Johari Abdullah

2.0k total citations · 1 hit paper
38 papers, 1.3k citations indexed

About

Johari Abdullah is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Johari Abdullah has authored 38 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Computer Networks and Communications, 15 papers in Information Systems and 15 papers in Artificial Intelligence. Recurrent topics in Johari Abdullah's work include Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (6 papers) and Spam and Phishing Detection (5 papers). Johari Abdullah is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (6 papers) and Spam and Phishing Detection (5 papers). Johari Abdullah collaborates with scholars based in Malaysia, Saudi Arabia and United Kingdom. Johari Abdullah's co-authors include Adnan Shahid Khan, Zeeshan Ahmad, Farhan Ahmad, Cheah Wai Shiang, Yasir Javed, Syahrul Nizam Junaini, Kang Leng Chiew, Choon Lin Tan, San Nah Sze and Kelvin S. C. Yong and has published in prestigious journals such as IEEE Access, Sensors and Sustainability.

In The Last Decade

Johari Abdullah

35 papers receiving 1.2k citations

Hit Papers

Network intrusion detection system: A systematic study of... 2020 2026 2022 2024 2020 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Johari Abdullah Malaysia 15 919 672 501 356 126 38 1.3k
Aikaterini Mitrokotsa Sweden 15 1.0k 1.1× 573 0.9× 399 0.8× 407 1.1× 181 1.4× 61 1.3k
Naeem Syed Australia 11 768 0.8× 527 0.8× 423 0.8× 293 0.8× 84 0.7× 26 1.0k
Leonardo Aniello Italy 14 984 1.1× 437 0.7× 442 0.9× 1.0k 2.9× 118 0.9× 39 1.4k
Divyansh Jain India 4 650 0.7× 254 0.4× 285 0.6× 388 1.1× 148 1.2× 12 945
Ulf Lindqvist United States 15 784 0.9× 430 0.6× 437 0.9× 372 1.0× 106 0.8× 55 1.1k
Azizol Abdullah Malaysia 17 829 0.9× 293 0.4× 220 0.4× 417 1.2× 190 1.5× 132 1.1k
Pranav Goyal United States 2 636 0.7× 246 0.4× 272 0.5× 389 1.1× 148 1.2× 4 904
Baojiang Cui China 17 518 0.6× 496 0.7× 424 0.8× 566 1.6× 71 0.6× 109 1.1k
Aakanksha Tewari India 10 577 0.6× 257 0.4× 250 0.5× 546 1.5× 96 0.8× 21 938

Countries citing papers authored by Johari Abdullah

Since Specialization
Citations

This map shows the geographic impact of Johari Abdullah's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Johari Abdullah with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Johari Abdullah more than expected).

Fields of papers citing papers by Johari Abdullah

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Johari Abdullah. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Johari Abdullah. The network helps show where Johari Abdullah may publish in the future.

Co-authorship network of co-authors of Johari Abdullah

This figure shows the co-authorship network connecting the top 25 collaborators of Johari Abdullah. A scholar is included among the top collaborators of Johari Abdullah based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Johari Abdullah. Johari Abdullah is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khan, Adnan Shahid, et al.. (2024). TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network. International Journal of Network Management. 34(3). 7 indexed citations
3.
Khan, Adnan Shahid, et al.. (2023). Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network. IEEE Access. 11. 20524–20541. 19 indexed citations
4.
Khan, Adnan Shahid, et al.. (2022). Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review. Applied Sciences. 12(7). 3551–3551. 18 indexed citations
5.
Khan, Adnan Shahid, et al.. (2022). Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks. IEEE Access. 10. 31273–31288. 21 indexed citations
6.
Abdullah, Johari, et al.. (2022). Factors Affecting E-Wallet Usage in Sarawak. 1–7. 4 indexed citations
7.
Khan, Adnan Shahid, Zeeshan Ahmad, Johari Abdullah, & Farhan Ahmad. (2021). A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network. IEEE Access. 9. 87079–87093. 58 indexed citations
8.
Khan, Adnan Shahid, et al.. (2021). Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS). Journal of Ambient Intelligence and Humanized Computing. 17 indexed citations
9.
Khan, Adnan Shahid, et al.. (2021). A comprehensive study on DNA based Security scheme Using Deep Learning in Healthcare. EDPACS. 66(3). 1–17. 10 indexed citations
10.
Iskandar, D. N. F. Awang, A. A. Zijlstra, Iain McDonald, et al.. (2020). Classification of Planetary Nebulae through Deep Transfer Learning. Unimas Institutional Repository (Universiti Malaysia Sarawak). 2 indexed citations
11.
Ahmad, Zeeshan, Adnan Shahid Khan, Cheah Wai Shiang, Johari Abdullah, & Farhan Ahmad. (2020). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies. 32(1). 695 indexed citations breakdown →
12.
Khan, Adnan Shahid, et al.. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors. 19(22). 4954–4954. 84 indexed citations
13.
Chiew, Kang Leng, et al.. (2018). Building Standard Offline Anti-phishing Dataset for Benchmarking. International Journal of Engineering & Technology. 7(4.31). 7–14. 15 indexed citations
14.
Abdullah, Johari, et al.. (2017). Hierarchical Density-based Clustering of Malware Behaviour. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 159–164. 5 indexed citations
15.
Ibrahim, Dayang Hanani Abang, et al.. (2017). Achieving Reproducibility Incorporating Service Versioning into Provenance Model. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 131–138. 1 indexed citations
16.
Javed, Yasir, et al.. (2017). EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 99–105. 14 indexed citations
17.
Ibrahim, Dayang Hanani Abang, et al.. (2017). A Methodology for Implementation of Service Learning in Higher Education Institution: A case study from Faculty of Computer Science and Information Technology, UNIMAS. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 101–109. 8 indexed citations
18.
Khan, Adnan Shahid, et al.. (2017). Energy Efficient Resource Allocation and Utilization in Future Heterogeneous Cellular Network. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 107–110.
19.
Abdullah, Johari, et al.. (2015). Towards vulnerability prevention model for web browser using interceptor approach. Unimas Institutional Repository (Universiti Malaysia Sarawak). 1–5. 12 indexed citations
20.
Abdullah, Johari, et al.. (2014). Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones. Journal of Cyber Security and Mobility. 3(2). 89–132. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026