OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cybersecurity and Blockchain Usage in Contemporary Business
Imdad Ali Shah, N. Z. Jhanjhi, Areeba Laraib
Advances in information security, privacy, and ethics book series (2022), pp. 49-64
Closed Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

Blockchain Applications in Retail Cybersecurity: Enhancing Supply Chain Integrity, Secure Transactions, and Data Protection
Rejon Kumar Ray, Faiaz Rahat Chowdhury, MD Rokibul Hasan
Journal of Business and Management Studies (2024) Vol. 6, Iss. 1, pp. 206-214
Open Access | Times Cited: 28

Data Security and Privacy Concerns in Drone Operations
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 236-290
Closed Access | Times Cited: 18

Use of AI-Based Drones in Smart Cities
Imdad Ali Shah, N. Z. Jhanjhi, Sarfraz Nawaz Brohi
Advances in information security, privacy, and ethics book series (2024), pp. 362-380
Closed Access | Times Cited: 16

Drone Technology
Imdad Ali Shah, Areeba Laraib, Humaira Ashraf, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 343-361
Closed Access | Times Cited: 16

Wireless Technology Security and Privacy: A Comprehensive Study
Hamza Azam, M. Tan, Lim Tik Pin, et al.
(2023)
Open Access | Times Cited: 24

IoT Devices in Drones
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in information security, privacy, and ethics book series (2024), pp. 217-235
Closed Access | Times Cited: 15

Cybersecurity Measures for Logistics Industry
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 1-58
Closed Access | Times Cited: 13

Artificial Intelligence Applications in the Context of the Security Framework for the Logistics Industry
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in computational intelligence and robotics book series (2024), pp. 297-316
Closed Access | Times Cited: 11

Future Trends and Emerging Threats in Drone Cybersecurity
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 148-195
Closed Access | Times Cited: 11

Enabling Explainable AI in Cybersecurity Solutions
Imdad Ali Shah, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in computational intelligence and robotics book series (2024), pp. 255-275
Closed Access | Times Cited: 10

Ethical Considerations in Drone Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Bhavin Shah, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 42-87
Closed Access | Times Cited: 10

Use of Deep Learning Applications for Drone Technology
Imdad Ali Shah, N. Z. Jhanjhi, Samina Rajper
Advances in information security, privacy, and ethics book series (2024), pp. 128-147
Closed Access | Times Cited: 9

Use of AI Applications for the Drone Industry
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 27-41
Closed Access | Times Cited: 9

Drone Technology in the Context of the Internet of Things
Imdad Ali Shah, N. Z. Jhanjhi, Raja Majid Ali Ujjan
Advances in information security, privacy, and ethics book series (2024), pp. 88-107
Closed Access | Times Cited: 9

Cybercrime Unmasked: Investigating Cases and Digital Evidence
Hamza Azam, Mohammad Irfan Dulloo, Muhammad Hassan Majeed, et al.
International Journal of Emerging Multidisciplinaries Computer Science & Artificial Intelligence (2023) Vol. 2, Iss. 1
Open Access | Times Cited: 22

Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
Siva Raja Sindiramutty, N. Z. Jhanjhi, Chong Eng Tan, et al.
Advances in logistics, operations, and management science book series (2023), pp. 156-223
Closed Access | Times Cited: 20

Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure
Azheen Waheed, Bhavish Seegolam, Mohammad Faizaan Jowaheer, et al.
(2024)
Open Access | Times Cited: 8

Logistics With the Internet of Things
Imdad Ali Shah, N. Z. Jhanjhi, Humaira Ashraf
Advances in information security, privacy, and ethics book series (2024), pp. 172-195
Closed Access | Times Cited: 6

Internet of Things (IoT) Impact on Inventory Management
Azeem Khan, N. Z. Jhanjhi, Dayang Hajah Tiawa Binte Awang Haji Hamid, et al.
Advances in logistics, operations, and management science book series (2023), pp. 224-247
Closed Access | Times Cited: 11

Logistics Industry in the Context of the Blockchain Technology
Imdad Ali Shah, Areeba Laraib, Fida Hussain
Advances in information security, privacy, and ethics book series (2024), pp. 214-235
Closed Access | Times Cited: 4

Ethical and Social Implications of Industry 4.0 in SCM
Azeem Khan, N. Z. Jhanjhi, Sayan Kumar Ray, et al.
Advances in logistics, operations, and management science book series (2024), pp. 234-274
Closed Access | Times Cited: 4

Progress and Obstacles in Cloud Computing for Healthcare
Abu Jor Al Gefari, Imran Hasan, Md Amin Ullah Sheikh
Advances in information security, privacy, and ethics book series (2025), pp. 347-368
Closed Access

Future Trends in AI Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray
Advances in information security, privacy, and ethics book series (2025), pp. 1-40
Closed Access

Current Security Issues and Vulnerabilities Associated With Mobile Application
Abdullahi Adewole Zakariyah, Muhammand Intizar Ali, Nima Yoezer, et al.
Advances in information security, privacy, and ethics book series (2025), pp. 41-62
Closed Access

Page 1 - Next Page

Scroll to top