
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An analysis of security issues for cloud computing
Keiko Hashizume, David G. Rosado, Eduardo Fernández‐Medina, et al.
Journal of Internet Services and Applications (2013) Vol. 4, Iss. 1, pp. 5-5
Open Access | Times Cited: 715
Keiko Hashizume, David G. Rosado, Eduardo Fernández‐Medina, et al.
Journal of Internet Services and Applications (2013) Vol. 4, Iss. 1, pp. 5-5
Open Access | Times Cited: 715
Showing 1-25 of 715 citing articles:
Security in cloud computing: Opportunities and challenges
Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos
Information Sciences (2015) Vol. 305, pp. 357-383
Closed Access | Times Cited: 771
Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos
Information Sciences (2015) Vol. 305, pp. 357-383
Closed Access | Times Cited: 771
Next generation cloud computing: New trends and research directions
Blesson Varghese, Rajkumar Buyya
Future Generation Computer Systems (2017) Vol. 79, pp. 849-861
Open Access | Times Cited: 754
Blesson Varghese, Rajkumar Buyya
Future Generation Computer Systems (2017) Vol. 79, pp. 849-861
Open Access | Times Cited: 754
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
Yang Lu, Li Da Xu
IEEE Internet of Things Journal (2018) Vol. 6, Iss. 2, pp. 2103-2115
Closed Access | Times Cited: 484
Yang Lu, Li Da Xu
IEEE Internet of Things Journal (2018) Vol. 6, Iss. 2, pp. 2103-2115
Closed Access | Times Cited: 484
A survey on cloud computing security: Issues, threats, and solutions
Saurabh Singh, Young‐Sik Jeong, Jong Hyuk Park
Journal of Network and Computer Applications (2016) Vol. 75, pp. 200-222
Closed Access | Times Cited: 457
Saurabh Singh, Young‐Sik Jeong, Jong Hyuk Park
Journal of Network and Computer Applications (2016) Vol. 75, pp. 200-222
Closed Access | Times Cited: 457
Knowledge-based recommendation: a review of ontology-based recommender systems for e-learning
John K. Tarus, Zhendong Niu, Ghulam Mustafa
Artificial Intelligence Review (2017) Vol. 50, Iss. 1, pp. 21-48
Closed Access | Times Cited: 435
John K. Tarus, Zhendong Niu, Ghulam Mustafa
Artificial Intelligence Review (2017) Vol. 50, Iss. 1, pp. 21-48
Closed Access | Times Cited: 435
Cloud security issues and challenges: A survey
Ashish Singh, Kakali Chatterjee
Journal of Network and Computer Applications (2016) Vol. 79, pp. 88-115
Closed Access | Times Cited: 409
Ashish Singh, Kakali Chatterjee
Journal of Network and Computer Applications (2016) Vol. 79, pp. 88-115
Closed Access | Times Cited: 409
Cloud computing and education: A state-of-the-art survey
José A. González-Martínez, Miguel L. Bote‐Lorenzo, Eduardo Gómez‐Sánchez, et al.
Computers & Education (2014) Vol. 80, pp. 132-151
Closed Access | Times Cited: 305
José A. González-Martínez, Miguel L. Bote‐Lorenzo, Eduardo Gómez‐Sánchez, et al.
Computers & Education (2014) Vol. 80, pp. 132-151
Closed Access | Times Cited: 305
Security for 5G and Beyond
Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 21, Iss. 4, pp. 3682-3722
Closed Access | Times Cited: 288
Ijaz Ahmad, Shahriar Shahabuddin, Tanesh Kumar, et al.
IEEE Communications Surveys & Tutorials (2019) Vol. 21, Iss. 4, pp. 3682-3722
Closed Access | Times Cited: 288
Cloud Computing Security: A Survey
Issa Khalil, Abdallah Khreishah, Muhammad Azeem
Computers (2014) Vol. 3, Iss. 1, pp. 1-35
Open Access | Times Cited: 256
Issa Khalil, Abdallah Khreishah, Muhammad Azeem
Computers (2014) Vol. 3, Iss. 1, pp. 1-35
Open Access | Times Cited: 256
A survey of security issues for cloud computing
Minhaj Ahmad Khan
Journal of Network and Computer Applications (2016) Vol. 71, pp. 11-29
Closed Access | Times Cited: 230
Minhaj Ahmad Khan
Journal of Network and Computer Applications (2016) Vol. 71, pp. 11-29
Closed Access | Times Cited: 230
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
Rakesh Kumar, Rinkaj Goyal
Computer Science Review (2019) Vol. 33, pp. 1-48
Closed Access | Times Cited: 228
Rakesh Kumar, Rinkaj Goyal
Computer Science Review (2019) Vol. 33, pp. 1-48
Closed Access | Times Cited: 228
A Review on Internet of Things for Defense and Public Safety
Paula Fraga‐Lamas, Tiago M. Fernández‐Caramés, Manuel Suárez-Albela, et al.
