Adam Oest

681 total citations
27 papers, 408 citations indexed

About

Adam Oest is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Adam Oest has authored 27 papers receiving a total of 408 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Information Systems, 19 papers in Signal Processing and 11 papers in Artificial Intelligence. Recurrent topics in Adam Oest's work include Advanced Malware Detection Techniques (19 papers), Spam and Phishing Detection (18 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Adam Oest is often cited by papers focused on Advanced Malware Detection Techniques (19 papers), Spam and Phishing Detection (18 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Adam Oest collaborates with scholars based in United States, South Korea and Italy. Adam Oest's co-authors include Adam Doupé, Gail‐Joon Ahn, Brad Wardman, Dinil Mon Divakaran, Gary Warner, Danda B. Rawat, Penghui Zhang, Yan Shoshitaishvili, Tiffany Bao and Haehyun Cho and has published in prestigious journals such as IEEE Communications Magazine, IEEE Internet of Things Journal and IEEE Transactions on Consumer Electronics.

In The Last Decade

Adam Oest

24 papers receiving 381 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Adam Oest United States 9 333 227 165 100 80 27 408
Laurens Sion Belgium 10 196 0.6× 93 0.4× 105 0.6× 80 0.8× 90 1.1× 33 293
Koen Yskout Belgium 12 348 1.0× 159 0.7× 154 0.9× 113 1.1× 67 0.8× 41 428
Ivan Homoliak Czechia 9 206 0.6× 161 0.7× 157 1.0× 241 2.4× 29 0.4× 29 367
Platon Kotzias Spain 10 186 0.6× 156 0.7× 160 1.0× 166 1.7× 92 1.1× 16 347
Flavio Toffalini Singapore 7 172 0.5× 109 0.5× 95 0.6× 155 1.6× 23 0.3× 20 259
Adesina S. Sodiya Nigeria 11 168 0.5× 104 0.5× 98 0.6× 145 1.4× 32 0.4× 36 287
Robert J. Walls United States 12 172 0.5× 120 0.5× 167 1.0× 156 1.6× 35 0.4× 29 344
Stefano Calzavara Italy 14 346 1.0× 257 1.1× 260 1.6× 98 1.0× 44 0.6× 50 472
Anton V. Uzunov Australia 10 164 0.5× 92 0.4× 82 0.5× 128 1.3× 27 0.3× 20 243
Sumayah Alrwais United States 11 286 0.9× 188 0.8× 195 1.2× 249 2.5× 41 0.5× 17 412

Countries citing papers authored by Adam Oest

Since Specialization
Citations

This map shows the geographic impact of Adam Oest's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Adam Oest with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Adam Oest more than expected).

Fields of papers citing papers by Adam Oest

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Adam Oest. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Adam Oest. The network helps show where Adam Oest may publish in the future.

Co-authorship network of co-authors of Adam Oest

This figure shows the co-authorship network connecting the top 25 collaborators of Adam Oest. A scholar is included among the top collaborators of Adam Oest based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Adam Oest. Adam Oest is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Karimi, Alireza, Adam Oest, Gail‐Joon Ahn, et al.. (2025). SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns.
4.
Sun, Zhibo, Adam Oest, Gianluca Stringhini, et al.. (2024). From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. 49–64.
5.
Oest, Adam, Zhibo Sun, Gail‐Joon Ahn, et al.. (2024). Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. 55–65. 1 indexed citations
6.
Rawat, Danda B., et al.. (2024). Your IP Camera Can Be Abused for Payments: A Study of IoT Exploitation for Financial Services Leveraging Shodan and Criminal Infrastructures. IEEE Transactions on Consumer Electronics. 70(4). 7562–7573. 1 indexed citations
7.
Oest, Adam, et al.. (2024). On SMS Phishing Tactics and Infrastructure. 1–16. 5 indexed citations
8.
Saad, Muhammad, et al.. (2024). Conning the Crypto Conman: End-to-End Analysis of Cryptocurrency-based Technical Support Scams. CINECA IRIS Institutial Research Information System (University of Genoa). 17–35. 1 indexed citations
9.
Saad, Muhammad, et al.. (2023). Evaluating the Security Posture of Real-World FIDO2 Deployments. 2381–2395. 7 indexed citations
10.
Gao, Yixiao, et al.. (2023). Can I Own Your NFTs? Understanding the New Attack Surface to NFTs. IEEE Communications Magazine. 61(9). 64–70. 3 indexed citations
11.
Enck, William, et al.. (2022). Analysis of Payment Service Provider SDKs in Android. 1 indexed citations
12.
Divakaran, Dinil Mon & Adam Oest. (2022). Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. IEEE Security & Privacy. 20(5). 86–95. 23 indexed citations
13.
Divakaran, Dinil Mon & Adam Oest. (2022). Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. arXiv (Cornell University). 2 indexed citations
14.
Zhang, Penghui, Zhibo Sun, Haehyun Cho, et al.. (2022). I'm SPARTACUS, No, I'm SPARTACUS. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 3165–3179. 13 indexed citations
15.
Cho, Haehyun, Adam Oest, Alexandros Kapravelos, et al.. (2021). Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. 19 indexed citations
16.
Sun, Zhibo, Adam Oest, Penghui Zhang, et al.. (2021). Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}. 4169–4186. 6 indexed citations
17.
Oest, Adam, et al.. (2020). PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium. 379–396. 24 indexed citations
18.
Oest, Adam. (2020). Leveraging Scalable Data Analysis to Proactively Bolster the Anti-Phishing Ecosystem. 1 indexed citations
19.
Oest, Adam, Penghui Zhang, Brad Wardman, et al.. (2020). Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. 361–377. 36 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026