Nazri Kama

1.4k total citations
77 papers, 940 citations indexed

About

Nazri Kama is a scholar working on Information Systems, Computer Networks and Communications and Software. According to data from OpenAlex, Nazri Kama has authored 77 papers receiving a total of 940 indexed citations (citations by other indexed papers that have themselves been cited), including 36 papers in Information Systems, 19 papers in Computer Networks and Communications and 17 papers in Software. Recurrent topics in Nazri Kama's work include Software Engineering Research (22 papers), Software Engineering Techniques and Practices (22 papers) and Software Reliability and Analysis Research (17 papers). Nazri Kama is often cited by papers focused on Software Engineering Research (22 papers), Software Engineering Techniques and Practices (22 papers) and Software Reliability and Analysis Research (17 papers). Nazri Kama collaborates with scholars based in Malaysia, United Kingdom and Pakistan. Nazri Kama's co-authors include Shidrokh Goudarzi, Mohammad Hossein Anisi, Nur Azaliah Abu Bakar, Seyed Ahmad Soleymani, Azri Azmi, Shahid Mumtaz, Sherali Zeadally, Saiful Adli Ismail, David J. Pauleen and Nazım Taşkın and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Nazri Kama

75 papers receiving 884 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nazri Kama Malaysia 17 337 285 217 167 127 77 940
Deepti Mehrotra India 16 240 0.7× 152 0.5× 145 0.7× 311 1.9× 49 0.4× 130 1.1k
Juan Manuel Cueva Lovelle Spain 17 553 1.6× 317 1.1× 113 0.5× 352 2.1× 118 0.9× 94 1.2k
Balbir Barn United Kingdom 12 210 0.6× 199 0.7× 134 0.6× 105 0.6× 77 0.6× 88 929
Vijay K. Vaishnavi United States 14 379 1.1× 369 1.3× 91 0.4× 255 1.5× 167 1.3× 49 1.1k
Ahmad Karim Pakistan 14 665 2.0× 848 3.0× 168 0.8× 636 3.8× 123 1.0× 26 1.7k
Siti Hafizah Ab Hamid Malaysia 21 746 2.2× 922 3.2× 276 1.3× 279 1.7× 39 0.3× 61 1.6k
Bernhard Bauer Germany 17 474 1.4× 413 1.4× 89 0.4× 788 4.7× 373 2.9× 123 1.5k
Narayan C. Debnath United States 13 385 1.1× 244 0.9× 111 0.5× 219 1.3× 68 0.5× 184 1.0k
Massimo Cossentino Italy 16 288 0.9× 217 0.8× 61 0.3× 617 3.7× 272 2.1× 105 998
Remzi Seker United States 13 193 0.6× 202 0.7× 52 0.2× 128 0.8× 106 0.8× 62 767

Countries citing papers authored by Nazri Kama

Since Specialization
Citations

This map shows the geographic impact of Nazri Kama's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nazri Kama with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nazri Kama more than expected).

Fields of papers citing papers by Nazri Kama

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nazri Kama. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nazri Kama. The network helps show where Nazri Kama may publish in the future.

Co-authorship network of co-authors of Nazri Kama

This figure shows the co-authorship network connecting the top 25 collaborators of Nazri Kama. A scholar is included among the top collaborators of Nazri Kama based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nazri Kama. Nazri Kama is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Soleymani, Seyed Ahmad, Shidrokh Goudarzi, Mohammad Hossein Anisi, et al.. (2022). TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics. 19(1). 880–889. 16 indexed citations
2.
Raza, Saqib, et al.. (2022). Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines. Computers, materials & continua/Computers, materials & continua (Print). 74(1). 1871–1886. 1 indexed citations
3.
Kama, Nazri, et al.. (2022). State of the Art Intrusion Detection System for Cloud Computing. International Journal of Communication Networks and Information Security (IJCNIS). 10(3).
4.
Iqbal, Nadeem, et al.. (2022). Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance. Computers, materials & continua/Computers, materials & continua (Print). 73(2). 3827–3845. 3 indexed citations
5.
Goudarzi, Shidrokh, Seyed Ahmad Soleymani, Mohammad Hossein Anisi, et al.. (2022). A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks. 128. 102782–102782. 34 indexed citations
6.
Zareei, Mahdi, et al.. (2021). ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map. IEEE Access. 9. 46313–46324. 6 indexed citations
7.
Mehmood, Gulzar, Muhammad Sohail Khan, Abdul Waheed, et al.. (2021). An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network. Complexity. 2021(1). 22 indexed citations
8.
Soleymani, Seyed Ahmad, Shidrokh Goudarzi, Mohammad Hossein Anisi, et al.. (2020). A Trust Model Using Edge Nodes and a Cuckoo Filter for Securing VANET under the NLoS Condition. Symmetry. 12(4). 609–609. 29 indexed citations
9.
Azmi, Azri, et al.. (2019). Enhancing Performance Aspect in Usability Guidelines for Mobile Web Application. 1–6. 9 indexed citations
10.
Kama, Nazri, et al.. (2019). Using static and dynamic impact analysis for effort estimation.. The International Arab Journal of Information Technology. 16. 163–170. 1 indexed citations
11.
Kama, Nazri, et al.. (2019). A New Cryptojacking Malware Classifier Model Based on Dendritic Cell Algorithm. 1–5. 6 indexed citations
12.
Ismail, Saiful Adli, et al.. (2019). Customer Churn Prediction In Telecommunication Industry Using Machine Learning Classifiers. 1–7. 20 indexed citations
13.
Kama, Nazri, et al.. (2018). An Empirical Study with Function Point Analysis for Software Development Phase Method. 7–11. 4 indexed citations
14.
Azmi, Azri, et al.. (2017). Co-dependence relationship between master data management and data quality: A review. Journal of Theoretical and Applied Information Technology. 95(22). 6323–6335. 3 indexed citations
15.
Bakar, Nur Azaliah Abu, et al.. (2017). A priority based enterprise architecture implementation assessment model: An analytic hierarchy process (AHP) approach. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 9. 121–125. 1 indexed citations
16.
Kama, Nazri, et al.. (2016). Using static and dynamic impact analysis for effort estimation. IET Software. 10(4). 89–95. 11 indexed citations
17.
Kama, Nazri, Tim French, & Mark Reynolds. (2015). Design Patterns Consideration in Class Interactions Prediction Development. 1 indexed citations
18.
Kama, Nazri, et al.. (2015). A novel effort estimation approach for requirement changes during software development phase. International Journal of Software Engineering and Its Applications. 9(1). 237–252. 8 indexed citations
19.
Kama, Nazri. (2013). Change impact analysis for the software development phase: State-of-the-art. International Journal of Software Engineering and Its Applications. 7(2). 235–244. 10 indexed citations
20.
Kama, Nazri, et al.. (2013). A Change Impact Size Estimation Approach during the Software Development. 2. 68–77. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026