Derek Mohammed

462 total citations
21 papers, 87 citations indexed

About

Derek Mohammed is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Derek Mohammed has authored 21 papers receiving a total of 87 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Information Systems, 9 papers in Computer Networks and Communications and 5 papers in Signal Processing. Recurrent topics in Derek Mohammed's work include Network Security and Intrusion Detection (7 papers), Information and Cyber Security (7 papers) and Cybercrime and Law Enforcement Studies (5 papers). Derek Mohammed is often cited by papers focused on Network Security and Intrusion Detection (7 papers), Information and Cyber Security (7 papers) and Cybercrime and Law Enforcement Studies (5 papers). Derek Mohammed collaborates with scholars based in United States, Iraq and United Arab Emirates. Derek Mohammed's co-authors include Marwan Omar, Văn Đức Nguyễn, Hewa Majeed Zangana, Calvin Nobles and Maurice Dawson and has published in prestigious journals such as SHILAP Revista de lepidopterología, The Journal of Internet Banking and Commerce and Information Security Journal A Global Perspective.

In The Last Decade

Derek Mohammed

16 papers receiving 81 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Derek Mohammed United States 6 35 30 24 15 11 21 87
Mark van Setten Netherlands 6 44 1.3× 11 0.4× 21 0.9× 10 0.7× 18 1.6× 11 83
Sara Jeza Alotaibi United Kingdom 6 30 0.9× 17 0.6× 27 1.1× 28 1.9× 8 0.7× 28 83
Guillermo Javier Lafuente Argentina 5 77 2.2× 22 0.7× 16 0.7× 23 1.5× 18 1.6× 13 118
Matthew Scholl United States 6 47 1.3× 15 0.5× 10 0.4× 4 0.3× 15 1.4× 14 82
Roland Gabriel Germany 7 18 0.5× 25 0.8× 12 0.5× 4 0.3× 13 1.2× 30 109
Sandeep Prabhu India 6 25 0.7× 21 0.7× 21 0.9× 11 0.7× 13 1.2× 40 109
Celia Paulsen United States 5 74 2.1× 28 0.9× 13 0.5× 4 0.3× 6 0.5× 8 104
Rupinder Paul Khandpur United States 6 40 1.1× 31 1.0× 27 1.1× 3 0.2× 43 3.9× 8 109
Ritu Sibal India 8 104 3.0× 29 1.0× 12 0.5× 3 0.2× 24 2.2× 18 152
Calvin Nobles United States 6 98 2.8× 30 1.0× 24 1.0× 5 0.3× 15 1.4× 28 153

Countries citing papers authored by Derek Mohammed

Since Specialization
Citations

This map shows the geographic impact of Derek Mohammed's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Derek Mohammed with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Derek Mohammed more than expected).

Fields of papers citing papers by Derek Mohammed

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Derek Mohammed. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Derek Mohammed. The network helps show where Derek Mohammed may publish in the future.

Co-authorship network of co-authors of Derek Mohammed

This figure shows the co-authorship network connecting the top 25 collaborators of Derek Mohammed. A scholar is included among the top collaborators of Derek Mohammed based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Derek Mohammed. Derek Mohammed is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Omar, Marwan, et al.. (2024). Harnessing LLMs for IoT Malware Detection: A Comparative Analysis of BERT and GPT-2. 1–6. 3 indexed citations
2.
Omar, Marwan, et al.. (2023). IoT Malware Detection with GPT Models. 1749–1752. 1 indexed citations
3.
4.
Nguyễn, Văn Đức, et al.. (2020). Net Neutrality Around the Globe: A Survey. 480–488. 2 indexed citations
5.
Mohammed, Derek, et al.. (2019). A Cloud-Based Computing Architecture Model of Post-Disaster Management System. International Journal of Simulation Systems Science & Technology.
7.
Nguyễn, Văn Đức, et al.. (2018). The Effects of the FCC Net Neutrality Repeal on Security and Privacy. 2(2). 21–29.
8.
Mohammed, Derek, Marwan Omar, & Văn Đức Nguyễn. (2018). Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks. Zenodo (CERN European Organization for Nuclear Research). 10(2). 1860–1864. 12 indexed citations
9.
Omar, Marwan, Derek Mohammed, & Văn Đức Nguyễn. (2017). Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders. International Journal of Business Process Integration and Management. 8(2). 114–114. 2 indexed citations
10.
Mohammed, Derek, et al.. (2017). Survey of information security risk management models. ScholarWorks (Walden University). 7(4). 1 indexed citations
11.
Mohammed, Derek, et al.. (2017). Big Data Analysis and Simulation as a Measure of the Performance of Hospital in Emergency Situation. International Journal of Simulation Systems Science & Technology. 1 indexed citations
12.
Nguyễn, Văn Đức, Marwan Omar, & Derek Mohammed. (2017). A Security Framework for Enhancing User Experience. 1(1). 19–28. 1 indexed citations
13.
Omar, Marwan, et al.. (2017). Defending against malicious insiders: a conceptual framework for predicting, detecting, and deterring malicious insiders. International Journal of Business Process Integration and Management. 8(2). 114–114. 4 indexed citations
14.
Mohammed, Derek. (2017). U.S. Healthcare Industry: Cybersecurity Regulatory and Compliance Issues. Zenodo (CERN European Organization for Nuclear Research). 12 indexed citations
15.
Mohammed, Derek. (2015). Cybersecurity Compliance in the Financial Sector. The Journal of Internet Banking and Commerce. 20(1). 1–11. 6 indexed citations
16.
Mohammed, Derek, et al.. (2015). Cybersecurity Challenges and Compliance Issues within the U.S. Healthcare Sector. SHILAP Revista de lepidopterología. 5(2). 55–66. 9 indexed citations
17.
Mohammed, Derek, et al.. (2014). An Evaluation of the Cybersecurity Policies for the United States Health & Human Services Department: Criteria, Regulations, and Improvements. International Journal of Business and Social Research. 4(4). 1–7. 1 indexed citations
18.
Mohammed, Derek, et al.. (2014). "Like" A Global Endorsement. How Clicking "Like" Influences Facebook Users Brand Recall and Future Purchasing Intentions. 17 indexed citations
19.
Mohammed, Derek. (2011). Security in Cloud Computing: An Analysis of Key Drivers and Constraints. Information Security Journal A Global Perspective. 20(3). 123–127. 12 indexed citations
20.
Mohammed, Derek. (2010). Ecommerce: Ongoing Challenges. The Journal of Internet Banking and Commerce. 15(2). 1–4. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026