Immediate Impact

50 standout
Sub-graph 1 of 20

Citing Papers

An optimized LSTM-based deep learning model for anomaly network intrusion detection
2025 Standout
Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
2024 Standout
2 intermediate papers

Works of Jeffrey Hunker being referenced

Insiders and Insider Threats: An Overview of Definitions and Mitigation Techniques
2011
Insider Threats in Cyber Security
2010

Author Peers

Author Last Decade Papers Cites
Jeffrey Hunker 190 60 118 10 253
Dawn M. Cappelli 167 51 85 7 211
Oliver Buckley 157 70 116 21 259
Abdullahi Arabo 112 72 88 10 203
Tzipora Halevi 166 40 41 9 201
Kevin D. Mitnick 256 66 63 5 320
William L. Simon 242 63 58 6 323
Ali Abdallah 197 98 146 19 292
Sardar Jaf 82 53 69 15 329
Rodrigo Werlinger 186 26 81 8 213
Marianthi Theoharidou 142 25 78 8 222

All Works

Loading papers...

Rankless by CCL
2026