Munam Ali

728 total citations
13 papers, 364 citations indexed

About

Munam Ali is a scholar working on Computer Networks and Communications, Signal Processing and Information Systems. According to data from OpenAlex, Munam Ali has authored 13 papers receiving a total of 364 indexed citations (citations by other indexed papers that have themselves been cited), including 8 papers in Computer Networks and Communications, 5 papers in Signal Processing and 4 papers in Information Systems. Recurrent topics in Munam Ali's work include IoT and Edge/Fog Computing (5 papers), Advanced Malware Detection Techniques (5 papers) and Network Security and Intrusion Detection (4 papers). Munam Ali is often cited by papers focused on IoT and Edge/Fog Computing (5 papers), Advanced Malware Detection Techniques (5 papers) and Network Security and Intrusion Detection (4 papers). Munam Ali collaborates with scholars based in Pakistan, United Kingdom and Libya. Munam Ali's co-authors include Abid Khan, Mansoor Ahmed, Muhammad Kamran, M. Mumtaz, Qaisar Javaid, Yousra Asim, Abdul Wahab, Hafsa Maryam, Sijing Zhang and Sijing Zhang and has published in prestigious journals such as International Journal of Advanced Computer Science and Applications and International Journal of Computer Applications.

In The Last Decade

Munam Ali

13 papers receiving 340 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Munam Ali Pakistan 8 207 154 109 84 56 13 364
Konrad Wrona Poland 12 272 1.3× 181 1.2× 72 0.7× 115 1.4× 52 0.9× 56 462
Peter Hannay Australia 8 140 0.7× 136 0.9× 91 0.8× 86 1.0× 35 0.6× 36 303
Michael Falkenthal Germany 9 208 1.0× 169 1.1× 39 0.4× 90 1.1× 44 0.8× 32 346
Qingshan Li China 9 172 0.8× 240 1.6× 52 0.5× 231 2.8× 33 0.6× 84 429
Ali Alqazzaz Saudi Arabia 10 238 1.1× 74 0.5× 143 1.3× 198 2.4× 29 0.5× 35 375
Xiangyu Liu China 12 118 0.6× 175 1.1× 208 1.9× 220 2.6× 132 2.4× 36 477
Faiza Iqbal Pakistan 12 222 1.1× 247 1.6× 41 0.4× 156 1.9× 31 0.6× 47 462
Yoichi Shinoda Japan 13 509 2.5× 152 1.0× 89 0.8× 86 1.0× 30 0.5× 84 618
Abdullah Mohd Zın Malaysia 10 75 0.4× 131 0.9× 35 0.3× 83 1.0× 46 0.8× 73 341
Yisroel Mirsky Israel 8 127 0.6× 116 0.8× 143 1.3× 190 2.3× 61 1.1× 28 390

Countries citing papers authored by Munam Ali

Since Specialization
Citations

This map shows the geographic impact of Munam Ali's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Munam Ali with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Munam Ali more than expected).

Fields of papers citing papers by Munam Ali

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Munam Ali. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Munam Ali. The network helps show where Munam Ali may publish in the future.

Co-authorship network of co-authors of Munam Ali

This figure shows the co-authorship network connecting the top 25 collaborators of Munam Ali. A scholar is included among the top collaborators of Munam Ali based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Munam Ali. Munam Ali is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

13 of 13 papers shown
2.
Ali, Munam, et al.. (2018). Evaluation and Analysis of Bio-Inspired Optimization Techniques for Bill Estimation in Fog Computing. International Journal of Advanced Computer Science and Applications. 9(7). 3 indexed citations
3.
Ali, Munam, et al.. (2017). InstDroid: A Light Weight Instant Malware Detector for Android Operating Systems. International Journal of Advanced Computer Science and Applications. 8(8). 1 indexed citations
4.
Wahab, Abdul, et al.. (2017). A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT. International Journal of Advanced Computer Science and Applications. 8(7). 26 indexed citations
5.
Mumtaz, M., et al.. (2017). Cryptography: A Comparative Analysis for Modern Techniques. International Journal of Advanced Computer Science and Applications. 8(6). 73 indexed citations
6.
Ali, Munam, et al.. (2016). A Survey on Security for Smartphone Device. International Journal of Advanced Computer Science and Applications. 7(4). 15 indexed citations
7.
Ali, Munam, et al.. (2016). Smart Cities: A Survey on Security Concerns. International Journal of Advanced Computer Science and Applications. 7(2). 91 indexed citations
8.
Ali, Munam, et al.. (2016). Android Malware Detection & Protection: A Survey. International Journal of Advanced Computer Science and Applications. 7(2). 58 indexed citations
9.
Ali, Munam, et al.. (2016). Constraints in the IoT: The World in 2020 and Beyond. International Journal of Advanced Computer Science and Applications. 7(11). 40 indexed citations
10.
Ali, Munam, et al.. (2016). Software-Defined Networks (SDNs) and Internet of Things (IoTs): A Qualitative Prediction for 2020. International Journal of Advanced Computer Science and Applications. 7(11). 29 indexed citations
11.
Ali, Munam, et al.. (2016). An Analysis on Host Vulnerability Evaluation of Modern Operating Systems. International Journal of Advanced Computer Science and Applications. 7(4). 5 indexed citations
12.
Maryam, Hafsa, Munam Ali, Qaisar Javaid, & Muhammad Kamran. (2016). A Survey on Smartphones Systems for Emergency Management (SPSEM). International Journal of Advanced Computer Science and Applications. 7(6). 18 indexed citations
13.
Ali, Munam, et al.. (2015). An Overview of Electronic Waste Management, Practices and Impending Challenges. International Journal of Computer Applications. 125(2). 33–38. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026