Alexander Tolstoy

567 total citations
21 papers, 268 citations indexed

About

Alexander Tolstoy is a scholar working on Information Systems, Computer Networks and Communications and Management Information Systems. According to data from OpenAlex, Alexander Tolstoy has authored 21 papers receiving a total of 268 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Information Systems, 8 papers in Computer Networks and Communications and 6 papers in Management Information Systems. Recurrent topics in Alexander Tolstoy's work include Network Security and Intrusion Detection (7 papers), Information and Cyber Security (4 papers) and Data Quality and Management (4 papers). Alexander Tolstoy is often cited by papers focused on Network Security and Intrusion Detection (7 papers), Information and Cyber Security (4 papers) and Data Quality and Management (4 papers). Alexander Tolstoy collaborates with scholars based in Russia. Alexander Tolstoy's co-authors include Nаtalia Miloslavskaya, В. В. Морозов and С. Н. Петров and has published in prestigious journals such as SHILAP Revista de lepidopterología, Cluster Computing and Scientific Visualization.

In The Last Decade

Alexander Tolstoy

17 papers receiving 256 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Alexander Tolstoy Russia 7 116 114 64 54 46 21 268
Nadeem Iftikhar Denmark 8 75 0.6× 67 0.6× 67 1.0× 34 0.6× 22 0.5× 30 228
Daniel Schuster Germany 10 111 1.0× 79 0.7× 70 1.1× 73 1.4× 36 0.8× 44 309
Nаtalia Miloslavskaya Russia 9 200 1.7× 224 2.0× 101 1.6× 64 1.2× 50 1.1× 57 432
Y.N. Doganata United States 8 135 1.2× 85 0.7× 62 1.0× 94 1.7× 45 1.0× 25 271
Karamjit Kaur India 9 111 1.0× 82 0.7× 65 1.0× 36 0.7× 29 0.6× 20 242
Alexander Schatten Austria 9 84 0.7× 158 1.4× 92 1.4× 85 1.6× 23 0.5× 32 252
Geetika T. Lakshmanan United States 10 168 1.4× 172 1.5× 97 1.5× 147 2.7× 53 1.2× 23 327
Alessandra Bagnato Spain 8 91 0.8× 141 1.2× 53 0.8× 30 0.6× 24 0.5× 42 261
Stefan Wesner Germany 8 193 1.7× 137 1.2× 71 1.1× 20 0.4× 17 0.4× 46 314
Mariam Kiran United Kingdom 9 191 1.6× 228 2.0× 50 0.8× 43 0.8× 17 0.4× 22 341

Countries citing papers authored by Alexander Tolstoy

Since Specialization
Citations

This map shows the geographic impact of Alexander Tolstoy's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Alexander Tolstoy with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Alexander Tolstoy more than expected).

Fields of papers citing papers by Alexander Tolstoy

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Alexander Tolstoy. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Alexander Tolstoy. The network helps show where Alexander Tolstoy may publish in the future.

Co-authorship network of co-authors of Alexander Tolstoy

This figure shows the co-authorship network connecting the top 25 collaborators of Alexander Tolstoy. A scholar is included among the top collaborators of Alexander Tolstoy based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Alexander Tolstoy. Alexander Tolstoy is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tolstoy, Alexander. (2023). Systematics of concepts in the field of information security. SHILAP Revista de lepidopterología. 30(1). 130–148.
3.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2020). IoTBlockSIEM for information security incident management in the internet of things ecosystem. Cluster Computing. 23(3). 1911–1925. 7 indexed citations
4.
Tolstoy, Alexander. (2020). FINE-GRAINED HIGH-STRENGTH CONCRETE. Construction Materials and Products. 3(1). 39–43. 5 indexed citations
5.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2018). Internet of Things: information security challenges and solutions. Cluster Computing. 22(1). 103–119. 76 indexed citations
6.
Miloslavskaya, Nаtalia, et al.. (2017). DLP as an Integral Part of Network Security Intelligence Center. 278. 297–304. 2 indexed citations
7.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2017). Competence Requirements of ISO/IEC Standards for Information Security Professionals. SHILAP Revista de lepidopterología. 6–18.
8.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2017). Ensuring Information Security for Internet of Things. 62–69. 4 indexed citations
9.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2017). VISUALIZATION OF INFORMATION SECURITY MANAGEMENT PROCESSES. Scientific Visualization. 9(5). 117–136. 2 indexed citations
10.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2016). Application of Big Data, Fast Data, and Data Lake Concepts to Information Security Issues. 148–153. 22 indexed citations
11.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2016). Big Data, Fast Data and Data Lake Concepts. Procedia Computer Science. 88. 300–305. 111 indexed citations
12.
Miloslavskaya, Nаtalia, et al.. (2016). Taxonomy for Unsecure Big Data Processing in Security Operations Centers. 154–159. 9 indexed citations
13.
Miloslavskaya, Nаtalia, et al.. (2016). Analysis of Intrusion Detection and Prevention Systems as Queueing Services. 1. 855–860. 1 indexed citations
14.
Miloslavskaya, Nаtalia & Alexander Tolstoy. (2016). State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security. 83–90. 4 indexed citations
15.
Miloslavskaya, Nаtalia, et al.. (2015). Analysis of Hypoexponential Computing Services for Big Data Processing. 1. 579–584.
16.
Miloslavskaya, Nаtalia, et al.. (2015). Modeling of next-generation firewalls as queueing services. 250–257. 6 indexed citations
17.
Miloslavskaya, Nаtalia, et al.. (2014). Information Security Maintenance Issues for Big Security-Related Data. 8 indexed citations
18.
Miloslavskaya, Nаtalia, et al.. (2014). Big Data Information Security Maintenance. 89–94. 3 indexed citations
19.
Miloslavskaya, Nаtalia, et al.. (2011). Network Security Threats and Cloud Infrastructure Services Monitoring. 141–145. 2 indexed citations
20.
Miloslavskaya, Nаtalia, et al.. (2009). Information security incident management process. 93–93. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026