Immediate Impact
34 hit
Citing Papers
Overview on Intrusion Detection Systems for Computers Networking Security
2025 Hit
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
2024 Hit
Works of Tianyang Zhou being referenced
Network security assessment based on full host-based attack graph
2020
LAAEM: A Method to Enhance LDoS Attack
2016
Author Peers
Peers are selected by citation overlap in the author's most active subfields. citations · hero ref
| Author | Last Decade | Papers | Cites | |||||
|---|---|---|---|---|---|---|---|---|
| Tianyang Zhou | 284 | 170 | 94 | 86 | 83 | 29 | 507 | |
| Roger G. Pridham | 104 0.4× | 180 1.1× | 62 0.7× | 68 0.8× | 49 0.6× | 14 | 611 | |
| G. Sasibhushana Rao | 207 0.7× | 49 0.3× | 43 0.5× | 87 1.0× | 18 0.2× | 77 | 465 | |
| Ronald A. Mucci | 84 0.3× | 71 0.4× | 90 1.0× | 61 0.7× | 119 1.4× | 25 | 490 | |
| Azizul H. Quazi | 72 0.3× | 119 0.7× | 59 0.6× | 55 0.6× | 34 0.4× | 14 | 535 | |
| Howard Musoff | 304 1.1× | 51 0.3× | 32 0.3× | 198 2.3× | 11 0.1× | 14 | 613 | |
| Janusz S. Kulpa | 298 1.0× | 44 0.3× | 95 1.0× | 58 0.7× | 10 0.1× | 39 | 534 | |
| Jack Tsao | 290 1.0× | 36 0.2× | 133 1.4× | 31 0.4× | 91 1.1× | 18 | 542 | |
| E.K. Walton | 397 1.4× | 46 0.3× | 137 1.5× | 26 0.3× | 6 0.1× | 58 | 615 | |
| Peyton Z. Peebles | 192 0.7× | 29 0.2× | 61 0.6× | 85 1.0× | 9 0.1× | 32 | 608 | |
| Y. Das | 84 0.3× | 38 0.2× | 75 0.8× | 30 0.3× | 20 0.2× | 45 | 601 |
All Works
Loading papers...