Nishat I Mowla

726 total citations
16 papers, 486 citations indexed

About

Nishat I Mowla is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Nishat I Mowla has authored 16 papers receiving a total of 486 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Artificial Intelligence, 10 papers in Computer Networks and Communications and 7 papers in Signal Processing. Recurrent topics in Nishat I Mowla's work include Network Security and Intrusion Detection (8 papers), Anomaly Detection Techniques and Applications (5 papers) and User Authentication and Security Systems (4 papers). Nishat I Mowla is often cited by papers focused on Network Security and Intrusion Detection (8 papers), Anomaly Detection Techniques and Applications (5 papers) and User Authentication and Security Systems (4 papers). Nishat I Mowla collaborates with scholars based in South Korea, Sweden and Australia. Nishat I Mowla's co-authors include Kijoon Chae, Inshil Doh, Nguyen H. Tran, Sarder Fakhrul Abedin, Aamir Mahmood, Mikael Gidlund, Shah Zeb, Luca Beltramelli, Syed Ali Hassan and Emiliano Sisinni and has published in prestigious journals such as IEEE Access, IEEE Transactions on Industrial Informatics and Journal of Communications and Networks.

In The Last Decade

Nishat I Mowla

15 papers receiving 476 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nishat I Mowla South Korea 9 275 202 166 106 45 16 486
Rania A. Mokhtar Sudan 15 373 1.4× 341 1.7× 131 0.8× 101 1.0× 44 1.0× 60 636
Abdullatif Albaseer Qatar 13 219 0.8× 168 0.8× 224 1.3× 44 0.4× 39 0.9× 47 481
Shunpu Tang China 10 210 0.8× 249 1.2× 134 0.8× 90 0.8× 15 0.3× 17 442
Alessandro Brighente Italy 10 151 0.5× 165 0.8× 73 0.4× 63 0.6× 45 1.0× 58 374
Abbas Mirzaei Iran 5 217 0.8× 229 1.1× 68 0.4× 49 0.5× 18 0.4× 10 385
Inshil Doh South Korea 11 296 1.1× 139 0.7× 197 1.2× 91 0.9× 38 0.8× 59 535
Zhidu Li China 12 312 1.1× 250 1.2× 101 0.6× 47 0.4× 25 0.6× 67 544
Maryam Bavaghar Iran 6 231 0.8× 227 1.1× 70 0.4× 45 0.4× 17 0.4× 7 392
Shiwei Lai China 14 299 1.1× 303 1.5× 146 0.9× 109 1.0× 12 0.3× 16 542

Countries citing papers authored by Nishat I Mowla

Since Specialization
Citations

This map shows the geographic impact of Nishat I Mowla's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nishat I Mowla with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nishat I Mowla more than expected).

Fields of papers citing papers by Nishat I Mowla

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nishat I Mowla. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nishat I Mowla. The network helps show where Nishat I Mowla may publish in the future.

Co-authorship network of co-authors of Nishat I Mowla

This figure shows the co-authorship network connecting the top 25 collaborators of Nishat I Mowla. A scholar is included among the top collaborators of Nishat I Mowla based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nishat I Mowla. Nishat I Mowla is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
2.
Mowla, Nishat I, et al.. (2022). Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System Using eXplainable Artificial Intelligence (XAI). IEEE Access. 10. 102831–102841. 34 indexed citations
3.
Mowla, Nishat I, et al.. (2022). Systematic Evaluation of Automotive Intrusion Detection Datasets. 1–12. 8 indexed citations
4.
Mowla, Nishat I, et al.. (2022). Dynamic Voting based Explainable Intrusion Detection System for In-vehicle Network. 406–411. 6 indexed citations
5.
Mahmood, Aamir, Luca Beltramelli, Sarder Fakhrul Abedin, et al.. (2021). Industrial IoT in 5G-and-Beyond Networks: Vision, Architecture, and Design Trends. IEEE Transactions on Industrial Informatics. 18(6). 4122–4137. 171 indexed citations
6.
Mowla, Nishat I, Nguyen H. Tran, Inshil Doh, & Kijoon Chae. (2020). AFRL: Adaptive federated reinforcement learning for intelligent jamming defense in FANET. Journal of Communications and Networks. 22(3). 244–258. 102 indexed citations
7.
Mowla, Nishat I, Nguyen H. Tran, Inshil Doh, & Kijoon Chae. (2019). Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network. IEEE Access. 8. 4338–4350. 106 indexed citations
8.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2019). Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. 43–48. 3 indexed citations
9.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2018). Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1–1. 2 indexed citations
10.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2018). Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS. 2018 20th International Conference on Advanced Communication Technology (ICACT). 63–67. 4 indexed citations
11.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2018). Evolving neural network intrusion detection system for MCPS. 2018 20th International Conference on Advanced Communication Technology (ICACT). 1040–1045. 5 indexed citations
12.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2018). On-Device AI-Based Cognitive Detection of Bio-Modality Spoofing in Medical Cyber Physical System. IEEE Access. 7. 2126–2137. 10 indexed citations
13.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2017). CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. Computer Science and Information Systems. 15(1). 163–185. 12 indexed citations
14.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2017). Evolving neural network intrusion detection system for MCPS. 183–187. 4 indexed citations
15.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2015). An efficient defense mechanism for spoofed IP attack in SDN based CDNi. 9. 92–97. 8 indexed citations
16.
Mowla, Nishat I, Inshil Doh, & Kijoon Chae. (2014). Multi-defense Mechanism against DDoS in SDN Based CDNi. 9. 447–451. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026