Heba K. Aslan

618 total citations
54 papers, 358 citations indexed

About

Heba K. Aslan is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Heba K. Aslan has authored 54 papers receiving a total of 358 indexed citations (citations by other indexed papers that have themselves been cited), including 31 papers in Computer Networks and Communications, 30 papers in Artificial Intelligence and 17 papers in Information Systems. Recurrent topics in Heba K. Aslan's work include Advanced Authentication Protocols Security (13 papers), Cryptography and Data Security (13 papers) and Network Security and Intrusion Detection (9 papers). Heba K. Aslan is often cited by papers focused on Advanced Authentication Protocols Security (13 papers), Cryptography and Data Security (13 papers) and Network Security and Intrusion Detection (9 papers). Heba K. Aslan collaborates with scholars based in Egypt, Saudi Arabia and Ireland. Heba K. Aslan's co-authors include Marianne A. Azer, Anca Delia Jurcut, Mahmoud Said Elsayed, Mohamed M. Dessouky, Osama S. Faragallah, Fathi E. Abd El‐Samie, Heba A. Elnemr, Ghada M. El‐Banby, Ashraf A. M. Khalaf and Ahmed Sedik and has published in prestigious journals such as Neural Computing and Applications, Computers & Security and Multimedia Tools and Applications.

In The Last Decade

Heba K. Aslan

46 papers receiving 319 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Heba K. Aslan Egypt 10 167 111 105 82 73 54 358
Tanmoy Kanti Das India 10 126 0.8× 96 0.9× 97 0.9× 33 0.4× 61 0.8× 31 299
Rajesh Prasad India 12 183 1.1× 84 0.8× 165 1.6× 79 1.0× 88 1.2× 52 434
Oleg Evsutin Russia 12 73 0.4× 233 2.1× 48 0.5× 77 0.9× 29 0.4× 41 384
Jihoon Lee South Korea 12 362 2.2× 57 0.5× 35 0.3× 61 0.7× 112 1.5× 42 456
Keecheon Kim South Korea 11 293 1.8× 179 1.6× 121 1.2× 38 0.5× 108 1.5× 50 522
Ab Al-Hadi Ab Rahman Malaysia 9 81 0.5× 106 1.0× 55 0.5× 15 0.2× 86 1.2× 53 279
Deeraj Nagothu United States 9 55 0.3× 133 1.2× 50 0.5× 66 0.8× 29 0.4× 26 228
Dian Rachmawati Indonesia 8 39 0.2× 112 1.0× 149 1.4× 112 1.4× 22 0.3× 65 298
Seyed Yahya Nikouei United States 12 140 0.8× 173 1.6× 101 1.0× 126 1.5× 43 0.6× 17 366

Countries citing papers authored by Heba K. Aslan

Since Specialization
Citations

This map shows the geographic impact of Heba K. Aslan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Heba K. Aslan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Heba K. Aslan more than expected).

Fields of papers citing papers by Heba K. Aslan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Heba K. Aslan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Heba K. Aslan. The network helps show where Heba K. Aslan may publish in the future.

Co-authorship network of co-authors of Heba K. Aslan

This figure shows the co-authorship network connecting the top 25 collaborators of Heba K. Aslan. A scholar is included among the top collaborators of Heba K. Aslan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Heba K. Aslan. Heba K. Aslan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Aslan, Heba K., et al.. (2024). Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. Cryptography. 8(1). 4–4. 1 indexed citations
3.
Aslan, Heba K., et al.. (2024). Advanced Phishing Detection in Ethereum Blockchain Transactions Using Machine Learning Models. 331–336. 1 indexed citations
4.
Abdelbaki, Nashwa, et al.. (2024). A Survey on the Integration of Cyber Threat Feeds and Blockchain Technology. International Journal of Safety and Security Engineering. 14(5). 1357–1369.
5.
Aslan, Heba K., et al.. (2023). Lightweight Computational Complexity Stepping Up the NTRU Post-Quantum Algorithm Using Parallel Computing. Symmetry. 16(1). 12–12. 2 indexed citations
6.
El-Rashidy, Mohamed A., et al.. (2023). New weighted BERT features and multi-CNN models to enhance the performance of MOOC posts classification. Neural Computing and Applications. 35(24). 18019–18033. 7 indexed citations
7.
Aslan, Heba K., et al.. (2023). A Survey on Parameters Affecting MANET Performance. Electronics. 12(9). 1956–1956. 17 indexed citations
8.
Aslan, Heba K., et al.. (2023). Networking and cryptography library with a non-repudiation flavor for blockchain. Journal of Computer Virology and Hacking Techniques. 20(1). 1–14. 1 indexed citations
10.
Aslan, Heba K., et al.. (2023). Smart Automotive Diagnostic and Performance Analysis Using Blockchain Technology. Journal of Sensor and Actuator Networks. 12(2). 32–32. 5 indexed citations
11.
Aslan, Heba K., et al.. (2023). Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques. Electronics. 12(3). 573–573. 19 indexed citations
12.
Aslan, Heba K., et al.. (2022). An IoT Privacy-Oriented selective disclosure credential system. 8(1). 2 indexed citations
13.
Aslan, Heba K., et al.. (2022). Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things. Computers & Security. 119. 102753–102753. 3 indexed citations
15.
Aslan, Heba K., et al.. (2018). New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism.. Int. J. Netw. Secur.. 20. 371–380.
16.
ElSayed, Hany M., et al.. (2017). Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm. Journal of Advanced Research. 12. 67–78. 2 indexed citations
17.
Aslan, Heba K., et al.. (2013). Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol.. International journal of network security. 15. 80–96. 1 indexed citations
18.
Aslan, Heba K., et al.. (2011). New Real Time Multicast Authentication Protocol.. International journal of network security. 12. 13–20. 9 indexed citations
19.
Aslan, Heba K., et al.. (2009). A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach. International journal of network security. 8. 75–89. 9 indexed citations
20.
Aslan, Heba K., et al.. (2002). Implementation of a hybrid encryption scheme for Ethernet. 150–156. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026