Ghaith Husari

642 total citations
19 papers, 377 citations indexed

About

Ghaith Husari is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Ghaith Husari has authored 19 papers receiving a total of 377 indexed citations (citations by other indexed papers that have themselves been cited), including 9 papers in Computer Networks and Communications, 8 papers in Artificial Intelligence and 7 papers in Information Systems. Recurrent topics in Ghaith Husari's work include Network Security and Intrusion Detection (6 papers), Internet Traffic Analysis and Secure E-voting (4 papers) and Information and Cyber Security (4 papers). Ghaith Husari is often cited by papers focused on Network Security and Intrusion Detection (6 papers), Internet Traffic Analysis and Secure E-voting (4 papers) and Information and Cyber Security (4 papers). Ghaith Husari collaborates with scholars based in United States, Jordan and Canada. Ghaith Husari's co-authors include Ehab Al‐Shaer, Bill Chu, Xi Niu, Mohiuddin Ahmed, Omar Darwish, Zahid Anwar, Mujahid Mohsin, Mohammad Ashiqur Rahman, Mahmoud Al‐Ayyoub and Yuanzhu Chen and has published in prestigious journals such as IEEE Access, International Journal of Advanced Computer Science and Applications and Journal of Network and Systems Management.

In The Last Decade

Ghaith Husari

19 papers receiving 360 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ghaith Husari United States 10 179 178 128 108 57 19 377
Mohammad Masum United States 12 104 0.6× 162 0.9× 168 1.3× 169 1.6× 37 0.6× 34 372
Putra Wanda Indonesia 9 124 0.7× 116 0.7× 58 0.5× 120 1.1× 47 0.8× 25 271
Fucai Zhou China 11 167 0.9× 95 0.5× 40 0.3× 240 2.2× 74 1.3× 80 379
Peilong Li United States 9 220 1.2× 257 1.4× 44 0.3× 195 1.8× 41 0.7× 26 443
Mohammed Kaosar Australia 9 103 0.6× 111 0.6× 48 0.4× 269 2.5× 37 0.6× 38 440
Zhiyun Zheng China 13 128 0.7× 75 0.4× 53 0.4× 179 1.7× 33 0.6× 37 361
Poonam Rani India 9 96 0.5× 104 0.6× 34 0.3× 106 1.0× 53 0.9× 35 321
Branka Stojanović Austria 11 136 0.8× 189 1.1× 169 1.3× 144 1.3× 67 1.2× 36 409
Rahul Hans India 9 98 0.5× 120 0.7× 25 0.2× 156 1.4× 81 1.4× 25 345
Tianqing Zhu China 11 197 1.1× 127 0.7× 31 0.2× 202 1.9× 51 0.9× 18 385

Countries citing papers authored by Ghaith Husari

Since Specialization
Citations

This map shows the geographic impact of Ghaith Husari's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ghaith Husari with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ghaith Husari more than expected).

Fields of papers citing papers by Ghaith Husari

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ghaith Husari. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ghaith Husari. The network helps show where Ghaith Husari may publish in the future.

Co-authorship network of co-authors of Ghaith Husari

This figure shows the co-authorship network connecting the top 25 collaborators of Ghaith Husari. A scholar is included among the top collaborators of Ghaith Husari based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ghaith Husari. Ghaith Husari is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Darwish, Omar, et al.. (2022). Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing. 1–7. 3 indexed citations
2.
Khan, Mohammad S., et al.. (2022). Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. 99–105. 4 indexed citations
3.
Khan, Mohammad S., et al.. (2021). MACHINE LEARNING ALGORITHMS AND THEIR APPLICATIONS IN CLASSIFYING CYBER-ATTACKS ON A SMART GRID NETWORK. Digital Commons - East Tennessee State University (East Tennessee State University). 63–69. 6 indexed citations
4.
Husari, Ghaith, et al.. (2021). Thor: A Deep Learning Approach for Face Mask Detection to Prevent the COVID-19 Pandemic. Digital Commons - East Tennessee State University (East Tennessee State University). 1–8. 24 indexed citations
5.
Shatnawi, Anas, et al.. (2021). Symptoms-Based Fuzzy-Logic Approach for COVID-19 Diagnosis. International Journal of Advanced Computer Science and Applications. 12(4). 17 indexed citations
6.
Husari, Ghaith, et al.. (2021). Machine learning predictive analytics for player movement prediction in NBA. Digital Commons - East Tennessee State University (East Tennessee State University). 2–8. 9 indexed citations
7.
Tashtoush, Yahya, et al.. (2021). Agile Approaches for Cybersecurity Systems, IoT and Intelligent Transportation. IEEE Access. 10. 1360–1375. 22 indexed citations
8.
Husari, Ghaith, et al.. (2021). A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. 1980–1987. 1 indexed citations
9.
Darwish, Omar, et al.. (2020). SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine Learning. IEEE Access. 9. 177–191. 16 indexed citations
10.
Husari, Ghaith, et al.. (2019). Learning APT chains from cyber threat intelligence. 1–2. 15 indexed citations
11.
Husari, Ghaith, Xi Niu, Bill Chu, & Ehab Al‐Shaer. (2018). Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. 1–6. 40 indexed citations
12.
Hong, Sanghyun, Tanmoy Chakraborty, Sungjin Ahn, Ghaith Husari, & Noseong Park. (2017). SENA. View. 76. 235–244. 1 indexed citations
13.
Al‐Shaer, Ehab, et al.. (2017). ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration. Journal of Network and Systems Management. 25(4). 759–783. 3 indexed citations
14.
Husari, Ghaith, Ehab Al‐Shaer, Mohiuddin Ahmed, Bill Chu, & Xi Niu. (2017). TTPDrill. 103–115. 121 indexed citations
15.
Al‐Ayyoub, Mahmoud, Ghaith Husari, & Wail Mardini. (2016). Improving Vertical Handoffs Using Mobility Prediction. International Journal of Advanced Computer Science and Applications. 7(3). 5 indexed citations
16.
Mohsin, Mujahid, Zahid Anwar, Ghaith Husari, Ehab Al‐Shaer, & Mohammad Ashiqur Rahman. (2016). IoTSAT: A formal framework for security analysis of the internet of things (IoT). 180–188. 54 indexed citations
17.
Husari, Ghaith, et al.. (2016). Optimizing the RoI of cyber risk mitigation. 223–227. 2 indexed citations
18.
Husari, Ghaith, et al.. (2015). Towards improving channel switching in cognitive radio networks. 280–285. 3 indexed citations
19.
Al‐Ayyoub, Mahmoud, et al.. (2012). Machine learning approach for brain tumor detection. 1–4. 31 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026