Dorothy E. Denning

13.7k total citations · 4 hit papers
102 papers, 8.1k citations indexed

About

Dorothy E. Denning is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Dorothy E. Denning has authored 102 papers receiving a total of 8.1k indexed citations (citations by other indexed papers that have themselves been cited), including 37 papers in Computer Networks and Communications, 37 papers in Artificial Intelligence and 29 papers in Information Systems. Recurrent topics in Dorothy E. Denning's work include Cryptography and Data Security (18 papers), Network Security and Intrusion Detection (15 papers) and Internet Traffic Analysis and Secure E-voting (12 papers). Dorothy E. Denning is often cited by papers focused on Cryptography and Data Security (18 papers), Network Security and Intrusion Detection (15 papers) and Internet Traffic Analysis and Secure E-voting (12 papers). Dorothy E. Denning collaborates with scholars based in United States, Canada and Germany. Dorothy E. Denning's co-authors include Peter J. Denning, Giovanni Maria Sacco, Teresa F. Lunt, P. F. Macdoran, Mark Heckman, Roger R. Schell, Logan Scott, Dennis K. Branstad, W.R. Shockley and Ravi Sandhu and has published in prestigious journals such as Communications of the ACM, IEEE Communications Magazine and ACM Computing Surveys.

In The Last Decade

Dorothy E. Denning

94 papers receiving 6.8k citations

Hit Papers

An Intrusion-Detection Model 1976 2026 1992 2009 1987 1982 1976 1977 500 1000 1.5k 2.0k

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Dorothy E. Denning United States 31 5.4k 4.6k 2.7k 2.7k 1.3k 102 8.1k
Aviel D. Rubin United States 30 3.5k 0.6× 2.5k 0.6× 1.8k 0.7× 3.2k 1.2× 801 0.6× 90 6.4k
Eugene H. Spafford United States 43 2.3k 0.4× 3.3k 0.7× 2.8k 1.0× 3.1k 1.1× 447 0.3× 162 6.1k
Bruce Schneier United States 33 3.4k 0.6× 2.2k 0.5× 1.3k 0.5× 2.7k 1.0× 836 0.6× 170 7.2k
Steven M. Bellovin United States 32 3.0k 0.6× 3.3k 0.7× 1.1k 0.4× 1.7k 0.6× 775 0.6× 157 4.9k
J. Alex Halderman United States 30 3.1k 0.6× 2.6k 0.6× 2.0k 0.7× 1.8k 0.7× 379 0.3× 72 5.0k
Ross Anderson United Kingdom 42 2.8k 0.5× 2.2k 0.5× 2.2k 0.8× 3.7k 1.4× 1.0k 0.8× 132 9.8k
Raghu Ramakrishnan United States 51 4.9k 0.9× 7.1k 1.5× 2.6k 0.9× 4.7k 1.7× 674 0.5× 190 11.7k
Bhavani Thuraisingham United States 38 3.5k 0.7× 2.5k 0.6× 1.2k 0.4× 2.3k 0.9× 1.1k 0.8× 383 6.2k
Thorsten Holz Germany 44 4.1k 0.8× 3.8k 0.8× 4.8k 1.8× 3.3k 1.2× 547 0.4× 180 7.7k
Giovanni Vigna United States 65 7.0k 1.3× 7.5k 1.6× 7.7k 2.8× 7.6k 2.8× 816 0.6× 224 13.8k

Countries citing papers authored by Dorothy E. Denning

Since Specialization
Citations

This map shows the geographic impact of Dorothy E. Denning's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dorothy E. Denning with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dorothy E. Denning more than expected).

Fields of papers citing papers by Dorothy E. Denning

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dorothy E. Denning. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dorothy E. Denning. The network helps show where Dorothy E. Denning may publish in the future.

Co-authorship network of co-authors of Dorothy E. Denning

This figure shows the co-authorship network connecting the top 25 collaborators of Dorothy E. Denning. A scholar is included among the top collaborators of Dorothy E. Denning based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dorothy E. Denning. Dorothy E. Denning is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Warner, Michael, Ben Buchanan, David E. Sanger, et al.. (2017). Understanding Cyber Conflict: Fourteen Analogies. Georgetown University Press eBooks. 19 indexed citations
2.
Denning, Peter J. & Dorothy E. Denning. (2010). The Profession of IT, Discussing Cyber Attack. Communications of the ACM. 53(9). 29–31. 7 indexed citations
3.
Scott, Logan & Dorothy E. Denning. (2003). Location Based Encryption and Its Role In Digital Cinema Distribution. Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School). 288–297. 16 indexed citations
4.
Denning, Dorothy E.. (2003). Information Technology and Security. Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School). 21 indexed citations
5.
Denning, Dorothy E.. (1997). Encryption policy and market trends. 449–473. 1 indexed citations
6.
Denning, Dorothy E. & P. F. Macdoran. (1997). Location-based authentication: grounding cyberspace for better security. 167–174. 16 indexed citations
7.
Denning, Dorothy E.. (1997). International encryption policy. Addison-Wesley Longman Publishing Co., Inc. eBooks. 105–118. 3 indexed citations
8.
Denning, Dorothy E. & Dennis K. Branstad. (1997). A taxonomy for key recovery encryption systems. 357–371. 4 indexed citations
9.
Denning, Dorothy E., et al.. (1996). Key Escrow Encryption Policies and Technologies. Villanova law review. 41(1). 289. 6 indexed citations
10.
Denning, Dorothy E.. (1995). International key escrow encryption: proposed objectives and options. Springer eBooks. 208–225. 1 indexed citations
11.
Brickell, Ernest F., et al.. (1995). SKIPJACK review: interim report. Springer eBooks. 119–130. 7 indexed citations
12.
Denning, Dorothy E.. (1995). The U.S. key escrow encryption technology. Springer eBooks. 111–118. 3 indexed citations
13.
Denning, Dorothy E.. (1995). The case for “Clipper”. Technology Review. 98(5). 48–55. 4 indexed citations
14.
Denning, Dorothy E.. (1993). The Clipper Encryption System. American Scientist. 81(4). 319–323. 7 indexed citations
15.
Denning, Dorothy E.. (1987). Lessons Learned from Modeling a Secure Multilevel Relational Database System.. 35–43. 1 indexed citations
16.
Denning, Dorothy E.. (1986). An Intrusion-Detection Model. 118–118. 187 indexed citations
17.
Denning, Dorothy E., et al.. (1983). Research topics in statistical database management. 46–51. 4 indexed citations
18.
Denning, Dorothy E.. (1983). A security model for the statistical database problem. 368–390. 11 indexed citations
19.
Denning, Dorothy E.. (1978). Are statistical databases secure. 525–530. 13 indexed citations
20.
Schwartz, Mayer D., Dorothy E. Denning, & Peter J. Denning. (1977). Securing Data Bases under Linear Queries.. IFIP Congress. 33(2). 395–398. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026