Behrouz Tork Ladani

1.0k total citations
61 papers, 650 citations indexed

About

Behrouz Tork Ladani is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Behrouz Tork Ladani has authored 61 papers receiving a total of 650 indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Computer Networks and Communications, 27 papers in Information Systems and 24 papers in Artificial Intelligence. Recurrent topics in Behrouz Tork Ladani's work include Network Security and Intrusion Detection (13 papers), Advanced Malware Detection Techniques (12 papers) and Software Testing and Debugging Techniques (11 papers). Behrouz Tork Ladani is often cited by papers focused on Network Security and Intrusion Detection (13 papers), Advanced Malware Detection Techniques (12 papers) and Software Testing and Debugging Techniques (11 papers). Behrouz Tork Ladani collaborates with scholars based in Iran, United States and Luxembourg. Behrouz Tork Ladani's co-authors include Amir Jalaly Bidgoly, Hesam Izakian, Ajith Abraham, Mohammad Hossein Manshaei, Bahman Zamani, Kamran Zamanifar, Foad Raji, S. Amirhassan Monadjemi, Hamid Mala and Václav Snåšel and has published in prestigious journals such as SHILAP Revista de lepidopterología, Computers in Human Behavior and Expert Systems with Applications.

In The Last Decade

Behrouz Tork Ladani

56 papers receiving 612 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Behrouz Tork Ladani Iran 15 265 252 202 176 145 61 650
Francesco Buccafurri Italy 16 345 1.3× 360 1.4× 176 0.9× 502 2.9× 132 0.9× 104 972
Nasrullah Memon Denmark 14 147 0.6× 257 1.0× 134 0.7× 184 1.0× 135 0.9× 63 569
Hamdi Yahyaoui Kuwait 14 293 1.1× 452 1.8× 116 0.6× 344 2.0× 34 0.2× 68 745
Jianguo Lü Canada 14 351 1.3× 560 2.2× 60 0.3× 530 3.0× 122 0.8× 52 959
Allan Heydon United States 9 390 1.5× 516 2.0× 52 0.3× 254 1.4× 145 1.0× 20 845
Hassan Haghighi Iran 13 217 0.8× 339 1.3× 30 0.1× 153 0.9× 78 0.5× 70 566
Yifei Yuan United States 10 319 1.2× 214 0.8× 103 0.5× 190 1.1× 758 5.2× 19 1.0k
Onaiza Maqbool Pakistan 16 412 1.6× 720 2.9× 53 0.3× 509 2.9× 129 0.9× 38 1.0k
Víctor Muntés-Mulero Spain 13 369 1.4× 322 1.3× 33 0.2× 194 1.1× 33 0.2× 40 645
Qinming He China 18 254 1.0× 841 3.3× 74 0.4× 381 2.2× 42 0.3× 66 1.1k

Countries citing papers authored by Behrouz Tork Ladani

Since Specialization
Citations

This map shows the geographic impact of Behrouz Tork Ladani's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Behrouz Tork Ladani with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Behrouz Tork Ladani more than expected).

Fields of papers citing papers by Behrouz Tork Ladani

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Behrouz Tork Ladani. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Behrouz Tork Ladani. The network helps show where Behrouz Tork Ladani may publish in the future.

Co-authorship network of co-authors of Behrouz Tork Ladani

This figure shows the co-authorship network connecting the top 25 collaborators of Behrouz Tork Ladani. A scholar is included among the top collaborators of Behrouz Tork Ladani based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Behrouz Tork Ladani. Behrouz Tork Ladani is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ladani, Behrouz Tork, et al.. (2023). Maaker: A framework for detecting and defeating evasion techniques in Android malware. Journal of Information Security and Applications. 78. 103617–103617. 2 indexed citations
2.
Zamani, Bahman, et al.. (2022). A model‐based framework for inter‐app Vulnerability analysis of Android applications. Software Practice and Experience. 53(4). 895–936. 4 indexed citations
3.
Ladani, Behrouz Tork, et al.. (2021). Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. 13(2). 131–143. 1 indexed citations
4.
Ladani, Behrouz Tork, et al.. (2021). SANT: Static Analysis of Native Threads for Security Vetting of Android Applications. 1 indexed citations
5.
Zamani, Bahman, et al.. (2021). Automatic Generation of XACML Code using Model-Driven Approach. 206–211. 3 indexed citations
6.
Zamani, Bahman, et al.. (2020). Meta-analysis of the impact of the use of information and communication technology On Educational and Research Performance of Faculty Members of Universities. SHILAP Revista de lepidopterología. 14(2). 231–245. 2 indexed citations
7.
Mala, Hamid, et al.. (2020). Secure parameterized pattern matching. Information Sciences. 522. 299–316. 1 indexed citations
8.
Mala, Hamid, et al.. (2020). Efficient Secure Pattern Matching with Malicious Adversaries. IEEE Transactions on Dependable and Secure Computing. 1–1. 2 indexed citations
9.
Ladani, Behrouz Tork, et al.. (2019). An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid. 1967–1971. 10 indexed citations
10.
Zamani, Bahman, et al.. (2018). VAnDroid: A framework for vulnerability analysis of Android applications using a model‐driven reverse engineering technique. Software Practice and Experience. 49(1). 70–99. 20 indexed citations
11.
Zamani, Bahman, et al.. (2017). An automatic test case generator for evaluating implementation of access control policies. 9(1). 73–91. 5 indexed citations
12.
Mala, Hamid, et al.. (2015). Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs. Wireless Personal Communications. 83(4). 2607–2621. 7 indexed citations
13.
Ladani, Behrouz Tork, et al.. (2015). Gossip-based data aggregation in hostile environments. Computer Communications. 62. 1–12. 2 indexed citations
14.
Zamani, Bahman, et al.. (2015). Towards automatic generation of formal specifications for UML consistency verification. 860–865. 3 indexed citations
15.
Ladani, Behrouz Tork, et al.. (2014). DoS and port scan attack detection in high speed networks. 61–66. 3 indexed citations
16.
Ladani, Behrouz Tork, et al.. (2013). GTrust: a group based trust model. 5(2). 155–170. 4 indexed citations
17.
Bidgoly, Amir Jalaly & Behrouz Tork Ladani. (2013). Quantitative verification of beta reputation system using PRISM probabilistic model checker. 1–6. 11 indexed citations
18.
19.
Mashayekhy, Lena, Mohammad Ali Nematbakhsh, & Behrouz Tork Ladani. (2008). E-NEGOTIATION MODEL BASED ON DATA MINING.
20.
Mashayekhy, Lena, Mohammad Ali Nematbakhsh, & Behrouz Tork Ladani. (2007). Measuring of Strategies' Similarity in Automated Negotiation. International MultiConference of Engineers and Computer Scientists. 859–863.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026