Masoom Alam

1.8k total citations · 1 hit paper
62 papers, 1.2k citations indexed

About

Masoom Alam is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Masoom Alam has authored 62 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 40 papers in Information Systems, 35 papers in Artificial Intelligence and 22 papers in Computer Networks and Communications. Recurrent topics in Masoom Alam's work include Cloud Data Security Solutions (19 papers), Access Control and Trust (16 papers) and Cryptography and Data Security (16 papers). Masoom Alam is often cited by papers focused on Cloud Data Security Solutions (19 papers), Access Control and Trust (16 papers) and Cryptography and Data Security (16 papers). Masoom Alam collaborates with scholars based in Pakistan, United States and Saudi Arabia. Masoom Alam's co-authors include Abid Khan, Nadeem Javaid, Ahmad Almogren, Fahad Ahmed Al-Zahrani, Mansour Zuair, Saif Ur Rehman Malik, Xinwen Zhang, Tamleek Ali, Mohammad Nauman and F. B. Malik and has published in prestigious journals such as PLoS ONE, Physics Letters B and IEEE Access.

In The Last Decade

Masoom Alam

61 papers receiving 1.2k citations

Hit Papers

Blockchain-Based Agri-Food Supply Chain: A Complete Solution 2020 2026 2022 2024 2020 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Masoom Alam Pakistan 18 695 497 467 157 132 62 1.2k
Alexandr Kuznetsov Ukraine 21 302 0.4× 340 0.7× 590 1.3× 234 1.5× 90 0.7× 198 1.3k
Riccardo Focardi Italy 18 505 0.7× 631 1.3× 878 1.9× 69 0.4× 376 2.8× 96 1.3k
Ulf Lindqvist United States 15 372 0.5× 784 1.6× 430 0.9× 106 0.7× 437 3.3× 55 1.1k
R. Rastogi United States 22 491 0.7× 1.1k 2.3× 600 1.3× 283 1.8× 329 2.5× 46 1.7k
Yihua Huang China 16 346 0.5× 218 0.4× 402 0.9× 45 0.3× 83 0.6× 78 815
Huaxiong Wang Singapore 24 858 1.2× 628 1.3× 1.5k 3.1× 274 1.7× 126 1.0× 144 2.0k
Maninder Singh India 19 868 1.2× 810 1.6× 508 1.1× 65 0.4× 512 3.9× 104 1.4k
Zihui Ge United States 26 267 0.4× 1.8k 3.6× 734 1.6× 292 1.9× 167 1.3× 79 2.0k

Countries citing papers authored by Masoom Alam

Since Specialization
Citations

This map shows the geographic impact of Masoom Alam's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Masoom Alam with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Masoom Alam more than expected).

Fields of papers citing papers by Masoom Alam

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Masoom Alam. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Masoom Alam. The network helps show where Masoom Alam may publish in the future.

Co-authorship network of co-authors of Masoom Alam

This figure shows the co-authorship network connecting the top 25 collaborators of Masoom Alam. A scholar is included among the top collaborators of Masoom Alam based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Masoom Alam. Masoom Alam is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Alam, Masoom, et al.. (2023). Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach. IEEE Access. 11. 70443–70458. 6 indexed citations
2.
Alam, Masoom, Nadeem Javaid, Abdul Waheed, et al.. (2022). SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol. Journal of Sensors. 2022. 1–16. 9 indexed citations
3.
Alam, Masoom, et al.. (2022). Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack. IEEE Access. 10. 108760–108774. 17 indexed citations
4.
Alam, Masoom, et al.. (2021). Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks. IEEE Access. 9. 126789–126800. 19 indexed citations
5.
Zareei, Mahdi, et al.. (2021). ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access. 9. 46313–46324. 6 indexed citations
6.
Alam, Masoom, et al.. (2021). Attack Specification Language: Domain Specific Language for Dynamic Training in Cyber Range. 873–879. 5 indexed citations
7.
Almogren, Ahmad, et al.. (2020). Blockchain-Based Agri-Food Supply Chain: A Complete Solution. IEEE Access. 8. 69230–69243. 274 indexed citations breakdown →
8.
Zeadally, Sherali, et al.. (2019). Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Transactions on Engineering Management. 67(4). 1244–1255. 24 indexed citations
9.
Khan, Abid, Saif Ur Rehman Malik, Haris Pervaiz, et al.. (2019). FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE Internet of Things Journal. 7(7). 6132–6142. 111 indexed citations
10.
Alam, Masoom, et al.. (2019). Privacy aware decentralized access control system. Future Generation Computer Systems. 101. 420–433. 25 indexed citations
11.
Anwar, Zahid, et al.. (2018). A thin client friendly trusted execution framework for infrastructure-as-a-service clouds. Future Generation Computer Systems. 89. 239–248. 5 indexed citations
12.
Khan, Abid, et al.. (2018). Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits. Journal of Network and Computer Applications. 108. 1–19. 12 indexed citations
13.
Nazir, Anam, Masoom Alam, Saif Ur Rehman Malik, et al.. (2017). A high-level domain-specific language for SIEM (design, development and formal verification). Cluster Computing. 20(3). 2423–2437. 4 indexed citations
14.
Ramzan, Muhammad, et al.. (2011). A genetic algorithms based approach for conflicts resolution in requirement. International Journal of the Physical Sciences. 6(4). 828–836. 2 indexed citations
15.
Alam, Masoom, et al.. (2011). Mauth: A fine-grained and user-centric permission delegation framework for web services. International Journal of the Physical Sciences. 6(8). 2060–2071. 3 indexed citations
16.
Alam, Masoom, Tamleek Ali, Shahbaz Khan, et al.. (2011). Analysis of existing remote attestation techniques. Security and Communication Networks. 5(9). 1062–1082. 6 indexed citations
17.
Alam, Masoom, et al.. (2011). An Android runtime security policy enforcement framework. Personal and Ubiquitous Computing. 16(6). 631–641. 14 indexed citations
18.
Alam, Masoom, Xinwen Zhang, Mohammad Nauman, & Tamleek Ali. (2008). Behavioral attestation for web services (BA4WS). 21–28. 10 indexed citations
19.
Ali, Tamleek, Mohammad Nauman, & Masoom Alam. (2007). An Accessible Formal Specification of the UML and OCL Meta-Model in Isabelle/HOL. 2283. 1–6. 10 indexed citations
20.
Alam, Masoom, et al.. (1999). Inverse-scattering theory at a fixed energy for the Klein-Gordon equation. Physical Review C. 59(2). 826–831. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026