
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data Security and Privacy in Cloud Computing
Yunchuan Sun, Junsheng Zhang, Yongping Xiong, et al.
International Journal of Distributed Sensor Networks (2014) Vol. 10, Iss. 7, pp. 190903-190903
Open Access | Times Cited: 274
Yunchuan Sun, Junsheng Zhang, Yongping Xiong, et al.
International Journal of Distributed Sensor Networks (2014) Vol. 10, Iss. 7, pp. 190903-190903
Open Access | Times Cited: 274
Showing 1-25 of 274 citing articles:
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
Rodrigo Román, Javier López, Masahiro Mambo
Future Generation Computer Systems (2016) Vol. 78, pp. 680-698
Open Access | Times Cited: 1166
Rodrigo Román, Javier López, Masahiro Mambo
Future Generation Computer Systems (2016) Vol. 78, pp. 680-698
Open Access | Times Cited: 1166
Handbook of Cloud Computing
Borko Furht, Armando Escalante
Springer eBooks (2010)
Closed Access | Times Cited: 524
Borko Furht, Armando Escalante
Springer eBooks (2010)
Closed Access | Times Cited: 524
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 746-789
Open Access | Times Cited: 458
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 746-789
Open Access | Times Cited: 458
Exploring Data Security Issues and Solutions in Cloud Computing
P. Ravi Kumar, P. Herbert Raj, P. Jelciana
Procedia Computer Science (2018) Vol. 125, pp. 691-697
Open Access | Times Cited: 239
P. Ravi Kumar, P. Herbert Raj, P. Jelciana
Procedia Computer Science (2018) Vol. 125, pp. 691-697
Open Access | Times Cited: 239
A survey on internet of vehicles: Applications, security issues & solutions
Surbhi Sharma, Baijnath Kaushik
Vehicular Communications (2019) Vol. 20, pp. 100182-100182
Closed Access | Times Cited: 212
Surbhi Sharma, Baijnath Kaushik
Vehicular Communications (2019) Vol. 20, pp. 100182-100182
Closed Access | Times Cited: 212
Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review
Omar Ali, Anup Shrestha, Jeffrey Soar, et al.
International Journal of Information Management (2018) Vol. 43, pp. 146-158
Closed Access | Times Cited: 210
Omar Ali, Anup Shrestha, Jeffrey Soar, et al.
International Journal of Information Management (2018) Vol. 43, pp. 146-158
Closed Access | Times Cited: 210
Digital Twins in Pharmaceutical and Biopharmaceutical Manufacturing: A Literature Review
Yingjie Chen, Ou Yang, Chaitanya Sampat, et al.
Processes (2020) Vol. 8, Iss. 9, pp. 1088-1088
Open Access | Times Cited: 176
Yingjie Chen, Ou Yang, Chaitanya Sampat, et al.
Processes (2020) Vol. 8, Iss. 9, pp. 1088-1088
Open Access | Times Cited: 176
Tapping into the wearable device revolution in the work environment: a systematic review
Jayden Khakurel, Helinä Melkas, Jari Porras
Information Technology and People (2018) Vol. 31, Iss. 3, pp. 791-818
Closed Access | Times Cited: 140
Jayden Khakurel, Helinä Melkas, Jari Porras
Information Technology and People (2018) Vol. 31, Iss. 3, pp. 791-818
Closed Access | Times Cited: 140
CryptoGA: a cryptosystem based on genetic algorithm for cloud data security
Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood, et al.
Cluster Computing (2020) Vol. 24, Iss. 2, pp. 739-752
Closed Access | Times Cited: 107
Muhammad Tahir, Muhammad Sardaraz, Zahid Mehmood, et al.
Cluster Computing (2020) Vol. 24, Iss. 2, pp. 739-752
Closed Access | Times Cited: 107
Current cyber-defense trends in industrial control systems
Juan E. Rubio, Cristina Alcaraz, Rodrigo Román, et al.
Computers & Security (2019) Vol. 87, pp. 101561-101561
Closed Access | Times Cited: 93
Juan E. Rubio, Cristina Alcaraz, Rodrigo Román, et al.
Computers & Security (2019) Vol. 87, pp. 101561-101561
Closed Access | Times Cited: 93
Attacks and countermeasures in the internet of vehicles
Yunchuan Sun, Lei Wu, Shizhong Wu, et al.
Annals of Telecommunications (2016) Vol. 72, Iss. 5-6, pp. 283-295
Closed Access | Times Cited: 86
Yunchuan Sun, Lei Wu, Shizhong Wu, et al.
Annals of Telecommunications (2016) Vol. 72, Iss. 5-6, pp. 283-295
Closed Access | Times Cited: 86
Nature inspired chaotic squirrel search algorithm (CSSA) for multi objective task scheduling in an IAAS cloud computing atmosphere
M.S. Sanaj, P. M. Joe Prathap
Engineering Science and Technology an International Journal (2019) Vol. 23, Iss. 4, pp. 891-902
Open Access | Times Cited: 85
M.S. Sanaj, P. M. Joe Prathap
Engineering Science and Technology an International Journal (2019) Vol. 23, Iss. 4, pp. 891-902
Open Access | Times Cited: 85
Challenges and Sustainability of Green Finance in the Tourism Industry
Sanjeev Kumar, Mohammad Badruddoza Talukder, Firoj Kabir, et al.
