Karl Levitt

8.1k total citations · 2 hit papers
123 papers, 4.7k citations indexed

About

Karl Levitt is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Karl Levitt has authored 123 papers receiving a total of 4.7k indexed citations (citations by other indexed papers that have themselves been cited), including 74 papers in Computer Networks and Communications, 64 papers in Artificial Intelligence and 30 papers in Signal Processing. Recurrent topics in Karl Levitt's work include Network Security and Intrusion Detection (42 papers), Advanced Malware Detection Techniques (30 papers) and Security and Verification in Computing (23 papers). Karl Levitt is often cited by papers focused on Network Security and Intrusion Detection (42 papers), Advanced Malware Detection Techniques (30 papers) and Security and Verification in Computing (23 papers). Karl Levitt collaborates with scholars based in United States, United Kingdom and Taiwan. Karl Levitt's co-authors include Biswanath Mukherjee, L.T. Heberlein, B. Elspas, Calvin Ko, Jeff Rowe, Robert S. Boyer, Jack Goldberg, Manfred Ruschitzka, Gihan Dias and J. H. Wensley and has published in prestigious journals such as SHILAP Revista de lepidopterología, Proceedings of the IEEE and IEEE Transactions on Information Theory.

In The Last Decade

Karl Levitt

118 papers receiving 4.0k citations

Hit Papers

Network intrusion detection 1994 2026 2004 2015 1994 2015 200 400 600

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Karl Levitt 3.2k 1.9k 1.5k 1.1k 792 123 4.7k
Richard A. Kemmerer 3.1k 1.0× 2.4k 1.3× 1.8k 1.2× 1.4k 1.3× 584 0.7× 96 4.2k
Heejo Lee 2.8k 0.9× 1.6k 0.8× 1.2k 0.8× 1.0k 1.0× 422 0.5× 123 3.9k
A. Avižienis 3.1k 1.0× 1.3k 0.7× 304 0.2× 1.6k 1.5× 1.2k 1.5× 41 5.6k
Dongyan Xu 3.8k 1.2× 2.1k 1.1× 2.2k 1.4× 2.2k 2.1× 533 0.7× 200 5.4k
Mourad Debbabi 2.7k 0.9× 2.1k 1.1× 1.8k 1.2× 2.0k 1.8× 171 0.2× 304 5.2k
Ehab Al‐Shaer 3.5k 1.1× 1.7k 0.9× 861 0.6× 1.1k 1.0× 1.3k 1.6× 206 4.3k
Hovav Shacham 3.2k 1.0× 6.0k 3.1× 3.3k 2.2× 3.3k 3.1× 1.2k 1.5× 66 8.6k
Aditya P. Mathur 2.1k 0.7× 1.7k 0.9× 1.2k 0.8× 1.9k 1.8× 404 0.5× 160 5.0k
Frank Piessens 1.6k 0.5× 4.0k 2.1× 2.3k 1.5× 2.0k 1.8× 866 1.1× 250 5.1k
J.-C. Laprie 2.8k 0.9× 1.2k 0.6× 194 0.1× 1.5k 1.4× 1.1k 1.4× 35 5.4k

Countries citing papers authored by Karl Levitt

Since Specialization
Citations

This map shows the geographic impact of Karl Levitt's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Karl Levitt with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Karl Levitt more than expected).

Fields of papers citing papers by Karl Levitt

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Karl Levitt. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Karl Levitt. The network helps show where Karl Levitt may publish in the future.

Co-authorship network of co-authors of Karl Levitt

This figure shows the co-authorship network connecting the top 25 collaborators of Karl Levitt. A scholar is included among the top collaborators of Karl Levitt based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Karl Levitt. Karl Levitt is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Heberlein, L.T., et al.. (2017). Towards Detecting Intrusions in a Networked Environment. Molecular Plant. 17(5). 686–688. 2 indexed citations
2.
Levitt, Karl, et al.. (2016). Is Anybody Home? Inferring Activity From Smart Home Network Traffic. 245–251. 87 indexed citations
3.
Parsons, Simon, Katie Atkinson, Peter McBurney, et al.. (2014). Argument schemes for reasoning about trust. Research Portal (King's College London). 5(2-3). 160–190. 23 indexed citations
4.
Parsons, Simon, Elizabeth Sklar, Munindar P. Singh, Karl Levitt, & Jeff Rowe. (2013). An argumentation-based approach to handling trust in distributed decision making. Lincoln Repository (University of Lincoln). 2 indexed citations
5.
Perrig, Adrian, Karl Levitt, Cliff Wang, & Radha Poovendran. (2009). Securing Wireless Sensor Networks. Springer eBooks. 300–300. 1 indexed citations
6.
Irvine, Cynthia E. & Karl Levitt. (2007). Trusted hardware. Proceedings - ACM IEEE Design Automation Conference. 1–1. 18 indexed citations
7.
Balasubramanyam, P., et al.. (2003). A specification-based intrusion detection system for AODV. 125–134. 166 indexed citations
8.
Levitt, Karl, et al.. (2003). Immune System Model for Detecting Web Server Attacks.. 161–167. 2 indexed citations
9.
Ko, Calvin, et al.. (2002). Automated detection of vulnerabilities in privileged programs by execution monitoring. 134–144. 125 indexed citations
10.
11.
Zhang, Cui, et al.. (2002). Verification of a distributed computing system by layered proofs. 5. 252–261. 2 indexed citations
12.
Gertz, Michael, et al.. (1999). Misuse Detection in Database Systems Through User Profiling.. 4 indexed citations
13.
Dias, Gihan, et al.. (1997). DIDS (distributed intrusion detection system)—motivation, architecture, and an early prototype. 211–227. 239 indexed citations
14.
Levitt, Karl, et al.. (1996). NetKuang: a multi-host configuration vulnerability checker. USENIX Security Symposium. 20–20. 54 indexed citations
15.
Levitt, Karl, et al.. (1994). Towards a Property-Based Testing Environment With Applications to Security-Critical Software. Defense Technical Information Center (DTIC). 7 indexed citations
16.
Levitt, Karl, et al.. (1993). NMRES: An artificial intelligence expert system for quantification of cardiac metabolites from31phosphorus nuclear magnetic resonance spectroscopy. Annals of Biomedical Engineering. 21(3). 247–258. 1 indexed citations
17.
Goldberg, Jack, B. Elspas, William H. Kautz, & Karl Levitt. (1986). Survey of Fault Tolerant Computer Security and Computer Safety.. Defense Technical Information Center (DTIC). 1 indexed citations
18.
Neumann, Peter G., Richard J. Feiertag, Karl Levitt, & Lawrence Baylor Robinson. (1976). Software development and proofs of multi-level security. International Conference on Software Engineering. 421–428. 9 indexed citations
19.
Wensley, J. H., et al.. (1976). The design, analysis, and verification of the SIFT fault tolerant system. International Conference on Software Engineering. 458–469. 20 indexed citations
20.
Goldberg, Jacob L., et al.. (1967). LOGIC DESIGN TECHNIQUES FOR PROPAGATION LIMITED NETWORKS.. Defense Technical Information Center (DTIC). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026