Nabil Seddigh

1.0k total citations
45 papers, 501 citations indexed

About

Nabil Seddigh is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Nabil Seddigh has authored 45 papers receiving a total of 501 indexed citations (citations by other indexed papers that have themselves been cited), including 38 papers in Computer Networks and Communications, 23 papers in Artificial Intelligence and 10 papers in Electrical and Electronic Engineering. Recurrent topics in Nabil Seddigh's work include Network Security and Intrusion Detection (24 papers), Internet Traffic Analysis and Secure E-voting (17 papers) and Network Traffic and Congestion Control (13 papers). Nabil Seddigh is often cited by papers focused on Network Security and Intrusion Detection (24 papers), Internet Traffic Analysis and Secure E-voting (17 papers) and Network Traffic and Congestion Control (13 papers). Nabil Seddigh collaborates with scholars based in Canada and United States. Nabil Seddigh's co-authors include B. Nandy, Biswajit Nandy, Ioannis Lambadaris, Chung–Horng Lung, Kevin Wong, Ashraf Matrawy, Michael Devetsikiotis, Duo Liu, Jamal Hadi Salim and J. Hadi Salim and has published in prestigious journals such as Journal of Network and Systems Management, RePEc: Research Papers in Economics and Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE.

In The Last Decade

Nabil Seddigh

41 papers receiving 458 citations

Peers

Nabil Seddigh
Weifeng Chen United States
Nabil Seddigh
Citations per year, relative to Nabil Seddigh Nabil Seddigh (= 1×) peers Weifeng Chen

Countries citing papers authored by Nabil Seddigh

Since Specialization
Citations

This map shows the geographic impact of Nabil Seddigh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nabil Seddigh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nabil Seddigh more than expected).

Fields of papers citing papers by Nabil Seddigh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nabil Seddigh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nabil Seddigh. The network helps show where Nabil Seddigh may publish in the future.

Co-authorship network of co-authors of Nabil Seddigh

This figure shows the co-authorship network connecting the top 25 collaborators of Nabil Seddigh. A scholar is included among the top collaborators of Nabil Seddigh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nabil Seddigh. Nabil Seddigh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Nandy, Biswajit, et al.. (2024). IoT Device and State Identification based on Usage Patterns. 1–7. 1 indexed citations
3.
Nandy, Biswajit, et al.. (2024). Identifying IoT Devices: A Machine Learning Analysis Using Traffic Flow Metadata. 1–7. 3 indexed citations
5.
Seddigh, Nabil, et al.. (2019). A Framework & System for Classification of Encrypted Network Traffic using Machine Learning. IEEE Conference Proceedings. 2019. 1–5. 1 indexed citations
6.
Seddigh, Nabil, et al.. (2019). A Framework & System for Classification of Encrypted Network Traffic using Machine Learning. 1–5. 6 indexed citations
7.
Wong, Kevin, et al.. (2017). Enhancing Suricata intrusion detection system for cyber security in SCADA networks. 1–5. 42 indexed citations
8.
Nandy, B., et al.. (2016). Cyber Security Approaches for Industrial Control Networks. 26(6). 42–50. 1 indexed citations
9.
Lambadaris, Ioannis, et al.. (2014). Evaluating a modified PCA approach on network anomaly detection. 10. 124–131. 6 indexed citations
10.
Liu, Duo, Chung–Horng Lung, Nabil Seddigh, & Biswajit Nandy. (2014). Entropy-based robust PCA for communication network anomaly detection. 171–175. 6 indexed citations
11.
Lung, Chung–Horng, et al.. (2012). Combining statistical and spectral analysis techniques in network traffic anomaly detection. 94–101. 7 indexed citations
12.
Seddigh, Nabil, et al.. (2010). Security advances and challenges in 4G wireless networks. 62–71. 61 indexed citations
14.
Seddigh, Nabil, et al.. (2006). A comparative study of the SIP and IAX VoIP protocols. 179–183. 16 indexed citations
15.
Seddigh, Nabil, et al.. (2006). An Internet Public Alerting System: A Canadian Experience. 3 indexed citations
16.
Seddigh, Nabil, et al.. (2004). Current Trends and Advances in Information Assurance Metrics.. 32(8). 197–205. 45 indexed citations
17.
Seddigh, Nabil, et al.. (2004). Congestion control in TCP/IP networks: a combined ECN and BECN approach. 1. 248–254. 4 indexed citations
18.
Lambadaris, Ioannis, et al.. (2003). BECN for congestion control in TCP/IP networks: study and comparative evaluation. 3. 2588–2593. 6 indexed citations
19.
Seddigh, Nabil, et al.. (2003). Bandwidth assurance issues for TCP flows in a differentiated services network. 3. 1792–1798. 52 indexed citations
20.
Seddigh, Nabil & Michael Devetsikiotis. (2002). Studies of TCP's retransmission timeout mechanism. 6. 1834–1840. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026