Sensors (2016) Vol. 16, Iss. 10, pp. 1644-1644
Open Access | Times Cited: 226
Paula Fraga‐Lamas, Tiago M. Fernández‐Caramés, Manuel Suárez-Albela, et al.
Sensors (2016) Vol. 16, Iss. 10, pp. 1644-1644
Open Access | Times Cited: 226
A state-of-the-art survey of cloud manufacturing
Wu He, Lida Xu
International Journal of Computer Integrated Manufacturing (2014) Vol. 28, Iss. 3, pp. 239-250
Closed Access | Times Cited: 225
Wu He, Lida Xu
International Journal of Computer Integrated Manufacturing (2014) Vol. 28, Iss. 3, pp. 239-250
Closed Access | Times Cited: 225
Cloud computing-enabled healthcare opportunities, issues, and applications: A systematic review
Omar Ali, Anup Shrestha, Jeffrey Soar, et al.
International Journal of Information Management (2018) Vol. 43, pp. 146-158
Closed Access | Times Cited: 210
Omar Ali, Anup Shrestha, Jeffrey Soar, et al.
International Journal of Information Management (2018) Vol. 43, pp. 146-158
Closed Access | Times Cited: 210
Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN
N. Pandeeswari, G.P.Ramesh Kumar
Mobile Networks and Applications (2015) Vol. 21, Iss. 3, pp. 494-505
Closed Access | Times Cited: 186
N. Pandeeswari, G.P.Ramesh Kumar
Mobile Networks and Applications (2015) Vol. 21, Iss. 3, pp. 494-505
Closed Access | Times Cited: 186
Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
Waqas Ahmad, Aamir Rasool, Abdul Rehman Javed, et al.
Electronics (2021) Vol. 11, Iss. 1, pp. 16-16
Open Access | Times Cited: 183
Waqas Ahmad, Aamir Rasool, Abdul Rehman Javed, et al.
Electronics (2021) Vol. 11, Iss. 1, pp. 16-16
Open Access | Times Cited: 183
Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms
Nesrine Kaaniche, Maryline Laurent
Computer Communications (2017) Vol. 111, pp. 120-141
Closed Access | Times Cited: 177
Nesrine Kaaniche, Maryline Laurent
Computer Communications (2017) Vol. 111, pp. 120-141
Closed Access | Times Cited: 177
Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges
Neha Agrawal, Shashikala Tapaswi
IEEE Communications Surveys & Tutorials (2019) Vol. 21, Iss. 4, pp. 3769-3795
Closed Access | Times Cited: 156
Neha Agrawal, Shashikala Tapaswi
IEEE Communications Surveys & Tutorials (2019) Vol. 21, Iss. 4, pp. 3769-3795
Closed Access | Times Cited: 156
Cloud computing security: A survey of service-based models
Fatemeh Khoda Parast, Chandni Sindhav, Seema Nikam, et al.
Computers & Security (2021) Vol. 114, pp. 102580-102580
Closed Access | Times Cited: 133
Fatemeh Khoda Parast, Chandni Sindhav, Seema Nikam, et al.
Computers & Security (2021) Vol. 114, pp. 102580-102580
Closed Access | Times Cited: 133
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse
Yogesh K. Dwivedi, Nir Kshetri, Laurie Hughes, et al.
Information Systems Frontiers (2023) Vol. 25, Iss. 5, pp. 2071-2114
Open Access | Times Cited: 117
Yogesh K. Dwivedi, Nir Kshetri, Laurie Hughes, et al.
Information Systems Frontiers (2023) Vol. 25, Iss. 5, pp. 2071-2114
Open Access | Times Cited: 117
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions
Milan Chauhan, Stavros Shiaeles
Network (2023) Vol. 3, Iss. 3, pp. 422-450
Open Access | Times Cited: 47
Milan Chauhan, Stavros Shiaeles
Network (2023) Vol. 3, Iss. 3, pp. 422-450
Open Access | Times Cited: 47
Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions
Sultan Aldossary, William H. Allen
International Journal of Advanced Computer Science and Applications (2016) Vol. 7, Iss. 4
Open Access | Times Cited: 168
Sultan Aldossary, William H. Allen
International Journal of Advanced Computer Science and Applications (2016) Vol. 7, Iss. 4
Open Access | Times Cited: 168
A Study of Security Vulnerabilities on Docker Hub
Rui Shu, Xiaohui Gu, William Enck
(2017)
Open Access | Times Cited: 153
Rui Shu, Xiaohui Gu, William Enck
(2017)
Open Access | Times Cited: 153
From Security to Assurance in the Cloud
Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, et al.
ACM Computing Surveys (2015) Vol. 48, Iss. 1, pp. 1-50
Open Access | Times Cited: 146
Claudio A. Ardagna, Rasool Asal, Ernesto Damiani, et al.
ACM Computing Surveys (2015) Vol. 48, Iss. 1, pp. 1-50
Open Access | Times Cited: 146