Standout Papers
Immediate Impact
79 hit
Citing Papers
An optimized LSTM-based deep learning model for anomaly network intrusion detection
2025 Hit
Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities
2025 Hit
Works of Kostas Giotis being referenced
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
2013 Hit
Author Peers
Peers are selected by citation overlap in the author's most active subfields. citations · hero ref
| Author | Last Decade | Papers | Cites | |||||
|---|---|---|---|---|---|---|---|---|
| Kostas Giotis | 483 | 228 | 111 | 47 | 42 | 8 | 496 | |
| G. Androulidakis | 481 1.0× | 266 1.2× | 103 0.9× | 43 0.9× | 45 1.1× | 14 | 502 | |
| Gisung Kim | 463 1.0× | 360 1.6× | 229 2.1× | 43 0.9× | 27 0.6× | 8 | 518 | |
| Shanqing Jiang | 481 1.0× | 377 1.7× | 270 2.4× | 24 0.5× | 47 1.1× | 11 | 552 | |
| Jiarui Song | 289 0.6× | 310 1.4× | 106 1.0× | 50 1.1× | 123 2.9× | 9 | 463 | |
| Monika Roopak | 410 0.8× | 298 1.3× | 252 2.3× | 24 0.5× | 41 1.0× | 11 | 454 | |
| Zequn Niu | 385 0.8× | 349 1.5× | 252 2.3× | 18 0.4× | 33 0.8× | 8 | 469 | |
| Suneth Namal | 519 1.1× | 176 0.8× | 74 0.7× | 154 3.3× | 47 1.1× | 18 | 564 | |
| Razan Abdulhammed | 384 0.8× | 358 1.6× | 204 1.8× | 21 0.4× | 22 0.5× | 10 | 448 | |
| Yazan Otoum | 387 0.8× | 292 1.3× | 222 2.0× | 49 1.0× | 43 1.0× | 17 | 474 | |
| Gregor Schaffrath | 569 1.2× | 245 1.1× | 116 1.0× | 108 2.3× | 26 0.6× | 11 | 585 |
All Works
Loading papers...