H.A.M. Luiijf

1.3k total citations
47 papers, 442 citations indexed

About

H.A.M. Luiijf is a scholar working on Information Systems, Computer Networks and Communications and Civil and Structural Engineering. According to data from OpenAlex, H.A.M. Luiijf has authored 47 papers receiving a total of 442 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Information Systems, 16 papers in Computer Networks and Communications and 13 papers in Civil and Structural Engineering. Recurrent topics in H.A.M. Luiijf's work include Information and Cyber Security (23 papers), Network Security and Intrusion Detection (14 papers) and Infrastructure Resilience and Vulnerability Analysis (13 papers). H.A.M. Luiijf is often cited by papers focused on Information and Cyber Security (23 papers), Network Security and Intrusion Detection (14 papers) and Infrastructure Resilience and Vulnerability Analysis (13 papers). H.A.M. Luiijf collaborates with scholars based in Netherlands, United Kingdom and Italy. H.A.M. Luiijf's co-authors include M.H.A. Klaver, Michel van Eeten, Pieter Hartel, Erich Rome, Inga Žutautaitė, Erol Gelenbe, W. Steijn, Roberto Setola, Wojciech Burakowski and Józef Ober and has published in prestigious journals such as Public Administration, Lecture notes in computer science and International Journal of Critical Infrastructure Protection.

In The Last Decade

H.A.M. Luiijf

42 papers receiving 383 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
H.A.M. Luiijf Netherlands 10 161 139 107 100 90 47 442
Santiago Oliveros United Kingdom 7 68 0.4× 123 0.9× 42 0.4× 141 1.4× 42 0.5× 8 347
José J. González Norway 12 77 0.5× 43 0.3× 47 0.4× 62 0.6× 10 0.1× 44 298
Audrey Dorofee United States 10 330 2.0× 12 0.1× 140 1.3× 38 0.4× 15 0.2× 23 435
Arash Negahdari Kia Ireland 8 117 0.7× 20 0.1× 64 0.6× 21 0.2× 12 0.1× 12 280
Richard A. Caralli United States 8 175 1.1× 18 0.1× 55 0.5× 28 0.3× 14 0.2× 11 319
Bilge Karabacak Türkiye 6 210 1.3× 11 0.1× 99 0.9× 30 0.3× 22 0.2× 13 278
Dennis Smith United States 10 216 1.3× 27 0.2× 100 0.9× 62 0.6× 41 0.5× 34 362
Evangelos Kiountouzis Greece 11 502 3.1× 8 0.1× 216 2.0× 133 1.3× 24 0.3× 20 628
Ranjan Pal United States 11 214 1.3× 10 0.1× 174 1.6× 35 0.3× 9 0.1× 42 427

Countries citing papers authored by H.A.M. Luiijf

Since Specialization
Citations

This map shows the geographic impact of H.A.M. Luiijf's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by H.A.M. Luiijf with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites H.A.M. Luiijf more than expected).

Fields of papers citing papers by H.A.M. Luiijf

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by H.A.M. Luiijf. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by H.A.M. Luiijf. The network helps show where H.A.M. Luiijf may publish in the future.

Co-authorship network of co-authors of H.A.M. Luiijf

This figure shows the co-authorship network connecting the top 25 collaborators of H.A.M. Luiijf. A scholar is included among the top collaborators of H.A.M. Luiijf based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with H.A.M. Luiijf. H.A.M. Luiijf is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Luiijf, H.A.M., et al.. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructures. 9(1/2). 3–3. 59 indexed citations
2.
Luiijf, H.A.M.. (2013). Why are we so unconsciously insecure?. International Journal of Critical Infrastructure Protection. 6(3-4). 179–181. 2 indexed citations
3.
Luiijf, H.A.M.. (2013). Expand the Crisis? Neglect Critical Infrastructure! Insufficient situational awareness about Critical Infrastructure by Emergency Management – Insights and Recommendations. TNO Repository. 293. 2 indexed citations
4.
Luiijf, H.A.M. & Pieter Hartel. (2013). Critical Information Infrastructures Security. Lecture notes in computer science. 25 indexed citations
5.
Luiijf, H.A.M.. (2012). Threat Analysis : Work Package 1.2 - Expert Group on the security and resilience of Communication networks and Information systems for Smart Grids. TNO Repository. 1 indexed citations
6.
Luiijf, H.A.M., et al.. (2011). Assessing and improving SCADA security in the Dutch drinking water sector. International Journal of Critical Infrastructure Protection. 4(3-4). 124–134. 15 indexed citations
7.
Klaver, M.H.A., et al.. (2011). RECIPE : Good practices manual for CIP policies, for policy makers in Europe. Repository hosted by TU Delft Library (TU Delft). 6 indexed citations
8.
Luiijf, H.A.M., et al.. (2010). Canvassing the Cyber Security Landscape: Why Energy Companies Need to Pay Attention. TNO Repository. 1. 3 indexed citations
9.
Luiijf, H.A.M., et al.. (2010). An international tabletop exercise on critical infrastructure protection: the lessons identified. International Journal of Critical Infrastructures. 6(3). 293–293. 2 indexed citations
10.
Luiijf, H.A.M., et al.. (2010). Empirical findings on European critical infrastructure dependencies. International Journal of System of Systems Engineering. 2(1). 3–3. 17 indexed citations
11.
Rome, Erich, et al.. (2009). DIESIS: an interoperable European federated simulation network for critical infrastructures. TNO Repository. 139–146. 9 indexed citations
12.
Luiijf, H.A.M., et al.. (2008). Critical infrastructure dependencies 1-0-1. 1–3. 3 indexed citations
13.
Luiijf, H.A.M., et al.. (2008). R&D activities in Europe on critical information infrastructure protection. International Journal of System of Systems Engineering. 1(1/2). 257–257. 1 indexed citations
14.
Luiijf, H.A.M.. (2008). SCADA Security Good Practices for the Drinking Water Sector. TNO Repository. 9 indexed citations
15.
Luiijf, H.A.M.. (2006). Vital Infrastructure Threats and Assurance (VITA) project. TNO Repository. 2(2). 6. 1 indexed citations
16.
Luiijf, H.A.M. & M.H.A. Klaver. (2005). Protecting a nation's critical infrastructure: the first steps. 2. 1185–1190. 13 indexed citations
17.
Luiijf, H.A.M., et al.. (2002). Intrusion detection: introduction and generics. TNO Repository. 1 indexed citations
18.
Luiijf, H.A.M.. (2000). Information Assurance Under Fire. TNO Repository.
19.
Luiijf, H.A.M., et al.. (1999). Is more necessarily better? : advantages and disadvantages of the explosion of information technologies for political and military preparedness. Data Archiving and Networked Services (DANS). 1999. 259–274. 1 indexed citations
20.
Luiijf, H.A.M.. (1999). Information Assurance and the Information Society. TNO Repository. 1.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026