Amir Javed

667 total citations
29 papers, 318 citations indexed

About

Amir Javed is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Amir Javed has authored 29 papers receiving a total of 318 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Computer Networks and Communications, 11 papers in Information Systems and 10 papers in Artificial Intelligence. Recurrent topics in Amir Javed's work include Network Security and Intrusion Detection (13 papers), Spam and Phishing Detection (9 papers) and Advanced Malware Detection Techniques (8 papers). Amir Javed is often cited by papers focused on Network Security and Intrusion Detection (13 papers), Spam and Phishing Detection (9 papers) and Advanced Malware Detection Techniques (8 papers). Amir Javed collaborates with scholars based in United Kingdom, Saudi Arabia and Pakistan. Amir Javed's co-authors include Pete Burnap, Omer Rana, Matthew Williams, Eirini Anthi, Han Liu, Lowri Williams, Charalampos Marmaras, Liana Cipcigan, Uttam Ghosh and Pradip Kumar Sharma and has published in prestigious journals such as SHILAP Revista de lepidopterología, Sensors and Energy and Buildings.

In The Last Decade

Amir Javed

26 papers receiving 300 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Amir Javed United Kingdom 9 170 127 88 86 52 29 318
Emily Stark United States 9 157 0.9× 82 0.6× 153 1.7× 57 0.7× 49 0.9× 14 278
Georgios Pitsilis United Kingdom 7 227 1.3× 115 0.9× 152 1.7× 60 0.7× 34 0.7× 11 329
Miguel Á. Álvarez‐Carmona Mexico 9 204 1.2× 43 0.3× 57 0.6× 31 0.4× 76 1.5× 27 296
Humberto T. Marques-Neto Brazil 10 76 0.4× 77 0.6× 124 1.4× 26 0.3× 48 0.9× 50 282
Miltiadis Kandias Greece 8 61 0.4× 95 0.7× 108 1.2× 66 0.8× 41 0.8× 11 199
C. Valliyammai India 10 102 0.6× 156 1.2× 185 2.1× 54 0.6× 72 1.4× 43 324
Tobias Fiebig Germany 10 117 0.7× 157 1.2× 115 1.3× 66 0.8× 26 0.5× 28 269
Sadaf Hina Malaysia 9 50 0.3× 108 0.9× 161 1.8× 58 0.7× 35 0.7× 22 268
José Gaviria de la Puerta Spain 8 122 0.7× 44 0.3× 78 0.9× 58 0.7× 50 1.0× 16 238
Luisa Massari Italy 7 62 0.4× 153 1.2× 175 2.0× 30 0.3× 50 1.0× 20 262

Countries citing papers authored by Amir Javed

Since Specialization
Citations

This map shows the geographic impact of Amir Javed's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Amir Javed with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Amir Javed more than expected).

Fields of papers citing papers by Amir Javed

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Amir Javed. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Amir Javed. The network helps show where Amir Javed may publish in the future.

Co-authorship network of co-authors of Amir Javed

This figure shows the co-authorship network connecting the top 25 collaborators of Amir Javed. A scholar is included among the top collaborators of Amir Javed based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Amir Javed. Amir Javed is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Javed, Amir, et al.. (2024). A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning. Vehicular Communications. 49. 100837–100837. 11 indexed citations
2.
Williams, Lowri, Eirini Anthi, Yulia Cherdantseva, & Amir Javed. (2024). Leveraging Gamification and Game-based Learning in Cybersecurity Education. ORCA Online Research @Cardiff (Cardiff University). 11(1). 8–8. 1 indexed citations
3.
Rashid, Abdul, et al.. (2024). Do Exchange Rates Respond Asymmetrically to Crude Oil Market Shocks? Insights from BRICS and Pakistan. Zagreb international review of economics and business. 27(1). 31–62.
4.
Javed, Amir, et al.. (2024). Adversarial Attacks on Intrusion Detection Systems in In-Vehicle Networks of Connected and Autonomous Vehicles. Sensors. 24(12). 3848–3848. 7 indexed citations
5.
Theodorakopoulos, George, et al.. (2024). Detecting the Abuse of Cloud Services for C&C Infrastructure Through Dynamic Analysis and Machine Learning. ORCA Online Research @Cardiff (Cardiff University). 1–7.
6.
Javed, Amir, et al.. (2024). Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles. ORCA Online Research @Cardiff (Cardiff University). 714–719. 1 indexed citations
7.
Javed, Amir, et al.. (2024). Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks. Future Internet. 16(12). 451–451. 3 indexed citations
8.
Giommoni, Luca, et al.. (2023). Digital fingerprinting for identifying malicious collusive groups on Twitter. ORCA Online Research @Cardiff (Cardiff University). 9(1). 2 indexed citations
9.
Theodorakopoulos, George, et al.. (2023). Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. SHILAP Revista de lepidopterología. 3(3). 558–590. 5 indexed citations
10.
Theodorakopoulos, George, et al.. (2023). Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. SHILAP Revista de lepidopterología. 3(4). 858–881. 1 indexed citations
11.
Javed, Amir, et al.. (2022). Disrupting drive-by download networks on Twitter. Social Network Analysis and Mining. 12(1). 117–117. 4 indexed citations
12.
Makkar, Aaisha, Uttam Ghosh, Pradip Kumar Sharma, & Amir Javed. (2021). A Fuzzy-Based Approach to Enhance Cyber Defence Security for Next-Generation IoT. IEEE Internet of Things Journal. 10(3). 2079–2086. 16 indexed citations
13.
Javed, Amir, et al.. (2021). “Chatty Devices” and edge-based activity classification. ORCA Online Research @Cardiff (Cardiff University). 1(1). 2 indexed citations
14.
Anthi, Eirini, Lowri Williams, Amir Javed, & Pete Burnap. (2021). Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. Computers & Security. 108. 102352–102352. 68 indexed citations
15.
Safdar, Muhammad Ehsan, Muhammad Nadeem, Abdul Rehman, et al.. (2020). The SCREENING OF HERBICIDES FOR EFFECTIVE CONTROL OF WEEDS IN SOYBEAN (Glycine max L.). JOURNAL OF WEED SCIENCE RESEARCH. 27(2). 251–266.
16.
Balakrishnan, Vimala, et al.. (2019). A comparative analysis of detection mechanisms for emotion detection. Journal of Physics Conference Series. 1339(1). 12016–12016. 8 indexed citations
17.
Javed, Amir, Pete Burnap, & Omer Rana. (2018). Prediction of drive-by download attacks on Twitter. Information Processing & Management. 56(3). 1133–1145. 20 indexed citations
18.
Burnap, Pete, et al.. (2018). Suspended Accounts: A Source of Tweets with Disgust and Anger Emotions for Augmenting Hate Speech Data Sample. ORCA Online Research @Cardiff (Cardiff University). 4. 581–586. 16 indexed citations
19.
Marmaras, Charalampos, Amir Javed, Liana Cipcigan, & Omer Rana. (2017). Predicting the energy demand of buildings during triad peaks in GB. Energy and Buildings. 141. 262–273. 13 indexed citations
20.
Burnap, Pete, et al.. (2015). Continuous Monitoring and Assessment of Cybersecurity Risks in Large Computing Infrastructures. ORCA Online Research @Cardiff (Cardiff University). 1442–1447. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026