Advances in finance, accounting, and economics book series (2023), pp. 97-111
Closed Access | Times Cited: 38
Sanjeev Kumar, Mohammad Badruddoza Talukder, Firoj Kabir, et al.
Advances in finance, accounting, and economics book series (2023), pp. 97-111
Closed Access | Times Cited: 38
IoB: Internet-of-batteries for electric Vehicles–Architectures, opportunities, and challenges
Heng Li, Muaaz Bin Kaleem, Zhijun Liu, et al.
Green Energy and Intelligent Transportation (2023) Vol. 2, Iss. 6, pp. 100128-100128
Open Access | Times Cited: 35
Heng Li, Muaaz Bin Kaleem, Zhijun Liu, et al.
Green Energy and Intelligent Transportation (2023) Vol. 2, Iss. 6, pp. 100128-100128
Open Access | Times Cited: 35
Data security and Integrity in Cloud Computing
Muhammad Zulkifl Hasan, Muhammad Zunnurain Hussain, Zaima Mubarak, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-5
Closed Access | Times Cited: 25
Muhammad Zulkifl Hasan, Muhammad Zunnurain Hussain, Zaima Mubarak, et al.
2022 International Conference for Advancement in Technology (ICONAT) (2023), pp. 1-5
Closed Access | Times Cited: 25
The Development of ChatGPT and Its Implications for the Future of Customer Service in the Hospitality Industry
Mohammad Badruddoza Talukder, Sanjeev Kumar
Advances in information security, privacy, and ethics book series (2024), pp. 100-126
Closed Access | Times Cited: 10
Mohammad Badruddoza Talukder, Sanjeev Kumar
Advances in information security, privacy, and ethics book series (2024), pp. 100-126
Closed Access | Times Cited: 10
Security and Privacy in the Internet of Vehicles
Yunchuan Sun, Lei Wu, Shizhong Wu, et al.
(2015), pp. 116-121
Closed Access | Times Cited: 68
Yunchuan Sun, Lei Wu, Shizhong Wu, et al.
(2015), pp. 116-121
Closed Access | Times Cited: 68
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model
Riccardo Rapuzzi, Matteo Repetto
Future Generation Computer Systems (2018) Vol. 85, pp. 235-249
Open Access | Times Cited: 66
Riccardo Rapuzzi, Matteo Repetto
Future Generation Computer Systems (2018) Vol. 85, pp. 235-249
Open Access | Times Cited: 66
Data Privacy Protection for Edge Computing of Smart City in a DIKW Architecture
Yucong Duan, Zhihui Lu, Zhangbing Zhou, et al.
Engineering Applications of Artificial Intelligence (2019) Vol. 81, pp. 323-335
Closed Access | Times Cited: 64
Yucong Duan, Zhihui Lu, Zhangbing Zhou, et al.
Engineering Applications of Artificial Intelligence (2019) Vol. 81, pp. 323-335
Closed Access | Times Cited: 64
An Overview of Multi-cloud Computing
Jiangshui Hong, Thomas Dreibholz, Joseph Adam Schenkel, et al.
Advances in intelligent systems and computing (2019), pp. 1055-1068
Closed Access | Times Cited: 62
Jiangshui Hong, Thomas Dreibholz, Joseph Adam Schenkel, et al.
Advances in intelligent systems and computing (2019), pp. 1055-1068
Closed Access | Times Cited: 62
The Emergence of Anti-Privacy and Control at the Nexus between the Concepts of Safe City and Smart City
Zaheer Allam
Smart Cities (2019) Vol. 2, Iss. 1, pp. 96-105
Open Access | Times Cited: 57
Zaheer Allam
Smart Cities (2019) Vol. 2, Iss. 1, pp. 96-105
Open Access | Times Cited: 57
Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study
Sajid Habib Gill, Mirza Abdur Razzaq, Muneer Ahmad, et al.
Intelligent Automation & Soft Computing (2021) Vol. 31, Iss. 1, pp. 117-128
Open Access | Times Cited: 54
Sajid Habib Gill, Mirza Abdur Razzaq, Muneer Ahmad, et al.
Intelligent Automation & Soft Computing (2021) Vol. 31, Iss. 1, pp. 117-128
Open Access | Times Cited: 54
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 43
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 43
New generation commerce: The rise of live commerce (L-commerce)
Jeewoo Yun, Donghun Lee, Michael Cottingham, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103394-103394
Closed Access | Times Cited: 18
Jeewoo Yun, Donghun Lee, Michael Cottingham, et al.
Journal of Retailing and Consumer Services (2023) Vol. 74, pp. 103394-103394
Closed Access | Times Cited: 18
Role of data safety and perceived privacy for acceptance of IoT-enabled technologies at smart tourism destinations
Veenus Tiwari, Abhishek Mishra, Shitesh Tiwari
Current Issues in Tourism (2023), pp. 1-16
Closed Access | Times Cited: 17
Veenus Tiwari, Abhishek Mishra, Shitesh Tiwari
Current Issues in Tourism (2023), pp. 1-16
Closed Access | Times Cited: 17