D. P. Zegzhda

897 total citations
73 papers, 556 citations indexed

About

D. P. Zegzhda is a scholar working on Management of Technology and Innovation, Computer Networks and Communications and Information Systems. According to data from OpenAlex, D. P. Zegzhda has authored 73 papers receiving a total of 556 indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Management of Technology and Innovation, 29 papers in Computer Networks and Communications and 28 papers in Information Systems. Recurrent topics in D. P. Zegzhda's work include Economic and Technological Systems Analysis (29 papers), Network Security and Intrusion Detection (15 papers) and Advanced Data Processing Techniques (12 papers). D. P. Zegzhda is often cited by papers focused on Economic and Technological Systems Analysis (29 papers), Network Security and Intrusion Detection (15 papers) and Advanced Data Processing Techniques (12 papers). D. P. Zegzhda collaborates with scholars based in Russia and South Korea. D. P. Zegzhda's co-authors include E. Yu. Pavlenko, P. D. Zegzhda, D. S. Lavrova, Maxim Kalinin, А. В. Никольский, Alexander Shelupanov, Inhye Kang, Hae Jin Cho, Jin‐Young Choi and Vasiliy Krundyshev and has published in prestigious journals such as SHILAP Revista de lepidopterología, Energies and Symmetry.

In The Last Decade

D. P. Zegzhda

67 papers receiving 542 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
D. P. Zegzhda Russia 15 246 220 204 190 126 73 556
P. D. Zegzhda Russia 13 156 0.6× 233 1.1× 143 0.7× 145 0.8× 92 0.7× 38 469
Andrey Chechulin Russia 13 33 0.1× 265 1.2× 260 1.3× 155 0.8× 104 0.8× 86 507
Igor Saenko Russia 13 31 0.1× 340 1.5× 177 0.9× 167 0.9× 160 1.3× 94 534
Georgiy Levchuk United States 11 28 0.1× 122 0.6× 60 0.3× 162 0.9× 114 0.9× 58 410
Тамара Радівілова Ukraine 11 18 0.1× 161 0.7× 55 0.3× 75 0.4× 132 1.0× 48 330
Howard F. Lipson United States 10 9 0.0× 306 1.4× 380 1.9× 44 0.2× 304 2.4× 11 615
Don Libes United States 12 13 0.1× 100 0.5× 87 0.4× 21 0.1× 89 0.7× 36 347
Rajeev Kumar India 13 31 0.1× 76 0.3× 132 0.6× 26 0.1× 116 0.9× 72 448
Jon Siegel United Kingdom 7 13 0.1× 278 1.3× 231 1.1× 15 0.1× 232 1.8× 8 521
Alireza Shameli‐Sendi Iran 11 9 0.0× 370 1.7× 340 1.7× 78 0.4× 92 0.7× 33 524

Countries citing papers authored by D. P. Zegzhda

Since Specialization
Citations

This map shows the geographic impact of D. P. Zegzhda's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by D. P. Zegzhda with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites D. P. Zegzhda more than expected).

Fields of papers citing papers by D. P. Zegzhda

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by D. P. Zegzhda. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by D. P. Zegzhda. The network helps show where D. P. Zegzhda may publish in the future.

Co-authorship network of co-authors of D. P. Zegzhda

This figure shows the co-authorship network connecting the top 25 collaborators of D. P. Zegzhda. A scholar is included among the top collaborators of D. P. Zegzhda based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with D. P. Zegzhda. D. P. Zegzhda is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kalinin, Maxim, et al.. (2021). Application of Bioinformatics Algorithms for 3RO\PRUSKLF Cyberattacks Detection. SHILAP Revista de lepidopterología. 20(4). 820–844. 2 indexed citations
2.
Shelupanov, Alexander, et al.. (2021). Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring. Symmetry. 13(12). 2425–2425. 8 indexed citations
3.
Lavrova, D. S., et al.. (2019). Using GRU neural network for cyber-attack detection in automated process control systems. 1–3. 23 indexed citations
4.
Pavlenko, E. Yu., et al.. (2019). Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration. 785–789. 8 indexed citations
5.
Pavlenko, E. Yu. & D. P. Zegzhda. (2018). Sustainability of cyber-physical systems in the context of targeted destructive influences. 830–834. 29 indexed citations
6.
Zegzhda, D. P., et al.. (2018). Problems of Security in Digital Production and Its Resistance to Cyber Threats. Automatic Control and Computer Sciences. 52(8). 1090–1100. 11 indexed citations
7.
Zegzhda, D. P. & E. Yu. Pavlenko. (2018). Digital Manufacturing Security Indicators. Automatic Control and Computer Sciences. 52(8). 1150–1159. 18 indexed citations
8.
Zegzhda, D. P., et al.. (2018). Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph. Automatic Control and Computer Sciences. 52(8). 1080–1083. 7 indexed citations
9.
Zegzhda, D. P., et al.. (2018). Approaches to Modeling the Security of Cyberphysical Systems. Automatic Control and Computer Sciences. 52(8). 1000–1009. 4 indexed citations
10.
11.
Zegzhda, D. P., et al.. (2017). Use of Intel SGX to ensure the confidentiality of data of cloud users. Automatic Control and Computer Sciences. 51(8). 848–854. 8 indexed citations
12.
Kalinin, Maxim, et al.. (2016). Software defined security for vehicular ad hoc networks. 533–537. 26 indexed citations
13.
Zegzhda, P. D., et al.. (2016). Safe Integration of SIEM Systems with Internet of Things. 81–87. 19 indexed citations
14.
Zegzhda, D. P., et al.. (2015). Thermodynamic approach to modeling multi-agent systems in cyberspace. Automatic Control and Computer Sciences. 49(8). 622–626. 3 indexed citations
15.
Kalinin, Maxim, et al.. (2014). Secure User Tasks Distribution in Grid Systems. 7–11. 1 indexed citations
16.
Zegzhda, D. P., et al.. (2014). Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. 479–482. 14 indexed citations
17.
Zegzhda, D. P. & Maxim Kalinin. (2008). Security Assurance for the Attribute-Based Access Control Systems.. 147–154. 1 indexed citations
18.
Zegzhda, D. P., et al.. (2008). "Linux over OSMOS": the Secure Hybrid Operating System.. 47–54. 1 indexed citations
19.
Zegzhda, D. P., et al.. (2008). The Use of Conference Control to Design a Protected Videoconference System.. 55–60. 1 indexed citations
20.
Zegzhda, D. P. & Maxim Kalinin. (2007). Logical Security Evaluation of Real-World Operating Systems.. 34(10). 234–241. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026