Immediate Impact

54 standout
Sub-graph 1 of 24

Citing Papers

Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
2024 Standout
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
2024 Standout
2 intermediate papers

Works of George Mohay being referenced

A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events
2013
Detecting Network-Based Obfuscated Code Injection Attacks Using Sandboxing
2005

Author Peers

Author Last Decade Papers Cites
George Mohay 88 265 240 106 29 415
Yoelle Maarek 131 232 364 80 27 498
C. I. Ezeife 144 184 330 131 43 480
Marco Mesiti 176 230 119 85 55 499
Matteo Dell’Amico 218 140 286 194 38 496
Jim Blythe 106 265 107 30 30 470
Ricardo Campos 38 308 123 58 26 406
Susan Gauch 81 242 257 83 32 469
Cuiyun Gao 59 139 172 45 39 375
Fabien Gandon 91 275 152 37 63 423
John Aycock 161 182 135 140 50 423

All Works

Loading papers...

Rankless by CCL
2026