Essam Ghadafi

951 total citations
12 papers, 116 citations indexed

About

Essam Ghadafi is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Essam Ghadafi has authored 12 papers receiving a total of 116 indexed citations (citations by other indexed papers that have themselves been cited), including 7 papers in Computer Networks and Communications, 7 papers in Artificial Intelligence and 6 papers in Information Systems. Recurrent topics in Essam Ghadafi's work include Cryptography and Data Security (4 papers), Blockchain Technology Applications and Security (3 papers) and Adversarial Robustness in Machine Learning (3 papers). Essam Ghadafi is often cited by papers focused on Cryptography and Data Security (4 papers), Blockchain Technology Applications and Security (3 papers) and Adversarial Robustness in Machine Learning (3 papers). Essam Ghadafi collaborates with scholars based in United Kingdom, Australia and Greece. Essam Ghadafi's co-authors include Phil Legg, Panagiotis Andriotis, Andrew McCarthy, Georg Fuchsbauer, Nigel P. Smart, David Bernhard, Bogdan Warinschi, Amr Youssef, Riham AlTawy and Marco Casassa Mont and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Access.

In The Last Decade

Essam Ghadafi

11 papers receiving 112 citations

Peers

Essam Ghadafi
Bobby Filar United States
Gabriela F. Cretu United States
Brian Sniffen United States
Olga Gadyatskaya Netherlands
Essam Ghadafi
Citations per year, relative to Essam Ghadafi Essam Ghadafi (= 1×) peers Agathe Blaise

Countries citing papers authored by Essam Ghadafi

Since Specialization
Citations

This map shows the geographic impact of Essam Ghadafi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Essam Ghadafi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Essam Ghadafi more than expected).

Fields of papers citing papers by Essam Ghadafi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Essam Ghadafi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Essam Ghadafi. The network helps show where Essam Ghadafi may publish in the future.

Co-authorship network of co-authors of Essam Ghadafi

This figure shows the co-authorship network connecting the top 25 collaborators of Essam Ghadafi. A scholar is included among the top collaborators of Essam Ghadafi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Essam Ghadafi. Essam Ghadafi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

12 of 12 papers shown
1.
Ghadafi, Essam, et al.. (2025). Metaverse Architectures: A Comprehensive Systematic Review of Definitions and Frameworks. Future Internet. 17(7). 283–283. 1 indexed citations
3.
Mougkogiannis, Panagiotis, Essam Ghadafi, & Andrew Adamatzky. (2025). Bio-inspired cryptography based on proteinoid assemblies. PLoS ONE. 20(5). e0324761–e0324761. 1 indexed citations
4.
Djenouri, Djamel, et al.. (2024). A Survey on Emerging Blockchain Technology Platforms for Securing the Internet of Things. Future Internet. 16(8). 285–285. 4 indexed citations
5.
AlTawy, Riham, et al.. (2023). Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT–Edge–Cloud. IEEE Internet of Things Journal. 11(5). 8105–8117. 9 indexed citations
6.
McCarthy, Andrew, Essam Ghadafi, Panagiotis Andriotis, & Phil Legg. (2022). Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey. SHILAP Revista de lepidopterología. 2(1). 154–190. 46 indexed citations
7.
Mont, Marco Casassa, et al.. (2022). Leveraging Patient Information Sharing Using Blockchain-Based Distributed Networks. IEEE Access. 10. 106334–106351. 6 indexed citations
8.
McCarthy, Andrew, Essam Ghadafi, Panagiotis Andriotis, & Phil Legg. (2022). Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. Journal of Information Security and Applications. 72. 103398–103398. 14 indexed citations
9.
Carr, Christopher, et al.. (2021). Adventures of a Light Blockchain Protocol in a Forest of Transactions: A Subset of a Story. IEEE Access. 9. 110085–110102. 1 indexed citations
10.
McCarthy, Andrew, Panagiotis Andriotis, Essam Ghadafi, & Phil Legg. (2021). Feature Vulnerability and Robustness Assessment against Adversarial Machine Learning Attacks. University of Birmingham Research Portal (University of Birmingham). 2. 1–8. 5 indexed citations
11.
Bootle, Jonathan, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, & Jens Groth. (2020). Foundations of Fully Dynamic Group Signatures. Journal of Cryptology. 33(4). 1822–1870. 7 indexed citations
12.
Bernhard, David, Georg Fuchsbauer, Essam Ghadafi, Nigel P. Smart, & Bogdan Warinschi. (2013). Anonymous attestation with user-controlled linkability. International Journal of Information Security. 12(3). 219–249. 22 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026