Carrie Gates

948 total citations
44 papers, 575 citations indexed

About

Carrie Gates is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Carrie Gates has authored 44 papers receiving a total of 575 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 19 papers in Information Systems and 19 papers in Artificial Intelligence. Recurrent topics in Carrie Gates's work include Network Security and Intrusion Detection (19 papers), Information and Cyber Security (12 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Carrie Gates is often cited by papers focused on Network Security and Intrusion Detection (19 papers), Information and Cyber Security (12 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Carrie Gates collaborates with scholars based in United States, Canada and United Kingdom. Carrie Gates's co-authors include Matt Bishop, Carol Taylor, John McHugh, Sean Whalen, Sean Peisert, Michael P. Collins, Tara Whalen, Peter Matthews, Stephen Brooks and Marc I. Kellner and has published in prestigious journals such as American Mathematical Monthly, Journal of Computers and Network and Distributed System Security Symposium.

In The Last Decade

Carrie Gates

42 papers receiving 515 citations

Peers

Carrie Gates
Srikanth Sundaresan United States
Kevin Roundy United States
Brewster Kahle United States
Danny Yuxing Huang United States
David Dittrich United States
Ting Yu United States
Erin Kenneally United States
SangKeun Lee South Korea
Carrie Gates
Citations per year, relative to Carrie Gates Carrie Gates (= 1×) peers Matteo Dell’Amico

Countries citing papers authored by Carrie Gates

Since Specialization
Citations

This map shows the geographic impact of Carrie Gates's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Carrie Gates with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Carrie Gates more than expected).

Fields of papers citing papers by Carrie Gates

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Carrie Gates. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Carrie Gates. The network helps show where Carrie Gates may publish in the future.

Co-authorship network of co-authors of Carrie Gates

This figure shows the co-authorship network connecting the top 25 collaborators of Carrie Gates. A scholar is included among the top collaborators of Carrie Gates based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Carrie Gates. Carrie Gates is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Bishop, Matt, Carrie Gates, & Karl Levitt. (2018). Augmenting Machine Learning with Argumentation. 1–11. 2 indexed citations
2.
Gates, Carrie & Peter Matthews. (2014). Data Is the New Currency. 105–116. 19 indexed citations
3.
Bishop, Matt, et al.. (2013). Forgive and forget. 1–10. 6 indexed citations
4.
Gates, Carrie, et al.. (2010). Combining Trust and Behavioral Analysis to Detect Security Threats in Open Environments. 4 indexed citations
5.
Whalen, Tara & Carrie Gates. (2010). Watching the watchers: “voluntary monitoring” of infosec employees. Information Management & Computer Security. 18(1). 14–25. 2 indexed citations
6.
Gates, Carrie. (2009). Coordinated Scan Detection.. Network and Distributed System Security Symposium. 23 indexed citations
7.
Whalen, Tara & Carrie Gates. (2009). Watchdog or Guardian? Unpacking the Issues Surrounding the Monitoring of InfoSec Employees. 25–35. 1 indexed citations
8.
Gates, Carrie. (2008). A case study in testing a network security algorithm. 28. 3 indexed citations
9.
Gates, Carrie, et al.. (2008). An access control reference architecture. 17–24. 1 indexed citations
10.
Bishop, Matt, et al.. (2008). We have met the enemy and he is us. 1–12. 57 indexed citations
12.
Gates, Carrie, Carol Taylor, & Matt Bishop. (2007). Dependable security: testing network intrusion detection systems. 590(16). 12–8. 1 indexed citations
13.
Whalen, Tara & Carrie Gates. (2007). A Psychological Profile of Defender Personality Traits. Journal of Computers. 2(2). 11 indexed citations
14.
Collins, Michael P., Carrie Gates, & Gaurav Kataria. (2006). A Model for Opportunistic Network Exploits: The Case of P2P Worms.. 11(3). 268–275. 12 indexed citations
15.
Trammell, Brian & Carrie Gates. (2006). NAF: the NetSA aggregated flow tool suite. USENIX Large Installation Systems Administration Conference. 18–18. 4 indexed citations
16.
Gates, Carrie & Carol Taylor. (2006). Challenging the anomaly detection paradigm. 21–29. 71 indexed citations
17.
Gates, Carrie, Sriram Subramanian, & Carl Gutwin. (2006). DJs' perspectives on interaction and awareness in nightclubs. 70–79. 23 indexed citations
18.
Gates, Carrie, et al.. (2004). More Netflow Tools for Performance and Security. USENIX Large Installation Systems Administration Conference. 121–132. 36 indexed citations
19.
McHugh, John & Carrie Gates. (2003). Locality. 3–10. 13 indexed citations
20.
Gates, Carrie, et al.. (1999). Periods in Taking and Splitting Games. American Mathematical Monthly. 106(4). 359–361. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026