Brad Wardman

1.1k total citations
22 papers, 608 citations indexed

About

Brad Wardman is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Brad Wardman has authored 22 papers receiving a total of 608 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Information Systems, 16 papers in Signal Processing and 8 papers in Artificial Intelligence. Recurrent topics in Brad Wardman's work include Spam and Phishing Detection (20 papers), Advanced Malware Detection Techniques (16 papers) and Cybercrime and Law Enforcement Studies (8 papers). Brad Wardman is often cited by papers focused on Spam and Phishing Detection (20 papers), Advanced Malware Detection Techniques (16 papers) and Cybercrime and Law Enforcement Studies (8 papers). Brad Wardman collaborates with scholars based in United States, South Korea and Germany. Brad Wardman's co-authors include Gary Warner, Adam Doupé, Adam Oest, Thamar Solorio, Gail‐Joon Ahn, Jason Hong, Steve Sheng, Lorrie Faith Cranor, Penghui Zhang and Anthony Skjellum and has published in prestigious journals such as SHILAP Revista de lepidopterología, BMJ Open and IEEE Security & Privacy.

In The Last Decade

Brad Wardman

22 papers receiving 553 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Brad Wardman United States 11 573 391 237 150 123 22 608
Mahmoud Khonji United Arab Emirates 10 482 0.8× 275 0.7× 253 1.1× 144 1.0× 72 0.6× 15 539
Neha Chachra United States 6 379 0.7× 207 0.5× 143 0.6× 178 1.2× 90 0.7× 8 444
Andreas Pitsillidis United States 6 446 0.8× 201 0.5× 153 0.6× 216 1.4× 101 0.8× 7 501
Atefeh Heydari Malaysia 5 282 0.5× 64 0.2× 215 0.9× 78 0.5× 112 0.9× 8 335
Erik Derr Germany 7 359 0.6× 392 1.0× 118 0.5× 112 0.7× 63 0.5× 9 491
Sujata Garera United States 5 337 0.6× 256 0.7× 167 0.7× 153 1.0× 63 0.5× 6 392
Sajjad Arshad United States 8 213 0.4× 257 0.7× 126 0.5× 197 1.3× 44 0.4× 11 364
André Bergholz Germany 7 266 0.5× 111 0.3× 143 0.6× 109 0.7× 27 0.2× 11 310
San-Tsai Sun Canada 8 265 0.5× 146 0.4× 120 0.5× 74 0.5× 85 0.7× 15 316
Dario Nappa United States 4 285 0.5× 130 0.3× 176 0.7× 116 0.8× 35 0.3× 7 327

Countries citing papers authored by Brad Wardman

Since Specialization
Citations

This map shows the geographic impact of Brad Wardman's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Brad Wardman with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Brad Wardman more than expected).

Fields of papers citing papers by Brad Wardman

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Brad Wardman. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Brad Wardman. The network helps show where Brad Wardman may publish in the future.

Co-authorship network of co-authors of Brad Wardman

This figure shows the co-authorship network connecting the top 25 collaborators of Brad Wardman. A scholar is included among the top collaborators of Brad Wardman based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Brad Wardman. Brad Wardman is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Oest, Adam, Haehyun Cho, Zhibo Sun, et al.. (2021). CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Security & Privacy. 20(2). 10–21. 4 indexed citations
2.
Zhang, Penghui, Adam Oest, Haehyun Cho, et al.. (2021). CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. 1109–1124. 46 indexed citations
3.
Oest, Adam, et al.. (2020). PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium. 379–396. 24 indexed citations
4.
Oest, Adam, Penghui Zhang, Brad Wardman, et al.. (2020). Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. 361–377. 36 indexed citations
5.
Knijnenburg, Bart P., et al.. (2019). Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting. 1–10. 4 indexed citations
7.
Sheng, Steve, et al.. (2018). An Empirical Analysis of Phishing Blacklists. Figshare. 95 indexed citations
8.
Wardman, Brad, et al.. (2016). Phorecasting Phishing Attacks: A New Approach for Predicting the Appearance of Phishing Websites. 5(3). 142–154. 2 indexed citations
9.
Wardman, Brad. (2016). Assessing the Gap: Measure the Impact of Phishing on an Organization. Scholarly Commons (Embry–Riddle Aeronautical University). 5 indexed citations
10.
11.
Wardman, Brad, et al.. (2014). New tackle to catch a phisher. International Journal of Electronic Security and Digital Forensics. 6(1). 62–62. 2 indexed citations
12.
Wardman, Brad, et al.. (2013). Voice of the customer. 1–7. 1 indexed citations
13.
Wardman, Brad, et al.. (2012). Clustering potential phishing websites using DeepMD5. BMJ Open. 9(11). 10–10. 10 indexed citations
14.
Wardman, Brad, et al.. (2012). “WHOIS” Selling All The Pills. 7(2). 46–63. 2 indexed citations
15.
Wardman, Brad, et al.. (2011). High-performance content-based phishing attack detection. 1–9. 30 indexed citations
16.
Wardman, Brad, et al.. (2011). Phishing: Crime that pays. 1–10. 11 indexed citations
17.
Wardman, Brad. (2010). The Deadliest Catch: Reeling In Big Phish With a Deep MD5 Net. SHILAP Revista de lepidopterología. 2 indexed citations
18.
Wardman, Brad, et al.. (2010). Lexical feature based phishing URL detection using online learning. 54–60. 134 indexed citations
19.
Wardman, Brad, et al.. (2010). Reeling in Big Phish with a Deep MD5 Net. ˜The œjournal of digital forensics, security and law. 8 indexed citations
20.
Wardman, Brad & Gary Warner. (2008). Automating phishing website identification through deep MD5 matching. 1–7. 23 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026