This map shows the geographic impact of Ernest Foo's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ernest Foo with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ernest Foo more than expected).
This network shows the impact of papers produced by Ernest Foo. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ernest Foo. The network helps show where Ernest Foo may publish in the future.
Co-authorship network of co-authors of Ernest Foo
This figure shows the co-authorship network connecting the top 25 collaborators of Ernest Foo.
A scholar is included among the top collaborators of Ernest Foo based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Ernest Foo. Ernest Foo is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Foo, Ernest, et al.. (2016). Automated feature engineering for HTTP tunnel detection. QUT ePrints (Queensland University of Technology).1 indexed citations
3.
Radke, Kenneth, et al.. (2015). Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. QUT ePrints (Queensland University of Technology). 67–70.13 indexed citations
Myers, D. Brenton, Ernest Foo, & Kenneth Radke. (2015). Internet-wide Scanning Taxonomy and Framework. QUT ePrints (Queensland University of Technology). 61–65.6 indexed citations
6.
Ahmed, Ejaz, et al.. (2014). Poisoned GOOSE: exploiting the GOOSE protocol. QUT ePrints (Queensland University of Technology). 17–22.40 indexed citations
7.
Bhatia, Sajal, et al.. (2014). Practical modbus flooding attack and detection. QUT ePrints (Queensland University of Technology). 57–65.23 indexed citations
Othman, Mohd Fairuz Iskandar, et al.. (2013). Typology of phishing email victims based on their behavioural response. QUT ePrints (Queensland University of Technology).2 indexed citations
10.
Suriadi, Suriadi, et al.. (2012). Analysis of Object-Specific Authorization Protocol (OSAP)using coloured Petri nets. QUT ePrints (Queensland University of Technology). 47–58.1 indexed citations
11.
White, Andrew, Bradley Schatz, & Ernest Foo. (2012). Surveying the user space through user allocations. Science & Engineering Faculty.1 indexed citations
12.
Foo, Ernest, et al.. (2010). Smart Grid Test Bed Design and Implementation. QUT ePrints (Queensland University of Technology).8 indexed citations
13.
Foo, Ernest, et al.. (2009). The susceptibility of digital signatures to fraud in the National Electronic Conveyancing System : an analysis. QUT ePrints (Queensland University of Technology).1 indexed citations
14.
Suriadi, Suriadi, et al.. (2008). Layered identity infrastructure model for identity meta systems. QUT ePrints (Queensland University of Technology). 83–92.1 indexed citations
15.
Foo, Ernest, et al.. (2007). A Secure Billing Architecture for 4G Wireless Networks. QUT ePrints (Queensland University of Technology).1 indexed citations
16.
Boyd, Colin, et al.. (2007). Toward Non-Parallelizable Client Puzzles. Lecture notes in computer science.3 indexed citations
17.
Betts, Martin, Peter Black, Sharon Christensen, et al.. (2006). Towards secure and legal e-tendering. Journal of Information Technology in Construction. 11(7). 89–102.33 indexed citations
18.
Boyd, Colin, et al.. (2006). Using Coloured Petri Nets to Simulate DoS-resistant Protocols. Schweizerische medizinische Wochenschrift. 129(13). 499–507.7 indexed citations
19.
Dawson, Ed, William Duncan, Sharon Christensen, et al.. (2006). eTendering - Security and Legal Issues. QUT ePrints (Queensland University of Technology).10 indexed citations
20.
Boyd, Colin & Ernest Foo. (1998). Off-line Fair Payment Protocols using Convertible Signatures.10 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.