Gaurav S. Kc

974 total citations
8 papers, 545 citations indexed

About

Gaurav S. Kc is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Gaurav S. Kc has authored 8 papers receiving a total of 545 indexed citations (citations by other indexed papers that have themselves been cited), including 7 papers in Information Systems, 5 papers in Signal Processing and 5 papers in Artificial Intelligence. Recurrent topics in Gaurav S. Kc's work include Advanced Malware Detection Techniques (5 papers), Security and Verification in Computing (4 papers) and Web Application Security Vulnerabilities (3 papers). Gaurav S. Kc is often cited by papers focused on Advanced Malware Detection Techniques (5 papers), Security and Verification in Computing (4 papers) and Web Application Security Vulnerabilities (3 papers). Gaurav S. Kc collaborates with scholars based in United States and Greece. Gaurav S. Kc's co-authors include Angelos D. Keromytis, Vassilis Prevelakis, Stephen Boyd, Michael E. Locasto, Paul A. Karger, Janak J. Parekh, Gail E. Kaiser and Suhit Gupta and has published in prestigious journals such as IBM Journal of Research and Development, IEEE Transactions on Dependable and Secure Computing and Columbia Academic Commons (Columbia University).

In The Last Decade

Gaurav S. Kc

8 papers receiving 486 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gaurav S. Kc United States 6 418 379 271 186 81 8 545
Emre C. Sezer United States 6 466 1.1× 423 1.1× 257 0.9× 190 1.0× 56 0.7× 6 552
Brent Byunghoon Kang South Korea 13 351 0.8× 272 0.7× 207 0.8× 224 1.2× 83 1.0× 43 479
Ralf Hund Germany 9 563 1.3× 502 1.3× 301 1.1× 194 1.0× 116 1.4× 13 685
Dennis Andriesse Netherlands 12 464 1.1× 411 1.1× 300 1.1× 182 1.0× 120 1.5× 15 613
Ming-Wei Shih United States 7 510 1.2× 297 0.8× 232 0.9× 259 1.4× 110 1.4× 7 635
Elena Gabriela Barrantes Costa Rica 6 287 0.7× 260 0.7× 177 0.7× 103 0.6× 60 0.7× 10 379
Johannes Götzfried Germany 10 452 1.1× 254 0.7× 161 0.6× 184 1.0× 151 1.9× 19 536
Brad Chen United States 5 218 0.5× 170 0.4× 208 0.8× 181 1.0× 100 1.2× 6 415
Stefan Nürnberger Germany 9 512 1.2× 385 1.0× 183 0.7× 242 1.3× 77 1.0× 17 593
Chia-Che Tsai United States 10 353 0.8× 170 0.4× 258 1.0× 246 1.3× 197 2.4× 23 551

Countries citing papers authored by Gaurav S. Kc

Since Specialization
Citations

This map shows the geographic impact of Gaurav S. Kc's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gaurav S. Kc with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gaurav S. Kc more than expected).

Fields of papers citing papers by Gaurav S. Kc

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gaurav S. Kc. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gaurav S. Kc. The network helps show where Gaurav S. Kc may publish in the future.

Co-authorship network of co-authors of Gaurav S. Kc

This figure shows the co-authorship network connecting the top 25 collaborators of Gaurav S. Kc. A scholar is included among the top collaborators of Gaurav S. Kc based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gaurav S. Kc. Gaurav S. Kc is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

8 of 8 papers shown
1.
Karger, Paul A., et al.. (2009). Privacy is essential for secure mobile devices. IBM Journal of Research and Development. 53(2). 5:1–5:17. 1 indexed citations
2.
Boyd, Stephen, Gaurav S. Kc, Michael E. Locasto, Angelos D. Keromytis, & Vassilis Prevelakis. (2008). On the General Applicability of Instruction-Set Randomization. IEEE Transactions on Dependable and Secure Computing. 7(3). 255–270. 42 indexed citations
3.
Kc, Gaurav S. & Angelos D. Keromytis. (2006). e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. Columbia Academic Commons (Columbia University). 286–302. 25 indexed citations
4.
Kc, Gaurav S. & Paul A. Karger. (2005). IBM Research Report Preventing Security and Privacy Attacks on Machine Readable Travel Documents (MRTDs). 4 indexed citations
5.
Kc, Gaurav S. & Paul A. Karger. (2005). Security and Privacy Issues in Machine Readable Travel Documents (MRTDs). 9 indexed citations
6.
Kc, Gaurav S., Angelos D. Keromytis, & Vassilis Prevelakis. (2003). Countering code-injection attacks with instruction-set randomization. 25 indexed citations
7.
Kc, Gaurav S., Angelos D. Keromytis, & Vassilis Prevelakis. (2003). Countering code-injection attacks with instruction-set randomization. Columbia Academic Commons (Columbia University). 272–280. 424 indexed citations
8.
Gupta, Suhit, et al.. (2001). An Active Events Model for Systems Monitoring. Columbia Academic Commons (Columbia University). 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026