Mohamed Nassar

883 total citations
53 papers, 451 citations indexed

About

Mohamed Nassar is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Mohamed Nassar has authored 53 papers receiving a total of 451 indexed citations (citations by other indexed papers that have themselves been cited), including 36 papers in Artificial Intelligence, 19 papers in Computer Networks and Communications and 16 papers in Information Systems. Recurrent topics in Mohamed Nassar's work include Cryptography and Data Security (14 papers), Network Security and Intrusion Detection (13 papers) and Privacy-Preserving Technologies in Data (13 papers). Mohamed Nassar is often cited by papers focused on Cryptography and Data Security (14 papers), Network Security and Intrusion Detection (13 papers) and Privacy-Preserving Technologies in Data (13 papers). Mohamed Nassar collaborates with scholars based in Lebanon, France and United States. Mohamed Nassar's co-authors include Muhammad Habib ur Rehman, Davor Svetinović, Khaled Salah, Olivier Festor, Radu State, Haı̈dar Safa, Qutaibah Malluhi, Abdelkarim Erradi, Saverio Niccolini and Joseph El Khoury and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and SAE technical papers on CD-ROM/SAE technical paper series.

In The Last Decade

Mohamed Nassar

46 papers receiving 424 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mohamed Nassar Lebanon 13 246 209 161 98 98 53 451
Yulai Xie China 13 174 0.7× 329 1.6× 168 1.0× 41 0.4× 129 1.3× 28 498
Yustus Eko Oktian South Korea 12 174 0.7× 406 1.9× 168 1.0× 110 1.1× 75 0.8× 32 541
Manu Sood India 10 168 0.7× 227 1.1× 111 0.7× 70 0.7× 63 0.6× 33 444
Xiangyun Tang China 11 346 1.4× 290 1.4× 322 2.0× 79 0.8× 46 0.5× 28 649
Djamel Eddine Kouicem France 5 143 0.6× 393 1.9× 288 1.8× 57 0.6× 110 1.1× 9 515
Lasheng Yu China 7 357 1.5× 346 1.7× 96 0.6× 47 0.5× 175 1.8× 33 561
Mosleh M. Abualhaj Jordan 11 136 0.6× 286 1.4× 122 0.8× 131 1.3× 82 0.8× 98 491
Raimo Kantola Finland 15 241 1.0× 502 2.4× 180 1.1× 211 2.2× 67 0.7× 79 711
Jerry den Hartog Netherlands 14 238 1.0× 241 1.2× 162 1.0× 107 1.1× 113 1.2× 37 521

Countries citing papers authored by Mohamed Nassar

Since Specialization
Citations

This map shows the geographic impact of Mohamed Nassar's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohamed Nassar with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohamed Nassar more than expected).

Fields of papers citing papers by Mohamed Nassar

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohamed Nassar. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohamed Nassar. The network helps show where Mohamed Nassar may publish in the future.

Co-authorship network of co-authors of Mohamed Nassar

This figure shows the co-authorship network connecting the top 25 collaborators of Mohamed Nassar. A scholar is included among the top collaborators of Mohamed Nassar based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohamed Nassar. Mohamed Nassar is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
3.
Jaber, Mohamad, et al.. (2024). Introducing Residual Networks to Vision Transformers for Adversarial Attacks.. Procedia Computer Science. 246. 423–432.
5.
Nassar, Mohamed, et al.. (2022). Faecal calprotectin in COVID-19 patients with intestinal symptoms. Gastroenterology Review. 17(4). 332–337. 3 indexed citations
6.
Nassar, Mohamed, et al.. (2022). Blockchain-based sequential market-clearing platform for enabling energy trading in Interconnected Microgrids. International Journal of Electrical Power & Energy Systems. 144. 108550–108550. 17 indexed citations
7.
Nassar, Mohamed, et al.. (2021). Keep it Flat (KiF): Resource Management in Integrated Cloud-Fog Networks. 28–34. 1 indexed citations
8.
Nassar, Mohamed, et al.. (2020). VIP Blowfish Privacy in Communication Graphs. HAL (Le Centre pour la Communication Scientifique Directe). 459–467. 2 indexed citations
9.
Nassar, Mohamed, et al.. (2019). Shoplifting Smart Stores using Adversarial Machine Learning. abs 1409 1556. 1–6. 4 indexed citations
10.
Nassar, Mohamed, et al.. (2019). Chi squared feature selection over Apache Spark. 1–5. 9 indexed citations
11.
Nassar, Mohamed, Khaled Salah, Muhammad Habib ur Rehman, & Davor Svetinović. (2019). Blockchain for explainable and trustworthy artificial intelligence. Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery. 10(1). 92 indexed citations
12.
Nassar, Mohamed, et al.. (2019). A Look into Privacy-Preserving Blockchains. Open Repository and Bibliography (University of Luxembourg). 1–6. 2 indexed citations
13.
Awad, Yara Abu, Mohamed Nassar, & Haı̈dar Safa. (2018). Modeling Malware as a Language. Digital Commons - New Heaven (University of New Haven). 1–6. 18 indexed citations
14.
Nassar, Mohamed, Qutaibah Malluhi, & Sajjad Khan. (2018). A Scheme for Three-way Secure and Verifiable E-Voting. Qatar University QSpace (Qatar University). 5157. 1–6. 4 indexed citations
15.
Nassar, Mohamed, et al.. (2016). On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. Digital Commons - New Heaven (University of New Haven). 318–326. 6 indexed citations
16.
Raman, Karthik, Ankur NarendraBhai Shah, Renato Ferreira, et al.. (2015). Schema-agnostic indexing with Azure DocumentDB. Proceedings of the VLDB Endowment. 8(12). 1668–1679. 22 indexed citations
17.
Nassar, Mohamed, Abdelkarim Erradi, Farida Sabry, & Qutaibah Malluhi. (2014). A Model Driven Framework for Secure Outsourcing of Computation to the Cloud. Qatar University QSpace (Qatar University). 968–969. 3 indexed citations
18.
Jung, Tobias, et al.. (2013). Outbound SPIT filter with optimal performance guarantees. Computer Networks. 57(7). 1630–1643. 4 indexed citations
19.
Rebahi, Yacine, Mohamed Nassar, Thomas Magedanz, & Olivier Festor. (2011). A survey on fraud and service misuse in voice over IP (VoIP) networks. Information Security Technical Report. 16(1). 12–19. 11 indexed citations
20.
Nassar, Mohamed, et al.. (2010). A Framework for Monitoring SIP Enterprise Networks. HAL (Le Centre pour la Communication Scientifique Directe). 31. 1–8. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026