Louise Leenen

701 total citations
42 papers, 307 citations indexed

About

Louise Leenen is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Louise Leenen has authored 42 papers receiving a total of 307 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Information Systems, 15 papers in Computer Networks and Communications and 11 papers in Signal Processing. Recurrent topics in Louise Leenen's work include Information and Cyber Security (17 papers), Network Security and Intrusion Detection (10 papers) and Advanced Malware Detection Techniques (9 papers). Louise Leenen is often cited by papers focused on Information and Cyber Security (17 papers), Network Security and Intrusion Detection (10 papers) and Advanced Malware Detection Techniques (9 papers). Louise Leenen collaborates with scholars based in South Africa, Canada and Australia. Louise Leenen's co-authors include Francois Mouton, Hein S. Venter, Thomas Meyer, Barry Irwin, Johannes Heidema, Aditya Ghose, Charles Ess, David Kreps, Kai K. Kimppa and Mariki M. Eloff and has published in prestigious journals such as Computers & Security, Information Processing Letters and Journal of Philosophical Logic.

In The Last Decade

Louise Leenen

34 papers receiving 288 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Louise Leenen South Africa 8 214 119 93 52 47 42 307
Ali Abdallah United Kingdom 8 275 1.3× 134 1.1× 204 2.2× 90 1.7× 52 1.1× 25 411
Daniel Ragsdale United States 10 206 1.0× 98 0.8× 148 1.6× 77 1.5× 38 0.8× 18 331
Wiem Tounsi France 4 217 1.0× 140 1.2× 158 1.7× 55 1.1× 20 0.4× 6 300
Howard Chivers United Kingdom 12 216 1.0× 117 1.0× 122 1.3× 93 1.8× 37 0.8× 31 328
Cyril Onwubiko United Kingdom 11 169 0.8× 53 0.4× 142 1.5× 50 1.0× 15 0.3× 28 260
Thomas Zefferer Austria 7 115 0.5× 40 0.3× 103 1.1× 64 1.2× 40 0.9× 44 205
Sadaf Hina Malaysia 9 161 0.8× 58 0.5× 108 1.2× 50 1.0× 35 0.7× 22 268
Stuart McClure 7 175 0.8× 128 1.1× 190 2.0× 119 2.3× 34 0.7× 13 353
Ron Ruhl Canada 12 286 1.3× 166 1.4× 155 1.7× 114 2.2× 31 0.7× 52 392
Rodrigo Werlinger Canada 8 363 1.7× 83 0.7× 162 1.7× 45 0.9× 80 1.7× 14 416

Countries citing papers authored by Louise Leenen

Since Specialization
Citations

This map shows the geographic impact of Louise Leenen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Louise Leenen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Louise Leenen more than expected).

Fields of papers citing papers by Louise Leenen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Louise Leenen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Louise Leenen. The network helps show where Louise Leenen may publish in the future.

Co-authorship network of co-authors of Louise Leenen

This figure shows the co-authorship network connecting the top 25 collaborators of Louise Leenen. A scholar is included among the top collaborators of Louise Leenen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Louise Leenen. Louise Leenen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Leenen, Louise, et al.. (2025). Analysis of a Cryptocurrency Investment Scam: Pig Butchering. 24(1). 61–70.
2.
Leenen, Louise, et al.. (2024). Cryptocurrency-crime Investigation: Fraudulent use of Bitcoin in a Divorce Case. 19(1). 34–42. 1 indexed citations
4.
Leenen, Louise, et al.. (2023). An Analysis of Crypto Scams during the Covid-19 Pandemic: 2020-2022. 18(1). 36–48. 4 indexed citations
5.
Leenen, Louise, et al.. (2023). An Analysis of the MTI Crypto Investment Scam: User Case. 22(1). 89–99. 1 indexed citations
6.
Leenen, Louise, et al.. (2023). Security Issues in Cyber Threat Intelligence Exchange: A Review. Lecture notes in networks and systems. 1308–1319. 1 indexed citations
8.
Leenen, Louise, et al.. (2022). An Ontological Model for a National Cyber-attack Response in South Africa. 21(1). 130–149. 1 indexed citations
9.
Ajayi, Olasupo, et al.. (2021). A Workflow System for Managing Ethical Clearance in Research Work. 1 indexed citations
10.
Leenen, Louise, et al.. (2020). An Ontology for the South African Protection of Personal Information Act. UWC Research Repository (University of the Western Cape). 1 indexed citations
11.
Leenen, Louise, et al.. (2018). A model for measuring perceived cyberpower.
12.
Mouton, Francois, Louise Leenen, & Hein S. Venter. (2016). Social engineering attack examples, templates and scenarios. Computers & Security. 59. 186–209. 107 indexed citations
13.
Leenen, Louise & Thomas Meyer. (2016). Semantic Technologies and Big Data Analytics for Cyber Defence. RePEc: Research Papers in Economics. 6(3). 53–64. 3 indexed citations
14.
Leenen, Louise, et al.. (2015). An ontological knowledge base for cyber network attack planning.
15.
Mouton, Francois, et al.. (2014). Social engineering attack framework. 1–9. 61 indexed citations
16.
Leenen, Louise, et al.. (2014). Using an ontology as a model for the implementation of the National Cybersecurity Policy Framework for South Africa. 11 indexed citations
17.
Leenen, Louise, et al.. (2013). Development of a South African Cybersecurity Policy Implementation Framework. 3 indexed citations
18.
Leenen, Louise, et al.. (2013). A focussed dynamic path finding algorithm with constraints. 2. 1–8. 5 indexed citations
19.
Leenen, Louise, et al.. (2003). A pre-processing algorithm for solving constraint satisfaction optimisation problems. 11–15. 1 indexed citations
20.
Meyer, Thomas, et al.. (2002). Systematic Withdrawal. Journal of Philosophical Logic. 31(5). 415–443. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026