Farah Kandah

512 total citations
34 papers, 364 citations indexed

About

Farah Kandah is a scholar working on Computer Networks and Communications, Electrical and Electronic Engineering and Artificial Intelligence. According to data from OpenAlex, Farah Kandah has authored 34 papers receiving a total of 364 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Computer Networks and Communications, 14 papers in Electrical and Electronic Engineering and 12 papers in Artificial Intelligence. Recurrent topics in Farah Kandah's work include Mobile Ad Hoc Networks (11 papers), Network Security and Intrusion Detection (8 papers) and Opportunistic and Delay-Tolerant Networks (8 papers). Farah Kandah is often cited by papers focused on Mobile Ad Hoc Networks (11 papers), Network Security and Intrusion Detection (8 papers) and Opportunistic and Delay-Tolerant Networks (8 papers). Farah Kandah collaborates with scholars based in United States. Farah Kandah's co-authors include Anthony Skjellum, Weiyi Zhang, Donald R. Reising, Weiyi Zhang, T. D. Loveless, Chonggang Wang, Hongxiang Li, Chonggang Wang, Juan Li and Yang Li and has published in prestigious journals such as IEEE Access, IEEE Internet of Things Journal and Future Generation Computer Systems.

In The Last Decade

Farah Kandah

32 papers receiving 341 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Farah Kandah United States 11 194 144 138 101 51 34 364
Ruei‐Hau Hsu Taiwan 13 273 1.4× 197 1.4× 230 1.7× 111 1.1× 62 1.2× 29 431
Jian-Jhih Kuo Taiwan 11 247 1.3× 78 0.5× 81 0.6× 114 1.1× 28 0.5× 56 356
Erik Tews Germany 10 157 0.8× 144 1.0× 240 1.7× 102 1.0× 70 1.4× 23 446
Junsong Fu China 9 163 0.8× 136 0.9× 134 1.0× 43 0.4× 47 0.9× 51 314
Ashutosh Bhatia India 12 211 1.1× 89 0.6× 109 0.8× 86 0.9× 52 1.0× 56 352
Qian Mei China 9 223 1.1× 205 1.4× 255 1.8× 192 1.9× 20 0.4× 10 417
Cong Peng China 13 283 1.5× 192 1.3× 257 1.9× 195 1.9× 19 0.4× 52 525
N. Boudriga Tunisia 10 185 1.0× 62 0.4× 66 0.5× 96 1.0× 42 0.8× 54 290
Seyedakbar Mostafavi Iran 12 257 1.3× 81 0.6× 93 0.7× 81 0.8× 60 1.2× 37 358
Ricardo Morla Portugal 10 245 1.3× 141 1.0× 127 0.9× 67 0.7× 36 0.7× 50 372

Countries citing papers authored by Farah Kandah

Since Specialization
Citations

This map shows the geographic impact of Farah Kandah's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Farah Kandah with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Farah Kandah more than expected).

Fields of papers citing papers by Farah Kandah

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Farah Kandah. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Farah Kandah. The network helps show where Farah Kandah may publish in the future.

Co-authorship network of co-authors of Farah Kandah

This figure shows the co-authorship network connecting the top 25 collaborators of Farah Kandah. A scholar is included among the top collaborators of Farah Kandah based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Farah Kandah. Farah Kandah is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kandah, Farah, et al.. (2025). Clustering-Based Intrusion Detection System Meets Multicritics Generative Adversarial Networks. IEEE Internet of Things Journal. 12(11). 16112–16128. 3 indexed citations
3.
Ghafoor, Sheikh, et al.. (2024). Design and Development of XiveNet: A Hybrid CAN Research Testbed. 1–8. 1 indexed citations
5.
Kandah, Farah, et al.. (2023). BEAST: Behavior as a Service for Trust management in IoT devices. Future Generation Computer Systems. 144. 165–178. 5 indexed citations
6.
Kandah, Farah, et al.. (2022). Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks. 605–610. 1 indexed citations
7.
Reising, Donald R., et al.. (2022). An Analysis of Signal Energy Impacts and Threats to Deep Learning Based SEI. ICC 2022 - IEEE International Conference on Communications. 13 indexed citations
8.
Reising, Donald R., et al.. (2022). Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections. IEEE Access. 10. 133601–133616. 7 indexed citations
9.
Hunter, Jonathan, et al.. (2022). Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices. 947–948. 4 indexed citations
10.
Reising, Donald R., et al.. (2020). Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM. IEEE Internet of Things Journal. 8(10). 8356–8371. 55 indexed citations
11.
Kandah, Farah, et al.. (2020). Behavioral Model based Trust Management design for IoT at Scale. 9–17. 6 indexed citations
12.
Kandah, Farah, et al.. (2020). Towards trusted and energy-efficient data collection in unattended wireless sensor networks. Wireless Networks. 26(7). 5455–5471. 8 indexed citations
14.
Kandah, Farah, et al.. (2019). BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup. 1–7. 14 indexed citations
15.
Kandah, Farah, et al.. (2019). Intelligent Threat Hunting in Software-Defined Networking. 1–5. 7 indexed citations
16.
Kandah, Farah, et al.. (2017). Efficient key management for Big Data gathering in dynamic sensor networks. 667–671. 8 indexed citations
17.
Kandah, Farah, et al.. (2013). Mitigating colluding injected attack using monitoring verification in mobile ad‐hoc networks. Security and Communication Networks. 6(4). 539–547. 17 indexed citations
18.
Kandah, Farah, et al.. (2012). A misleading active routing attack in mobile ad-hoc networks. International Journal of Security and Networks. 7(1). 17–17. 4 indexed citations
19.
Kandah, Farah, et al.. (2012). Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks. Journal of Communications. 7(8). 6 indexed citations
20.
Kandah, Farah, et al.. (2011). MIRA: Misleading Routing Attack in Mobile Ad-Hoc Networks. 1–5. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026