David Dittrich

1.4k total citations
26 papers, 798 citations indexed

About

David Dittrich is a scholar working on Information Systems, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, David Dittrich has authored 26 papers receiving a total of 798 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Information Systems, 13 papers in Signal Processing and 11 papers in Computer Networks and Communications. Recurrent topics in David Dittrich's work include Advanced Malware Detection Techniques (13 papers), Network Security and Intrusion Detection (10 papers) and Information and Cyber Security (6 papers). David Dittrich is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), Network Security and Intrusion Detection (10 papers) and Information and Cyber Security (6 papers). David Dittrich collaborates with scholars based in United States, Canada and Germany. David Dittrich's co-authors include Erin Kenneally, Sven Dietrich, Michael Bailey, Peter Reiher, Jelena Mirković, John Aycock, Scott Dexter, Kenneth Einar Himma, Elizabeth Buchanan and Simson Garfinkel and has published in prestigious journals such as IEEE Security & Privacy, Micromachines and Journal of Empirical Research on Human Research Ethics.

In The Last Decade

David Dittrich

24 papers receiving 740 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
David Dittrich United States 13 456 377 287 255 131 26 798
John Aycock Canada 14 392 0.9× 421 1.1× 360 1.3× 354 1.4× 97 0.7× 88 964
Erin Kenneally United States 9 160 0.4× 190 0.5× 141 0.5× 243 1.0× 123 0.9× 38 538
Kadhim Hayawi United Arab Emirates 14 224 0.5× 246 0.7× 105 0.4× 206 0.8× 160 1.2× 51 671
Ting Yu United States 13 358 0.8× 519 1.4× 309 1.1× 453 1.8× 169 1.3× 42 892
Luigi Lo Iacono Germany 17 350 0.8× 485 1.3× 160 0.6× 841 3.3× 127 1.0× 70 1.1k
Edward Raff United States 15 233 0.5× 523 1.4× 296 1.0× 173 0.7× 40 0.3× 59 832
Aaron Johnson United States 16 345 0.8× 746 2.0× 130 0.5× 136 0.5× 94 0.7× 33 831
Ville Leppänen Finland 14 326 0.7× 170 0.5× 199 0.7× 433 1.7× 56 0.4× 147 870
Sebastian Schrittwieser Austria 13 299 0.7× 296 0.8× 445 1.6× 580 2.3× 85 0.6× 65 832
Andrew P. Moore United States 18 556 1.2× 339 0.9× 306 1.1× 874 3.4× 256 2.0× 53 1.2k

Countries citing papers authored by David Dittrich

Since Specialization
Citations

This map shows the geographic impact of David Dittrich's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by David Dittrich with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites David Dittrich more than expected).

Fields of papers citing papers by David Dittrich

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by David Dittrich. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by David Dittrich. The network helps show where David Dittrich may publish in the future.

Co-authorship network of co-authors of David Dittrich

This figure shows the co-authorship network connecting the top 25 collaborators of David Dittrich. A scholar is included among the top collaborators of David Dittrich based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with David Dittrich. David Dittrich is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Cao, Jialan, Felix Richter, David Dittrich, et al.. (2020). Droplet-Based Screening for the Investigation of Microbial Nonlinear Dose–Response Characteristics System, Background and Examples. Micromachines. 11(6). 577–577. 12 indexed citations
2.
Dittrich, David, Katherine Carpenter, & Manish Karir. (2015). The Internet Census 2012 Dataset: An Ethical Examination. IEEE Technology and Society Magazine. 34(2). 40–46. 1 indexed citations
3.
Dittrich, David. (2014). On Developing Tomorrow’s “Cyber Warriors”. 1 indexed citations
4.
Dittrich, David, Erin Kenneally, & Michael Bailey. (2013). Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report. SSRN Electronic Journal. 21 indexed citations
5.
Dittrich, David. (2012). So you want to take over a botnet. 6–6. 23 indexed citations
6.
Bailey, Michael, Erin Kenneally, David Dittrich, & Douglas Maughan. (2012). The Menlo Report. 10 indexed citations
7.
Kenneally, Erin & David Dittrich. (2012). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. SSRN Electronic Journal. 222 indexed citations
8.
Bailey, Michael, et al.. (2012). The Menlo Report. IEEE Security & Privacy. 10(2). 71–75. 89 indexed citations
9.
Dittrich, David. (2012). The Ethics of Social Honeypots. SSRN Electronic Journal.
10.
Lee, Christopher A., et al.. (2011). Creating Realistic Corpora for Security and Forensic Education. Scholarly Commons (Embry–Riddle Aeronautical University). 123–134. 16 indexed citations
11.
Buchanan, Elizabeth, et al.. (2011). Computer Science Security Research and Human Subjects: Emerging Considerations for Research Ethics Boards. Journal of Empirical Research on Human Research Ethics. 6(2). 71–83. 30 indexed citations
12.
Dittrich, David. (2009). Malware to crimeware: how far have they gone, and how do we catch up?. 34(4). 35–44. 1 indexed citations
13.
Dittrich, David, Michael Bailey, & Sven Dietrich. (2009). Towards Community Standards for Ethical Behavior in Computer Security Research. 12 indexed citations
14.
Dittrich, David & Sven Dietrich. (2008). P2P as botnet command and control: A deeper insight. 41–48. 73 indexed citations
15.
Dittrich, David & Sven Dietrich. (2008). New Directions in Peer-to-Peer Malware. 32. 1–5. 7 indexed citations
16.
Dittrich, David, et al.. (2007). Analisys of the storm and nugache trojans: P2P is here. 32(6). 18–27. 71 indexed citations
17.
Dittrich, David & Sven Dietrich. (2007). Command and control structures in malware: from handler/agent to P2P. 32(6). 8–17. 4 indexed citations
18.
Himma, Kenneth Einar & David Dittrich. (2005). Active Response to Computer Intrusions. SSRN Electronic Journal. 11 indexed citations
19.
Mirković, Jelena, Sven Dietrich, David Dittrich, & Peter Reiher. (2004). Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR eBooks. 82 indexed citations
20.
Dietrich, Sven, et al.. (2000). Analyzing Distributed Denial of Service Tools: The Shaft Case. 329–340. 78 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026