James Cannady

946 total citations
27 papers, 612 citations indexed

About

James Cannady is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, James Cannady has authored 27 papers receiving a total of 612 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Computer Networks and Communications, 15 papers in Artificial Intelligence and 12 papers in Signal Processing. Recurrent topics in James Cannady's work include Network Security and Intrusion Detection (17 papers), Advanced Malware Detection Techniques (12 papers) and Anomaly Detection Techniques and Applications (10 papers). James Cannady is often cited by papers focused on Network Security and Intrusion Detection (17 papers), Advanced Malware Detection Techniques (12 papers) and Anomaly Detection Techniques and Applications (10 papers). James Cannady collaborates with scholars based in United States. James Cannady's co-authors include Jeff Heaton, Charles Y.C. Pak, Mayukh Dass, Walter D. Potter and Matthew N. O. Sadiku and has published in prestigious journals such as Journal of Computer Security, Computer Law & Security Report and arXiv (Cornell University).

In The Last Decade

James Cannady

27 papers receiving 519 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
James Cannady United States 10 468 392 252 88 65 27 612
Wathiq Laftah Al-Yaseen Iraq 10 493 1.1× 430 1.1× 224 0.9× 66 0.8× 42 0.6× 19 633
Jiong Zhang United States 7 528 1.1× 464 1.2× 229 0.9× 132 1.5× 18 0.3× 17 664
Mahdi Abadi Iran 16 429 0.9× 465 1.2× 373 1.5× 187 2.1× 30 0.5× 50 744
Hadeel Alazzam Jordan 10 392 0.8× 331 0.8× 215 0.9× 90 1.0× 22 0.3× 26 515
Carlos García Garino Argentina 12 510 1.1× 278 0.7× 146 0.6× 267 3.0× 24 0.4× 53 657
Yuyang Zhou China 11 637 1.4× 467 1.2× 344 1.4× 103 1.2× 12 0.2× 20 734
Youngsoo Kim South Korea 13 377 0.8× 180 0.5× 194 0.8× 109 1.2× 16 0.2× 41 500
Hamed HaddadPajouh Canada 7 545 1.2× 306 0.8× 401 1.6× 228 2.6× 14 0.2× 10 714
Zhihan Li China 7 359 0.8× 404 1.0× 186 0.7× 39 0.4× 13 0.2× 11 517
Basil AsSadhan Saudi Arabia 14 317 0.7× 284 0.7× 173 0.7× 99 1.1× 7 0.1× 34 451

Countries citing papers authored by James Cannady

Since Specialization
Citations

This map shows the geographic impact of James Cannady's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by James Cannady with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites James Cannady more than expected).

Fields of papers citing papers by James Cannady

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by James Cannady. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by James Cannady. The network helps show where James Cannady may publish in the future.

Co-authorship network of co-authors of James Cannady

This figure shows the co-authorship network connecting the top 25 collaborators of James Cannady. A scholar is included among the top collaborators of James Cannady based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with James Cannady. James Cannady is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Cannady, James, et al.. (2019). Cyber Situation Awareness with Active Learning for Intrusion Detection. arXiv (Cornell University). 52. 1–7. 1 indexed citations
2.
Heaton, Jeff, et al.. (2017). Deep learning for prioritizing and responding to intrusion detection alerts. 1–5. 32 indexed citations
3.
Heaton, Jeff, et al.. (2017). Early stabilizing feature importance for TensorFlow deep neural networks. 4618–4624. 30 indexed citations
4.
Cannady, James, et al.. (2017). The promise of machine learning in cybersecurity. 1–6. 52 indexed citations
5.
Cannady, James, et al.. (2016). The user attribution problem and the challenge of persistent surveillance of user activity in complex networks. Journal of Computer Security. 24(2). 235–288. 1 indexed citations
6.
Cannady, James, et al.. (2016). Enhanced detection of advanced malicious software. 1–6. 3 indexed citations
7.
Cannady, James, et al.. (2012). Minimal dataset for Network Intrusion Detection Systems via MID-PCA: A hybrid approach. NSUWorks (Nova Southeastern University). 453–460. 7 indexed citations
8.
Cannady, James. (2011). An adaptive neural swarm approach for intrusion defense in ad hoc networks. Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE. 8059. 80590P–80590P. 2 indexed citations
9.
Cannady, James. (2010). Dynamic Neural Networks In The Detection Of Distributed Attacks In Mobile Ad-Hoc Networks. Zenodo (CERN European Organization for Nuclear Research). 1 indexed citations
10.
Pak, Charles Y.C. & James Cannady. (2009). Asset priority risk assessment using hidden markov models. NSUWorks (Nova Southeastern University). 65–73. 9 indexed citations
11.
Cannady, James, et al.. (2005). Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report. 21(2). 119–127. 11 indexed citations
12.
Cannady, James, et al.. (2005). A self-adaptive evolutionary negative selection approach for anomaly detection. 3 indexed citations
13.
Cannady, James, et al.. (2005). Develop a Composite Risk Score to Detect Anomaly Intrusion. 445–449. 3 indexed citations
14.
Cannady, James, et al.. (2004). A self-adaptive negative selection approach for anomaly detection. 1561–1568 Vol.2. 18 indexed citations
15.
Cannady, James, et al.. (2004). An Automated Approach in Reverse Engineering Java Applications Using Petri Nets. 90–96. 1 indexed citations
16.
Cannady, James, et al.. (2004). A Review of Adaptive Neural Networks. 38–47. 11 indexed citations
17.
Dass, Mayukh, James Cannady, & Walter D. Potter. (2003). LIDS: Learning Intrusion Detection System. 12–16. 7 indexed citations
18.
Sadiku, Matthew N. O., et al.. (2003). WAID: wavelet analysis intrusion detection. 3. III–688. 5 indexed citations
19.
Cannady, James, et al.. (2002). Detecting anomalous behavior: optimization of network traffic parameters via an evolution strategy. NSUWorks (Nova Southeastern University). 34–39. 2 indexed citations
20.
Cannady, James, et al.. (2000). Multiple Self-Organizing Maps for Intrusion Detection. NSUWorks (Nova Southeastern University). 86 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026