Joshua Neil

919 total citations
17 papers, 440 citations indexed

About

Joshua Neil is a scholar working on Computer Networks and Communications, Artificial Intelligence and Statistical and Nonlinear Physics. According to data from OpenAlex, Joshua Neil has authored 17 papers receiving a total of 440 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Computer Networks and Communications, 11 papers in Artificial Intelligence and 6 papers in Statistical and Nonlinear Physics. Recurrent topics in Joshua Neil's work include Network Security and Intrusion Detection (13 papers), Anomaly Detection Techniques and Applications (7 papers) and Complex Network Analysis Techniques (6 papers). Joshua Neil is often cited by papers focused on Network Security and Intrusion Detection (13 papers), Anomaly Detection Techniques and Applications (7 papers) and Complex Network Analysis Techniques (6 papers). Joshua Neil collaborates with scholars based in United States and United Kingdom. Joshua Neil's co-authors include Curtis B. Storlie, Daniel Quist, Blake Anderson, Terran Lane, Mike Fisk, Lorie M. Liebrock, Alexander D. Kent, Joseph Sexton, Aric Hagberg and Jack W. Stokes and has published in prestigious journals such as Technometrics, Journal of Network and Computer Applications and Computers & Security.

In The Last Decade

Joshua Neil

15 papers receiving 416 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Joshua Neil United States 10 314 247 190 145 81 17 440
Yun Cui South Korea 9 549 1.7× 287 1.2× 264 1.4× 281 1.9× 27 0.3× 25 626
Bill Cheswick United States 6 330 1.1× 118 0.5× 163 0.9× 62 0.4× 55 0.7× 10 418
Kyle Ingols United States 7 486 1.5× 282 1.1× 49 0.3× 500 3.4× 39 0.5× 9 588
Gabriela Jacques-Silva United States 12 306 1.0× 67 0.3× 149 0.8× 142 1.0× 128 1.6× 21 450
Vincent H. Berk United States 11 333 1.1× 198 0.8× 286 1.5× 90 0.6× 29 0.4× 22 446
Ronald W. Ritchey United States 7 356 1.1× 225 0.9× 73 0.4× 339 2.3× 17 0.2× 10 443
Ellick Chan United States 10 160 0.5× 136 0.6× 211 1.1× 165 1.1× 12 0.1× 22 404
Shaoyin Cheng China 12 228 0.7× 244 1.0× 146 0.8× 174 1.2× 36 0.4× 36 443
Davide Ariu Italy 13 570 1.8× 516 2.1× 440 2.3× 262 1.8× 8 0.1× 19 763

Countries citing papers authored by Joshua Neil

Since Specialization
Citations

This map shows the geographic impact of Joshua Neil's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Joshua Neil with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Joshua Neil more than expected).

Fields of papers citing papers by Joshua Neil

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Joshua Neil. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Joshua Neil. The network helps show where Joshua Neil may publish in the future.

Co-authorship network of co-authors of Joshua Neil

This figure shows the co-authorship network connecting the top 25 collaborators of Joshua Neil. A scholar is included among the top collaborators of Joshua Neil based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Joshua Neil. Joshua Neil is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Neil, Joshua. (2023). Using new edges for anomaly detection in computer networks. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information).
2.
Neil, Joshua, et al.. (2021). Link prediction in dynamic networks using random dot product graphs. Data Mining and Knowledge Discovery. 35(5). 2168–2199. 5 indexed citations
3.
Lee, Wesley, et al.. (2021). Anomaly Detection in Large-Scale Networks With Latent Space Models. Technometrics. 64(2). 241–252. 10 indexed citations
4.
Huth, Michael, et al.. (2020). Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service. 181–194. 2 indexed citations
5.
Stokes, Jack W., et al.. (2019). Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback. 2872–2876. 21 indexed citations
6.
Wolpert, David H., et al.. (2016). A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks. Journal of Network and Computer Applications. 66. 166–179. 12 indexed citations
7.
Sexton, Joseph, Curtis B. Storlie, & Joshua Neil. (2015). Attack chain detection. Statistical Analysis and Data Mining The ASA Data Science Journal. 8(5-6). 353–363. 31 indexed citations
8.
Kent, Alexander D., Lorie M. Liebrock, & Joshua Neil. (2014). Authentication graphs: Analyzing user behavior within an enterprise network. Computers & Security. 48. 150–166. 38 indexed citations
9.
Hagberg, Aric, et al.. (2014). Connected Components and Credential Hopping in Authentication Graphs. 416–423. 12 indexed citations
10.
Neil, Joshua, et al.. (2013). Scan Statistics for the Online Detection of Locally Anomalous Subgraphs. Technometrics. 55(4). 403–414. 87 indexed citations
11.
Neil, Joshua, et al.. (2013). Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 218–224. 10 indexed citations
12.
Sexton, Joseph, Curtis B. Storlie, Joshua Neil, & Alexander D. Kent. (2013). Intruder detection based on graph structured hypothesis testing. 33. 86–91. 1 indexed citations
13.
Kent, Alexander D., Lorie M. Liebrock, & Joshua Neil. (2013). Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior. 25–36. 1 indexed citations
14.
Storlie, Curtis B. & Joshua Neil. (2011). Scan statistics for the online discovery of locally anomalous subgraphs. 4 indexed citations
15.
Anderson, Blake, Daniel Quist, Joshua Neil, Curtis B. Storlie, & Terran Lane. (2011). Graph-based malware detection using dynamic analysis. 7(4). 247–258. 196 indexed citations
16.
Quist, Daniel, Lorie M. Liebrock, & Joshua Neil. (2010). Improving antivirus accuracy with hypervisor assisted analysis. 7(2). 121–131. 9 indexed citations
17.
Fisk, Mike, et al.. (2002). Eliminating Steganography in Internet Traffic with Active Wardens. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026