John Hale

1.1k total citations
66 papers, 617 citations indexed

About

John Hale is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, John Hale has authored 66 papers receiving a total of 617 indexed citations (citations by other indexed papers that have themselves been cited), including 33 papers in Computer Networks and Communications, 33 papers in Information Systems and 18 papers in Signal Processing. Recurrent topics in John Hale's work include Information and Cyber Security (24 papers), Network Security and Intrusion Detection (20 papers) and Advanced Malware Detection Techniques (14 papers). John Hale is often cited by papers focused on Information and Cyber Security (24 papers), Network Security and Intrusion Detection (20 papers) and Advanced Malware Detection Techniques (14 papers). John Hale collaborates with scholars based in United States, Malaysia and India. John Hale's co-authors include Sandip Sen, Sujeet Shenoi, Mauricio Papa, Arthur L. Corcoran, Michael Haney, R.S.H. Mah, Shankar Narasimhan, Ajit C. Tamhane, Stephen Tyree and Vijayalakshmi Atluri and has published in prestigious journals such as AIChE Journal, Patient Education and Counseling and Business Horizons.

In The Last Decade

John Hale

60 papers receiving 538 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
John Hale United States 12 265 230 218 124 101 66 617
Javam C. Machado Brazil 12 349 1.3× 233 1.0× 472 2.2× 70 0.6× 47 0.5× 122 765
Igor Saenko Russia 13 340 1.3× 160 0.7× 177 0.8× 79 0.6× 167 1.7× 94 534
Binbin Zhang China 14 161 0.6× 298 1.3× 249 1.1× 122 1.0× 27 0.3× 47 622
Luigi Coppolino Italy 16 382 1.4× 273 1.2× 387 1.8× 126 1.0× 107 1.1× 70 763
Francesco Moscato Italy 15 284 1.1× 187 0.8× 393 1.8× 73 0.6× 20 0.2× 48 632
Yasir Ali Pakistan 9 246 0.9× 87 0.4× 144 0.7× 70 0.6× 50 0.5× 41 429
Minghua Ma China 17 589 2.2× 381 1.7× 213 1.0× 123 1.0× 46 0.5× 52 868
Theo Härder Germany 15 821 3.1× 261 1.1× 282 1.3× 288 2.3× 27 0.3× 136 1.0k
Nesar Ahmad India 12 46 0.2× 264 1.1× 125 0.6× 58 0.5× 92 0.9× 48 588
Quang Do United States 15 184 0.7× 392 1.7× 253 1.2× 196 1.6× 17 0.2× 29 802

Countries citing papers authored by John Hale

Since Specialization
Citations

This map shows the geographic impact of John Hale's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by John Hale with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites John Hale more than expected).

Fields of papers citing papers by John Hale

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by John Hale. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by John Hale. The network helps show where John Hale may publish in the future.

Co-authorship network of co-authors of John Hale

This figure shows the co-authorship network connecting the top 25 collaborators of John Hale. A scholar is included among the top collaborators of John Hale based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with John Hale. John Hale is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hale, John, et al.. (2019). Practical Cyber-Security Solutions for the Science DMZ. 1–6. 2 indexed citations
2.
Li, Ming, et al.. (2019). Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster. 1–6. 2 indexed citations
3.
Shaw, Thomas, et al.. (2017). POSTER. 2575–2577.
4.
Shaw, Thomas, et al.. (2016). Scalable Attack Graph Generation. 1–4. 7 indexed citations
5.
Rickles, Nathaniel M., et al.. (2015). Medication adherence communications in community pharmacies: A naturalistic investigation. Patient Education and Counseling. 99(3). 386–392. 11 indexed citations
6.
Beyer, R. A., et al.. (2014). A Perceptual Taxonomy of Contextual Cues for Cyber Trust. 2(1). 10–10. 5 indexed citations
7.
Matlock, Matthew K., et al.. (2012). Systematic Redaction for Neuroimage Data. PubMed. 3(2). 63–75. 6 indexed citations
8.
Hale, John, et al.. (2012). Development of a System Framework for Implementation of an Enhanced Role-Based Access Control Model to Support Collaborative Processes.. 1 indexed citations
9.
Hale, John, et al.. (2011). Security Risks Associated with Radio Frequency Identification in Medical Environments. Journal of Medical Systems. 36(6). 3491–3505. 13 indexed citations
10.
Hale, John, et al.. (2011). Graceful privilege reduction in RFID security. 1–1. 1 indexed citations
11.
12.
Hale, John, et al.. (2010). The blunderdome: an offensive exercise for building network, systems, and web security awareness. 1–7. 5 indexed citations
13.
McMillan, Collin, et al.. (2009). Toward Robust and Extensible Automatic Protocol Identification.. International Conference on Internet Computing. 31(1). 104–108. 1 indexed citations
14.
Hale, John, et al.. (2007). Towards Redaction of Digital Information from Electronic Devices. Scholarly Commons (Embry–Riddle Aeronautical University). 197–203. 1 indexed citations
15.
Tyree, Stephen, et al.. (2007). Guiding Threat Analysis with Threat Source Models. 262–269. 3 indexed citations
16.
Atluri, Vijayalakshmi & John Hale. (2000). Research Advances in Database and Information Systems Security. IFIP advances in information and communication technology. 6 indexed citations
17.
Sen, Sandip, et al.. (1994). Learning to coordinate without sharing information. National Conference on Artificial Intelligence. 426–431. 192 indexed citations
18.
Hale, John, et al.. (1994). Analyzing inference in fuzzy database systems. 331–336 vol.1. 2 indexed citations
19.
Hale, John, et al.. (1994). A Practical Formalism for Imprecise Inference Control. 86(12). 139–156. 5 indexed citations
20.
Hale, John, et al.. (1981). Historical data recording for process computers. 25 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026