Fathy Eassa

974 total citations
85 papers, 554 citations indexed

About

Fathy Eassa is a scholar working on Computer Networks and Communications, Information Systems and Software. According to data from OpenAlex, Fathy Eassa has authored 85 papers receiving a total of 554 indexed citations (citations by other indexed papers that have themselves been cited), including 54 papers in Computer Networks and Communications, 45 papers in Information Systems and 20 papers in Software. Recurrent topics in Fathy Eassa's work include Cloud Computing and Resource Management (16 papers), Blockchain Technology Applications and Security (15 papers) and Parallel Computing and Optimization Techniques (15 papers). Fathy Eassa is often cited by papers focused on Cloud Computing and Resource Management (16 papers), Blockchain Technology Applications and Security (15 papers) and Parallel Computing and Optimization Techniques (15 papers). Fathy Eassa collaborates with scholars based in Saudi Arabia, Egypt and Sweden. Fathy Eassa's co-authors include Kamal Jambi, Maher Khemakhem, Khalid Ali Almarhabi, Abdullah Alghamdi, Lamiaa A. Elrefaei, Ahmed Mohammed Alghamdi, Mohammad Yamin, Khalid Alsubhi, Abdullah Ali and Fawaz Alsolami and has published in prestigious journals such as IEEE Access, Sensors and IEEE Transactions on Intelligent Transportation Systems.

In The Last Decade

Fathy Eassa

71 papers receiving 526 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Fathy Eassa Saudi Arabia 13 301 279 169 66 50 85 554
Weizhong Qiang China 12 246 0.8× 361 1.3× 233 1.4× 42 0.6× 56 1.1× 63 606
Jang‐Eui Hong South Korea 12 222 0.7× 131 0.5× 147 0.9× 62 0.9× 87 1.7× 83 523
Rakesh Kumar Lenka India 13 241 0.8× 366 1.3× 91 0.5× 39 0.6× 126 2.5× 57 615
Ermeson Andrade Brazil 14 278 0.9× 345 1.2× 90 0.5× 50 0.8× 93 1.9× 94 602
Phu H. Nguyen Norway 12 238 0.8× 162 0.6× 153 0.9× 52 0.8× 22 0.4× 50 450
Aitor Urbieta Spain 12 236 0.8× 347 1.2× 136 0.8× 91 1.4× 77 1.5× 39 522
Abdelouahed Gherbi Canada 16 276 0.9× 284 1.0× 160 0.9× 20 0.3× 68 1.4× 62 596
Luigi Coppolino Italy 16 387 1.3× 382 1.4× 273 1.6× 107 1.6× 109 2.2× 70 763
Francesco Moscato Italy 15 393 1.3× 284 1.0× 187 1.1× 20 0.3× 52 1.0× 48 632
Luigi Romano Italy 18 523 1.7× 445 1.6× 393 2.3× 78 1.2× 76 1.5× 87 915

Countries citing papers authored by Fathy Eassa

Since Specialization
Citations

This map shows the geographic impact of Fathy Eassa's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Fathy Eassa with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Fathy Eassa more than expected).

Fields of papers citing papers by Fathy Eassa

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Fathy Eassa. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Fathy Eassa. The network helps show where Fathy Eassa may publish in the future.

Co-authorship network of co-authors of Fathy Eassa

This figure shows the co-authorship network connecting the top 25 collaborators of Fathy Eassa. A scholar is included among the top collaborators of Fathy Eassa based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Fathy Eassa. Fathy Eassa is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khemakhem, Maher, et al.. (2025). RPFL: A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection. Electronics. 14(6). 1089–1089. 2 indexed citations
3.
5.
Dahab, Mohamed Yehia, et al.. (2024). Enhanced Intrusion Detection in Software-Defined Networking using Advanced Feature Selection: The EMRMR Approach. Engineering Technology & Applied Science Research. 14(6). 19001–19008. 2 indexed citations
6.
Noaman, Amin Y., et al.. (2024). Leveraging Large Language Models for Automated Bug Fixing. International Journal of Advanced Computer Science and Applications. 15(12).
7.
Albeshri, Aiiad, et al.. (2024). Multimodal Large Language Model-Based Fault Detection and Diagnosis in Context of Industry 4.0. Electronics. 13(24). 4912–4912. 11 indexed citations
8.
Eassa, Fathy, et al.. (2024). A Blockchain-Based Security Framework for East-West Interface of SDN. Electronics. 13(19). 3799–3799. 3 indexed citations
9.
Khemakhem, Maher, et al.. (2023). Towards Sustainable Energy Grids: A Machine Learning-Based Ensemble Methods Approach for Outages Estimation in Extreme Weather Events. Sustainability. 15(16). 12622–12622. 14 indexed citations
10.
Noaman, Amin Y., et al.. (2023). Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learning Model. IEEE Access. 11. 63916–63931. 7 indexed citations
11.
Eassa, Fathy, Abdullah Alghamdi, Sanaa Sharaf, et al.. (2023). An Architecture for a Tri-Programming Model-Based Parallel Hybrid Testing Tool. Applied Sciences. 13(21). 11960–11960. 5 indexed citations
12.
Eassa, Fathy, et al.. (2023). Prediction and Correction of Software Defects in Message-Passing Interfaces Using a Static Analysis Tool and Machine Learning. IEEE Access. 11. 60668–60680. 5 indexed citations
13.
Khemakhem, Maher, et al.. (2023). Technical Study of Deep Learning in Cloud Computing for Accurate Workload Prediction. Electronics. 12(3). 650–650. 12 indexed citations
14.
Eassa, Fathy, et al.. (2022). BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking. Electronics. 11(7). 996–996. 17 indexed citations
15.
Eassa, Fathy, et al.. (2022). Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems. Electronics. 11(5). 711–711. 38 indexed citations
16.
Dahab, Mohamed Yehia, et al.. (2022). Errors Classification and Static Detection Techniques for Dual-Programming Model (OpenMP and OpenACC). IEEE Access. 10. 117808–117826. 6 indexed citations
17.
Eassa, Fathy, et al.. (2021). Standalone Behaviour-Based Attack Detection Techniques for Distributed Software Systems via Blockchain. Applied Sciences. 11(12). 5685–5685. 3 indexed citations
18.
Eassa, Fathy, et al.. (2021). Blockchain-Based Secured Access Control in an IoT System. Applied Sciences. 11(4). 1772–1772. 62 indexed citations
19.
Eassa, Fathy, et al.. (2020). Blockchain Platforms and Access Control Classification for IoT Systems. Symmetry. 12(10). 1663–1663. 32 indexed citations
20.
Ali, Abdullah, Siti Mariyam Shamsuddin, & Fathy Eassa. (2014). Ontology-based Cloud Services Representation. Research Journal of Applied Sciences Engineering and Technology. 8(1). 83–94. 16 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026