Immediate Impact
55 hit
Citing Papers
Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities
2025 Hit
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
2024 Hit
Works of Florian Skopik being referenced
Deep learning for anomaly detection in log data: A survey
2023
Combating advanced persistent threats: From network event correlation to incident detection
2014
Author Peers
Peers are selected by citation overlap in the author's most active subfields. citations · hero ref
| Author | Last Decade | Papers | Cites | |||||
|---|---|---|---|---|---|---|---|---|
| Florian Skopik | 842 | 684 | 566 | 333 | 274 | 108 | 1.5k | |
| Khaled M. Khan | 815 1.0× | 942 1.4× | 782 1.4× | 298 0.9× | 322 1.2× | 89 | 1.7k | |
| Sajjan G. Shiva | 980 1.2× | 688 1.0× | 534 0.9× | 401 1.2× | 248 0.9× | 107 | 1.6k | |
| Udo W. Pooch | 798 0.9× | 630 0.9× | 388 0.7× | 272 0.8× | 74 0.3× | 105 | 1.7k | |
| Hong Li | 549 0.7× | 584 0.9× | 459 0.8× | 185 0.6× | 201 0.7× | 145 | 1.5k | |
| Ahmed Patel | 974 1.2× | 584 0.9× | 453 0.8× | 375 1.1× | 151 0.6× | 123 | 1.6k | |
| Klemens Böhm | 628 0.7× | 399 0.6× | 896 1.6× | 292 0.9× | 202 0.7× | 200 | 1.7k | |
| A. S. M. Kayes | 733 0.9× | 787 1.2× | 603 1.1× | 374 1.1× | 141 0.5× | 70 | 1.7k | |
| Pavel Čeleda | 1.1k 1.3× | 466 0.7× | 762 1.3× | 464 1.4× | 119 0.4× | 84 | 1.5k | |
| Shian‐Shyong Tseng | 322 0.4× | 694 1.0× | 486 0.9× | 166 0.5× | 142 0.5× | 133 | 1.6k | |
| Igor Nai Fovino | 729 0.9× | 621 0.9× | 915 1.6× | 358 1.1× | 586 2.1× | 49 | 1.8k |
All Works
Loading papers...