Karen Scarfone

9.3k total citations · 1 hit paper
56 papers, 1.1k citations indexed

About

Karen Scarfone is a scholar working on Information Systems, Computer Networks and Communications and Sociology and Political Science. According to data from OpenAlex, Karen Scarfone has authored 56 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 17 papers in Computer Networks and Communications and 9 papers in Sociology and Political Science. Recurrent topics in Karen Scarfone's work include Information and Cyber Security (11 papers), Access Control and Trust (7 papers) and Network Security and Intrusion Detection (6 papers). Karen Scarfone is often cited by papers focused on Information and Cyber Security (11 papers), Access Control and Trust (7 papers) and Network Security and Intrusion Detection (6 papers). Karen Scarfone collaborates with scholars based in United States and Egypt. Karen Scarfone's co-authors include Peter Mell, Sasha Romanosky, Murugiah Souppaya, Timothy Grance, Christopher S. Johnson, Vincent C. Hu, Sheila E. Frankel, Lily Chen, Tim Grance and Paul Hoffman and has published in prestigious journals such as IEEE Security & Privacy, Computer Standards & Interfaces and IEEE Cloud Computing.

In The Last Decade

Karen Scarfone

53 papers receiving 954 citations

Hit Papers

Common Vulnerability Scor... 2006 2026 2012 2019 2006 100 200 300 400

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Karen Scarfone United States 12 730 631 329 224 134 56 1.1k
Anoop Singhal United States 19 977 1.3× 1.0k 1.6× 563 1.7× 244 1.1× 152 1.1× 77 1.4k
Makan Pourzandi Canada 15 614 0.8× 616 1.0× 172 0.5× 380 1.7× 144 1.1× 86 1.1k
Pratyusa K. Manadhata United States 9 498 0.7× 503 0.8× 289 0.9× 293 1.3× 53 0.4× 16 867
Umberto Villano Italy 18 688 0.9× 717 1.1× 252 0.8× 352 1.6× 58 0.4× 119 1.1k
Daniele Sgandurra Italy 12 589 0.8× 720 1.1× 703 2.1× 288 1.3× 34 0.3× 50 1.1k
Rayford B. Vaughn United States 18 440 0.6× 536 0.8× 265 0.8× 338 1.5× 213 1.6× 66 914
Guangdong Bai Australia 17 470 0.6× 305 0.5× 312 0.9× 444 2.0× 200 1.5× 103 1.0k
Sandro Etalle Netherlands 19 368 0.5× 576 0.9× 221 0.7× 534 2.4× 101 0.8× 122 1.1k
Habtamu Abie Norway 16 392 0.5× 393 0.6× 193 0.6× 168 0.8× 54 0.4× 50 706
Miles McQueen United States 11 574 0.8× 678 1.1× 318 1.0× 176 0.8× 499 3.7× 27 1.1k

Countries citing papers authored by Karen Scarfone

Since Specialization
Citations

This map shows the geographic impact of Karen Scarfone's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Karen Scarfone with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Karen Scarfone more than expected).

Fields of papers citing papers by Karen Scarfone

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Karen Scarfone. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Karen Scarfone. The network helps show where Karen Scarfone may publish in the future.

Co-authorship network of co-authors of Karen Scarfone

This figure shows the co-authorship network connecting the top 25 collaborators of Karen Scarfone. A scholar is included among the top collaborators of Karen Scarfone based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Karen Scarfone. Karen Scarfone is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Scarfone, Karen, et al.. (2020). Security for Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Solutions. 3 indexed citations
2.
Chen, Lily, et al.. (2017). Guide to Bluetooth Security [Revision 2]. 2 indexed citations
3.
Souppaya, Murugiah & Karen Scarfone. (2016). Guide to Data-Centric System Threat Modeling. 9 indexed citations
4.
Souppaya, Murugiah, et al.. (2015). Stopping Malware and Unauthorized Software through Application Whitelisting | NIST.
5.
Hu, Vincent C. & Karen Scarfone. (2013). Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit. 10. 494–501. 4 indexed citations
6.
Scarfone, Karen & Murugiah Souppaya. (2012). Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. 1 indexed citations
7.
Waltermire, David, et al.. (2011). SP 800-126 Rev. 2. The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2. 9 indexed citations
8.
Quinn, Stephen, et al.. (2011). SP 800-70 Rev. 2. National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. 6 indexed citations
9.
Scarfone, Karen & Paul Hoffman. (2009). SP 800-41 Rev. 1. Guidelines on Firewalls and Firewall Policy. 43(1-2). 30–4.
10.
Scarfone, Karen & Peter Mell. (2009). An analysis of CVSS version 2 vulnerability scoring. 516–525. 111 indexed citations
11.
Scarfone, Karen. (2009). Security for Enterprise Telework and Remote Access Solutions. 2 indexed citations
12.
Hu, Vincent C., et al.. (2008). Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF). 497–502. 1 indexed citations
13.
Scarfone, Karen, et al.. (2008). SP 800-61 Rev. 1. Computer Security Incident Handling Guide. 6 indexed citations
14.
Mehta, Ketan, et al.. (2008). SP 800-116. A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS). 2 indexed citations
15.
Scarfone, Karen, et al.. (2008). Computer Security Incident Handling Guide | NIST. 1 indexed citations
16.
Scarfone, Karen, et al.. (2007). SP 800-111. Guide to Storage Encryption Technologies for End User Devices. Case Reports in Orthopedics. 2016. 2718421–2718421. 8 indexed citations
17.
Scarfone, Karen & Peter Mell. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and Technology. 75 indexed citations
18.
Souppaya, Murugiah & Karen Scarfone. (2006). Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology [Draft April 2006]. 5 indexed citations
19.
Grance, Tim, et al.. (2005). Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response. 8 indexed citations
20.
Mell, Peter, et al.. (2005). Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026