Immediate Impact

34 hit
Sub-graph 1 of 17

Citing Papers

Overview on Intrusion Detection Systems for Computers Networking Security
2025 Hit
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
2024 Hit
2 intermediate papers

Works of Tianyang Zhou being referenced

Network security assessment based on full host-based attack graph
2020
LAAEM: A Method to Enhance LDoS Attack
2016

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Tianyang Zhou 284 170 94 86 83 29 507
Roger G. Pridham 104 0.4× 180 1.1× 62 0.7× 68 0.8× 49 0.6× 14 611
G. Sasibhushana Rao 207 0.7× 49 0.3× 43 0.5× 87 1.0× 18 0.2× 77 465
Ronald A. Mucci 84 0.3× 71 0.4× 90 1.0× 61 0.7× 119 1.4× 25 490
Azizul H. Quazi 72 0.3× 119 0.7× 59 0.6× 55 0.6× 34 0.4× 14 535
Howard Musoff 304 1.1× 51 0.3× 32 0.3× 198 2.3× 11 0.1× 14 613
Janusz S. Kulpa 298 1.0× 44 0.3× 95 1.0× 58 0.7× 10 0.1× 39 534
Jack Tsao 290 1.0× 36 0.2× 133 1.4× 31 0.4× 91 1.1× 18 542
E.K. Walton 397 1.4× 46 0.3× 137 1.5× 26 0.3× 6 0.1× 58 615
Peyton Z. Peebles 192 0.7× 29 0.2× 61 0.6× 85 1.0× 9 0.1× 32 608
Y. Das 84 0.3× 38 0.2× 75 0.8× 30 0.3× 20 0.2× 45 601

All Works

Loading papers...

Rankless by CCL
2026