Elisa Costante

463 total citations
16 papers, 237 citations indexed

About

Elisa Costante is a scholar working on Computer Networks and Communications, Sociology and Political Science and Information Systems. According to data from OpenAlex, Elisa Costante has authored 16 papers receiving a total of 237 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Computer Networks and Communications, 6 papers in Sociology and Political Science and 6 papers in Information Systems. Recurrent topics in Elisa Costante's work include Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (5 papers) and Privacy, Security, and Data Protection (4 papers). Elisa Costante is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (5 papers) and Privacy, Security, and Data Protection (4 papers). Elisa Costante collaborates with scholars based in Netherlands, Italy and Finland. Elisa Costante's co-authors include Jerry den Hartog, Milan Petković, Nicola Zannone, Sandro Etalle, Federica Paci, Mykola Pechenizkiy, Emmanuele Zambon, Daniel Ricardo dos Santos, Stefano Tonetta and Corrado Aaron Visaggio and has published in prestigious journals such as Computer Standards & Interfaces, Journal of Information Security and Applications and Computational Intelligence.

In The Last Decade

Elisa Costante

15 papers receiving 227 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Elisa Costante Netherlands 8 118 108 95 86 55 16 237
Eileen Kowalski 5 246 2.1× 89 0.8× 152 1.6× 87 1.0× 83 1.5× 5 345
Bob Blakley United States 6 207 1.8× 99 0.9× 121 1.3× 71 0.8× 48 0.9× 18 298
Howard Chivers United Kingdom 12 216 1.8× 93 0.9× 122 1.3× 37 0.4× 117 2.1× 31 328
Tatyana Ryutov United States 10 117 1.0× 183 1.7× 150 1.6× 163 1.9× 21 0.4× 24 306
Bart De Decker Belgium 9 149 1.3× 134 1.2× 71 0.7× 44 0.5× 44 0.8× 64 252
Jason Paul Cruz Japan 7 329 2.8× 190 1.8× 109 1.1× 62 0.7× 48 0.9× 23 417
Abbas Ghaemi Bafghi Iran 9 127 1.1× 110 1.0× 163 1.7× 30 0.3× 71 1.3× 31 249
Sami Zhioua Saudi Arabia 10 81 0.7× 163 1.5× 90 0.9× 39 0.5× 70 1.3× 33 316
Yudistira Asnar Indonesia 9 187 1.6× 105 1.0× 52 0.5× 39 0.5× 52 0.9× 44 257

Countries citing papers authored by Elisa Costante

Since Specialization
Citations

This map shows the geographic impact of Elisa Costante's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Elisa Costante with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Elisa Costante more than expected).

Fields of papers citing papers by Elisa Costante

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Elisa Costante. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Elisa Costante. The network helps show where Elisa Costante may publish in the future.

Co-authorship network of co-authors of Elisa Costante

This figure shows the co-authorship network connecting the top 25 collaborators of Elisa Costante. A scholar is included among the top collaborators of Elisa Costante based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Elisa Costante. Elisa Costante is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Dupont, Guillaume, et al.. (2023). Demonstration of new attacks on three healthcare network protocols in a lab environment. Journal of Computer Virology and Hacking Techniques. 20(2). 301–314. 2 indexed citations
2.
Hartog, Jerry den, et al.. (2023). Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents. TU/e Research Portal. 2999–3008.
3.
Dupont, Guillaume, et al.. (2021). Similarity-Based Clustering For IoT Device Classification. TU/e Research Portal. 1–7. 3 indexed citations
4.
Hartog, Jerry den, et al.. (2017). Encryption in ICS networks: A blessing or a curse?. TU/e Research Portal. 289–294. 16 indexed citations
5.
Santos, Daniel Ricardo dos, et al.. (2017). From System Specification to Anomaly Detection (and back). TU/e Research Portal. 13–24. 15 indexed citations
6.
Pizzonia, Maurizio, et al.. (2017). Preemptive: an integrated approach to intrusion detection and prevention in industrial control systems. International Journal of Critical Infrastructures. 13(2/3). 206–206. 3 indexed citations
7.
Costante, Elisa, Jerry den Hartog, Milan Petković, Sandro Etalle, & Mykola Pechenizkiy. (2016). A white-box anomaly-based framework for database leakage detection. Journal of Information Security and Applications. 32. 27–46. 19 indexed citations
8.
Costante, Elisa, et al.. (2016). A Hybrid Framework for Data Loss Prevention and Detection. TU/e Research Portal. 324–333. 35 indexed citations
9.
Costante, Elisa. (2015). Privacy throughout the data cycle. TU/e Research Portal (Eindhoven University of Technology). 1 indexed citations
10.
Costante, Elisa, Jerry den Hartog, & Milan Petković. (2014). Understanding Perceived Trust to Reduce Regret. Computational Intelligence. 31(2). 327–347. 5 indexed citations
11.
Costante, Elisa, Federica Paci, & Nicola Zannone. (2013). Privacy-Aware Web Service Composition and Ranking. TU/e Research Portal. 131–138. 23 indexed citations
12.
Costante, Elisa, Federica Paci, & Nicola Zannone. (2013). Privacy-Aware Web Service Composition and Ranking. International Journal of Web Services Research. 10(3). 1–23. 19 indexed citations
13.
Costante, Elisa, et al.. (2013). Database Anomalous Activities - Detection and Quantification. 603–608. 6 indexed citations
14.
Costante, Elisa, et al.. (2012). A machine learning solution to assess privacy policy completeness. TU/e Research Portal. 91–96. 53 indexed citations
15.
Costante, Elisa, Jerry den Hartog, & Milan Petković. (2011). On-line trust perception: What really matters. TU/e Research Portal. 52–59. 30 indexed citations
16.
Canfora, Gerardo, et al.. (2008). A three-layered model to implement data privacy policies. Computer Standards & Interfaces. 30(6). 398–409. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026