Asmaa Sallam

413 total citations
14 papers, 258 citations indexed

About

Asmaa Sallam is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Asmaa Sallam has authored 14 papers receiving a total of 258 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Computer Networks and Communications, 9 papers in Artificial Intelligence and 6 papers in Signal Processing. Recurrent topics in Asmaa Sallam's work include Network Security and Intrusion Detection (9 papers), Anomaly Detection Techniques and Applications (6 papers) and Advanced Malware Detection Techniques (5 papers). Asmaa Sallam is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Anomaly Detection Techniques and Applications (6 papers) and Advanced Malware Detection Techniques (5 papers). Asmaa Sallam collaborates with scholars based in United States, Qatar and South Korea. Asmaa Sallam's co-authors include Elisa Bertino, Kangbin Yim, Aditi Gupta, Seung-Hyun Seo, Syed Rafiul Hussain, Walid G. Aref, Ahmed M. Aly, Mourad Ouzzani, Arif Ghafoor and Qian Xiao and has published in prestigious journals such as Journal of Network and Computer Applications, Alexandria Engineering Journal and IEEE Systems Journal.

In The Last Decade

Asmaa Sallam

14 papers receiving 252 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Asmaa Sallam United States 8 197 148 127 99 42 14 258
Hojjat Aghakhani United States 7 135 0.7× 141 1.0× 83 0.7× 91 0.9× 20 0.5× 10 211
Allen D. Householder United States 6 100 0.5× 65 0.4× 114 0.9× 43 0.4× 23 0.5× 9 183
Daoyuan Wu Hong Kong 9 72 0.4× 73 0.5× 94 0.7× 58 0.6× 30 0.7× 24 185
Limin Yang United States 10 181 0.9× 221 1.5× 162 1.3× 132 1.3× 44 1.0× 13 322
Nilo Redini United States 9 96 0.5× 200 1.4× 104 0.8× 116 1.2× 82 2.0× 13 256
Tony Abou-Assaleh Canada 4 186 0.9× 215 1.5× 148 1.2× 107 1.1× 25 0.6× 10 279
Adwait Nadkarni United States 11 103 0.5× 225 1.5× 167 1.3× 145 1.5× 66 1.6× 19 300
Nabíl Schear United States 8 115 0.6× 93 0.6× 106 0.8× 144 1.5× 7 0.2× 15 210
Daiki Chiba Japan 9 250 1.3× 225 1.5× 219 1.7× 157 1.6× 43 1.0× 50 362
Thomas Schreck Germany 4 197 1.0× 262 1.8× 195 1.5× 68 0.7× 117 2.8× 17 330

Countries citing papers authored by Asmaa Sallam

Since Specialization
Citations

This map shows the geographic impact of Asmaa Sallam's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Asmaa Sallam with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Asmaa Sallam more than expected).

Fields of papers citing papers by Asmaa Sallam

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Asmaa Sallam. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Asmaa Sallam. The network helps show where Asmaa Sallam may publish in the future.

Co-authorship network of co-authors of Asmaa Sallam

This figure shows the co-authorship network connecting the top 25 collaborators of Asmaa Sallam. A scholar is included among the top collaborators of Asmaa Sallam based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Asmaa Sallam. Asmaa Sallam is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
2.
Sallam, Asmaa & Elisa Bertino. (2019). Result-Based Detection of Insider Threats to Relational Databases. 133–143. 7 indexed citations
3.
Sallam, Asmaa & Elisa Bertino. (2018). Detection of Temporal Data Ex-Filtration Threats to Relational Databases. 2 indexed citations
4.
Sallam, Asmaa & Elisa Bertino. (2017). Detection of Temporal Insider Threats to Relational Databases. 406–415. 11 indexed citations
5.
Sallam, Asmaa, et al.. (2016). PANDDE. 267–276. 5 indexed citations
6.
Sallam, Asmaa, et al.. (2016). Data and syntax centric anomaly detection for relational databases. Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery. 6(6). 231–239. 14 indexed citations
7.
Sallam, Asmaa, et al.. (2016). Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper). 20–29. 2 indexed citations
8.
Sallam, Asmaa, et al.. (2015). DBSAFE—An Anomaly Detection System to Protect Databases From Exfiltration Attempts. IEEE Systems Journal. 11(2). 483–493. 23 indexed citations
9.
Hussain, Syed Rafiul, Asmaa Sallam, & Elisa Bertino. (2015). DetAnom. 25–35. 24 indexed citations
10.
Sallam, Asmaa & Elisa Bertino. (2014). POSTER. Purdue e-Pubs (Purdue University System). 1493–1495. 3 indexed citations
11.
Seo, Seung-Hyun, Aditi Gupta, Asmaa Sallam, Elisa Bertino, & Kangbin Yim. (2013). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications. 38. 43–53. 107 indexed citations
12.
Sallam, Asmaa, et al.. (2013). PostgreSQL anomalous query detector. Purdue e-Pubs (Purdue University System). 741–744. 9 indexed citations
13.
Sallam, Asmaa, et al.. (2012). Distributed processing of continuous spatiotemporal queries over road networks. Alexandria Engineering Journal. 51(2). 85–93. 1 indexed citations
14.
Aly, Ahmed M., et al.. (2012). M3: Stream Processing on Main-Memory MapReduce. 1253–1256. 39 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026