Alexander D. Kent

498 total citations
15 papers, 99 citations indexed

About

Alexander D. Kent is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Alexander D. Kent has authored 15 papers receiving a total of 99 indexed citations (citations by other indexed papers that have themselves been cited), including 8 papers in Computer Networks and Communications, 8 papers in Information Systems and 3 papers in Signal Processing. Recurrent topics in Alexander D. Kent's work include Network Security and Intrusion Detection (6 papers), Information and Cyber Security (6 papers) and Spam and Phishing Detection (3 papers). Alexander D. Kent is often cited by papers focused on Network Security and Intrusion Detection (6 papers), Information and Cyber Security (6 papers) and Spam and Phishing Detection (3 papers). Alexander D. Kent collaborates with scholars based in United States and United Kingdom. Alexander D. Kent's co-authors include Lorie M. Liebrock, Joshua Neil, Daniel R. Tauritz, Alexander M. Rush, James Clifford, Curtis B. Storlie and Joseph Sexton and has published in prestigious journals such as Computers & Security, IEEE Transactions on Dependable and Secure Computing and Combinatorics Probability Computing.

In The Last Decade

Alexander D. Kent

15 papers receiving 91 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Alexander D. Kent United States 5 63 42 38 32 11 15 99
Marek Klonowski Poland 7 69 1.1× 29 0.7× 49 1.3× 26 0.8× 5 0.5× 39 130
Laurent d’Orazio France 5 48 0.8× 45 1.1× 17 0.4× 24 0.8× 3 0.3× 23 89
Riadh Robbana Tunisia 6 46 0.7× 35 0.8× 31 0.8× 13 0.4× 3 0.3× 37 84
Karyn Benson United States 7 144 2.3× 54 1.3× 134 3.5× 46 1.4× 7 0.6× 9 192
Jennie Callas United States 2 90 1.4× 65 1.5× 91 2.4× 19 0.6× 6 0.5× 3 157
R. Chinchani United States 7 120 1.9× 146 3.5× 53 1.4× 100 3.1× 6 0.5× 10 192
Jeff Seibert United States 6 106 1.7× 32 0.8× 94 2.5× 73 2.3× 2 0.2× 12 162
Ryan Huebsch United States 4 162 2.6× 42 1.0× 33 0.9× 47 1.5× 2 0.2× 8 168
Georgia Koloniari Greece 7 116 1.8× 34 0.8× 53 1.4× 44 1.4× 14 1.3× 25 153
Emilia Käsper Belgium 5 36 0.6× 48 1.1× 124 3.3× 33 1.0× 7 0.6× 6 145

Countries citing papers authored by Alexander D. Kent

Since Specialization
Citations

This map shows the geographic impact of Alexander D. Kent's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Alexander D. Kent with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Alexander D. Kent more than expected).

Fields of papers citing papers by Alexander D. Kent

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Alexander D. Kent. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Alexander D. Kent. The network helps show where Alexander D. Kent may publish in the future.

Co-authorship network of co-authors of Alexander D. Kent

This figure shows the co-authorship network connecting the top 25 collaborators of Alexander D. Kent. A scholar is included among the top collaborators of Alexander D. Kent based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Alexander D. Kent. Alexander D. Kent is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Kent, Alexander D., et al.. (2022). The bunkbed conjecture holds in the limit. Combinatorics Probability Computing. 32(3). 363–369. 2 indexed citations
2.
Tauritz, Daniel R., et al.. (2018). Automated design of network security metrics. Proceedings of the Genetic and Evolutionary Computation Conference Companion. 1680–1687. 4 indexed citations
3.
Tauritz, Daniel R., et al.. (2017). Evolving Bipartite Authentication Graph Partitions. IEEE Transactions on Dependable and Secure Computing. 16(1). 58–71. 4 indexed citations
4.
Tauritz, Daniel R., et al.. (2016). Evolving Multi-level Graph Partitioning Algorithms. 1–8. 5 indexed citations
5.
Tauritz, Daniel R., et al.. (2016). Evolving random graph generators: A case for increased algorithmic primitive granularity. 1–8. 3 indexed citations
6.
Rush, Alexander M., Daniel R. Tauritz, & Alexander D. Kent. (2015). Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES). 859–866. 22 indexed citations
7.
Rush, Alexander M., Daniel R. Tauritz, & Alexander D. Kent. (2014). DCAFE: A Distributed Cyber Security Automation Framework for Experiments. 134–139. 3 indexed citations
8.
Kent, Alexander D., Lorie M. Liebrock, & Joshua Neil. (2014). Authentication graphs: Analyzing user behavior within an enterprise network. Computers & Security. 48. 150–166. 38 indexed citations
9.
Kent, Alexander D. & Lorie M. Liebrock. (2013). Statistical detection of malicious web sites through time proximity to existing detection events. 3585. 192–197. 1 indexed citations
10.
Kent, Alexander D. & Lorie M. Liebrock. (2013). Differentiating User Authentication Graphs. 2. 72–75. 7 indexed citations
11.
Sexton, Joseph, Curtis B. Storlie, Joshua Neil, & Alexander D. Kent. (2013). Intruder detection based on graph structured hypothesis testing. 33. 86–91. 1 indexed citations
12.
Kent, Alexander D., Lorie M. Liebrock, & Joshua Neil. (2013). Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior. 25–36. 1 indexed citations
13.
Kent, Alexander D. & Lorie M. Liebrock. (2011). Secure Communication via Shared Knowledge and a Salted Hash in Ad-Hoc Environments. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 122–127. 6 indexed citations
14.
Clifford, James, et al.. (2003). A Secure and Transparent Firewall Web Proxy. USENIX Large Installation Systems Administration Conference. 23–30. 1 indexed citations
15.
Kent, Alexander D. & James Clifford. (2000). Network Information Management and Distribution in a Heterogeneous and Decentralized Enterprise Environment. University of North Texas Digital Library (University of North Texas). 85–94. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026