Retraction

Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

Citations (18)

18
Total Citations
13
Post-Retraction
(72.2%)
4
Pre-Retraction
1
Same Day
Post-Retraction Citation Analysis
0 Within 30 days
7 Within 1 year
0 After 2+ years
493 Days since retraction (latest)
Paper citing Critical Retrospection of Security Implication in ...
Unknown Authors
Unknown Journal
Published: Nov 2024
493 days after retraction
Paper citing Critical Retrospection of Security Implication in ...
Unknown Authors
Unknown Journal
Published: Nov 2024
491 days after retraction
Paper citing Critical Retrospection of Security Implication in ...
Unknown Authors
Unknown Journal
Published: Nov 2024
485 days after retraction
Paper citing Critical Retrospection of Security Implication in ...
Unknown Authors
Unknown Journal
Published: Nov 2024
485 days after retraction
Paper citing Critical Retrospection of Security Implication in ...
Unknown Authors
Unknown Journal
Published: Sep 2024
428 days after retraction
Adaptive Modulation and Coding in 5G Networks with Deep Learning
Ashok Kumar Gupta, N. Madhusudhana Reddy, Ammar Hameed Shnain et al. (6 authors)
Unknown Journal
Published: Sep 2024
428 days after retraction
Enhancing IoT Network Capabilities through Edge Computing Strategies for Real-Time Data Analytics and Efficient Information Processing
S. Tamilselvan, M. Babu, P. Rajasekar et al. (6 authors)
Unknown Journal
Published: Apr 2024
268 days after retraction
Forensics Analysis of Cloud-Computing Traffics
Moayad Almutairi, Shailendra Mishra, Mohammed Alshehri
International Journal of Computing and Digital Systems Open Access
Published: Mar 2024
3 citations
226 days after retraction
Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges
Annas Wasim Malik, David Samuel Bhatti, Tae‐Jin Park et al. (6 authors)
Sensors Open Access
Published: Jan 2024
16 citations
175 days after retraction
Optimizing Forensic Investigation and Security Surveillance with Deep Reinforcement Learning Techniques
T J Nandhini, K. Thinakaran
Unknown Journal
Published: Dec 2023
12 citations
155 days after retraction
An Analysis of Signature-Based Components in Hybrid Intrusion Detection Systems
Moorthy Agoramoorthy, Ahamed Ali, D. Sujatha et al. (5 authors)
Unknown Journal
Published: Dec 2023
3 citations
148 days after retraction
OML-PCM: optical multi-level phase change memory architecture for embedded computing systems
Milad Mohseni, Ahmad Habibized Novin
Engineering Research Express Open Access
Published: Nov 2023
2 citations
128 days after retraction
A survey on techniques for improving Phase Change Memory (PCM) lifetime
Milad Mohseni, Ahmad Habibized Novin
Journal of Systems Architecture
Published: Oct 2023
11 citations
82 days after retraction
Retracted: Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications
Security and Communication Networks
Security and Communication Networks Open Access
Published: Jul 2023
Same day as retraction
To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework
Sheena Mohammed, R. Sridevi
Journal of Interconnection Networks
Published: Jun 2023
2 citations
27 days before retraction
Integrated Project for Data Communication in Wireless Sensor Network
Charanjeet Singh, S. Jayakumar, Kiran Venneti et al. (6 authors)
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)
Published: May 2023
1 citation
55 days before retraction
Hybrid Security Model for Medical Image Protection in Cloud
Mohammed Y. Shakor, Nigar M. Shafiq Surameery, Zuheir N. Khlaif
Diyala Journal of Engineering Sciences Open Access
Published: Mar 2023
2 citations
140 days before retraction
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara et al. (4 authors)
Journal of King Saud University - Computer and Information Sciences Open Access
Published: Oct 2022
44 citations
267 days before retraction
Quick Stats
Total Citations: 18
Years Since Retraction: 2.3 years
Open Access: Yes
Last Checked: Jul 24, 2025
Related Papers
Model for software quality evaluation with hesitant fuzzy u…
Journal of Intelligent & Fuzzy Systems • 57 citations
A consensus approach to multi-granular linguistic MCGDM wit…
Journal of Intelligent & Fuzzy Systems • 24 citations
Independent hesitant fuzzy group decision making methods wi…
Journal of Intelligent & Fuzzy Systems • 7 citations
HGPSO: An efficient scientific workflow scheduling in cloud…
Journal of Intelligent & Fuzzy Systems • 5 citations
A novel hash based feature descriptors for content based im…
Journal of Intelligent & Fuzzy Systems • 4 citations