, Theofanis Fotis, Sokratis Nifakos, et al.
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3410-3410
Open Access | Times Cited: 28
A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions
Ahmad Alzu’bi, Alaa Alomar, Shahed Alkhaza’leh, et al.
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 1152-1180
Open Access | Times Cited: 12
Ahmad Alzu’bi, Alaa Alomar, Shahed Alkhaza’leh, et al.
Tsinghua Science & Technology (2024) Vol. 29, Iss. 4, pp. 1152-1180
Open Access | Times Cited: 12
Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
Akashdeep Bhardwaj, Keshav Kaushik
International Journal of Cloud Applications and Computing (2022) Vol. 12, Iss. 1, pp. 1-20
Closed Access | Times Cited: 24
Akashdeep Bhardwaj, Keshav Kaushik
International Journal of Cloud Applications and Computing (2022) Vol. 12, Iss. 1, pp. 1-20
Closed Access | Times Cited: 24
Privacy-preserving task allocation for edge computing-based mobile crowdsensing
Xuyang Ding, Ruizhao Lv, Xiaoyi Pang, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107528-107528
Closed Access | Times Cited: 29
Xuyang Ding, Ruizhao Lv, Xiaoyi Pang, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107528-107528
Closed Access | Times Cited: 29
Industry 4.0 and healthcare: Context, applications, benefits and challenges
Konstantinos Kotzias, Faiza Allah Bukhsh, Jeewanie Jayasinghe Arachchige, et al.
IET Software (2022) Vol. 17, Iss. 3, pp. 195-248
Open Access | Times Cited: 22
Konstantinos Kotzias, Faiza Allah Bukhsh, Jeewanie Jayasinghe Arachchige, et al.
IET Software (2022) Vol. 17, Iss. 3, pp. 195-248
Open Access | Times Cited: 22
Systematic analysis of healthcare big data analytics for efficient care and disease diagnosing
Sulaiman Khan, Habib Ullah Khan, Shah Nazir
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 22
Sulaiman Khan, Habib Ullah Khan, Shah Nazir
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 22
Enhancing Transparency and Efficiency in Auditing and Regulatory Compliance with Disruptive Technologies
Georgios L. Thanasas, Georgios Kampiotis, Aikaterini Karkantzou
Theoretical Economics Letters (2025) Vol. 15, Iss. 01, pp. 214-233
Open Access
Georgios L. Thanasas, Georgios Kampiotis, Aikaterini Karkantzou
Theoretical Economics Letters (2025) Vol. 15, Iss. 01, pp. 214-233
Open Access
Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard
Mayank Pathak, Kamta Nath Mishra, Satya P. Singh
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 3
Mayank Pathak, Kamta Nath Mishra, Satya P. Singh
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 3
Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values
Jun‐Hak Lee, Jin-Woo Jeong, Sungji Jung, et al.
Journal of Personalized Medicine (2022) Vol. 12, Iss. 2, pp. 190-190
Open Access | Times Cited: 12
Jun‐Hak Lee, Jin-Woo Jeong, Sungji Jung, et al.
Journal of Personalized Medicine (2022) Vol. 12, Iss. 2, pp. 190-190
Open Access | Times Cited: 12
The Effectiveness of IoT Based Wearable Devices and Potential Cybersecurity Risks: A Systematic Literature Review from the Last Decade
Mohd Fazli Mohd Sam, Albert Feisal Muhd Feisal Ismail, Kamarudin Abu Bakar, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2022) Vol. 18, Iss. 09, pp. 56-73
Open Access | Times Cited: 9
Mohd Fazli Mohd Sam, Albert Feisal Muhd Feisal Ismail, Kamarudin Abu Bakar, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2022) Vol. 18, Iss. 09, pp. 56-73
Open Access | Times Cited: 9
Cybersecurity in Healthcare: Safeguarding Patient Data
Punam Prabha, N. Suresh Kumar, Navya Shree, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access | Times Cited: 1
Punam Prabha, N. Suresh Kumar, Navya Shree, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-6
Closed Access | Times Cited: 1
Transformation in Accounting Practices
Georgios L. Thanasas, Georgios Kampiotis
Technium Business and Management (2024) Vol. 10, pp. 1-16
Open Access | Times Cited: 1
Georgios L. Thanasas, Georgios Kampiotis
Technium Business and Management (2024) Vol. 10, pp. 1-16
Open Access | Times Cited: 1
Managing Healthcare Data Using Machine Learning and Blockchain Technology
BKSP Kumar Raju Alluri
(2022), pp. 203-233
Closed Access | Times Cited: 1
BKSP Kumar Raju Alluri
(2022), pp. 203-233
Closed Access | Times Cited: 1
Sağlık hizmetleri için Medikal 4.0 Teknolojileri: Özellikler Yetenekler ve Uygulamalar
(2023)
Open Access
(2023)
Open Access
Threat Analysis and Mitigation for a Secure Healthcare System
Uday Kiran K
Turkish Journal of Computer and Mathematics Education (TURCOMAT) (2021) Vol. 12, Iss. 13, pp. 1399-1410
Closed Access
Uday Kiran K
Turkish Journal of Computer and Mathematics Education (TURCOMAT) (2021) Vol. 12, Iss. 13, pp. 1399-1410
Closed Access