Nuthan Munaiah

667 total citations · 1 hit paper
17 papers, 405 citations indexed

About

Nuthan Munaiah is a scholar working on Information Systems, Software and Signal Processing. According to data from OpenAlex, Nuthan Munaiah has authored 17 papers receiving a total of 405 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Information Systems, 8 papers in Software and 5 papers in Signal Processing. Recurrent topics in Nuthan Munaiah's work include Software Engineering Research (14 papers), Information and Cyber Security (10 papers) and Software Reliability and Analysis Research (7 papers). Nuthan Munaiah is often cited by papers focused on Software Engineering Research (14 papers), Information and Cyber Security (10 papers) and Software Reliability and Analysis Research (7 papers). Nuthan Munaiah collaborates with scholars based in United States and Canada. Nuthan Munaiah's co-authors include Meiyappan Nagappan, Andrew Meneely, Daniel E. Krutz, Pradeep K. Murukannaiah, Jeffrey C. Carver, Laurie Williams, Akond Rahman, Laurie Williams, Mohamed Wiem Mkaouer and Anthony Peruma and has published in prestigious journals such as Information and Software Technology, Empirical Software Engineering and RIT Scholar Works (Rochester Institute of Technology).

In The Last Decade

Nuthan Munaiah

17 papers receiving 394 citations

Hit Papers

Curating GitHub for engineered software projects 2017 2026 2020 2023 2017 50 100 150 200

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Nuthan Munaiah United States 10 343 142 112 109 65 17 405
DongGyun Han United Kingdom 12 417 1.2× 254 1.8× 147 1.3× 50 0.5× 58 0.9× 27 492
Daniel Alencar da Costa New Zealand 13 552 1.6× 338 2.4× 197 1.8× 67 0.6× 86 1.3× 41 605
Csaba Nagy Switzerland 14 491 1.4× 226 1.6× 193 1.7× 69 0.6× 61 0.9× 43 570
André Hora Brazil 12 449 1.3× 159 1.1× 187 1.7× 129 1.2× 78 1.2× 49 508
Eric Bouwers Netherlands 10 257 0.7× 117 0.8× 79 0.7× 49 0.4× 54 0.8× 29 302
Rabe Abdalkareem Canada 12 525 1.5× 192 1.4× 173 1.5× 120 1.1× 156 2.4× 31 655
Lin Shi China 12 404 1.2× 247 1.7× 91 0.8× 86 0.8× 41 0.6× 42 517
Michaela Greiler United States 15 622 1.8× 372 2.6× 123 1.1× 55 0.5× 173 2.7× 25 693
Martín Nordio Switzerland 12 335 1.0× 191 1.3× 87 0.8× 26 0.2× 80 1.2× 23 444
Hazeline U. Asuncion United States 8 368 1.1× 139 1.0× 84 0.8× 44 0.4× 107 1.6× 25 456

Countries citing papers authored by Nuthan Munaiah

Since Specialization
Citations

This map shows the geographic impact of Nuthan Munaiah's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nuthan Munaiah with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nuthan Munaiah more than expected).

Fields of papers citing papers by Nuthan Munaiah

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Nuthan Munaiah. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nuthan Munaiah. The network helps show where Nuthan Munaiah may publish in the future.

Co-authorship network of co-authors of Nuthan Munaiah

This figure shows the co-authorship network connecting the top 25 collaborators of Nuthan Munaiah. A scholar is included among the top collaborators of Nuthan Munaiah based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Nuthan Munaiah. Nuthan Munaiah is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Munaiah, Nuthan, et al.. (2019). Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. 1–6. 18 indexed citations
2.
Munaiah, Nuthan & Andrew Meneely. (2019). Data-Driven Insights from Vulnerability Discovery Metrics. 1–7. 3 indexed citations
3.
Munaiah, Nuthan, et al.. (2019). Pragmatic Characteristics of Security Conversations: An Exploratory Linguistic Analysis. 79–82. 4 indexed citations
4.
Munaiah, Nuthan, et al.. (2018). A dataset for identifying actionable feedback in collaborative software development. 126–131. 7 indexed citations
5.
Munaiah, Nuthan, et al.. (2018). Attack surface definitions: A systematic literature review. Information and Software Technology. 104. 94–103. 27 indexed citations
6.
Munaiah, Nuthan. (2018). Assisted discovery of software vulnerabilities. 464–467. 2 indexed citations
7.
Munaiah, Nuthan, et al.. (2017). Curating GitHub for engineered software projects. Empirical Software Engineering. 22(6). 3219–3253. 213 indexed citations breakdown →
8.
Munaiah, Nuthan, Andrew Meneely, & Pradeep K. Murukannaiah. (2017). A Domain-Independent Model for Identifying Security Requirements. 506–511. 14 indexed citations
9.
Krutz, Daniel E., Nuthan Munaiah, Anthony Peruma, & Mohamed Wiem Mkaouer. (2017). Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps. 165–169. 12 indexed citations
10.
Munaiah, Nuthan, et al.. (2016). Are Intrusion Detection Studies Evaluated Consistently? A Systematic Literature Review. RIT Scholar Works (Rochester Institute of Technology). 6 indexed citations
11.
Munaiah, Nuthan & Andrew Meneely. (2016). Beyond the Attack Surface. 3–14. 12 indexed citations
12.
Krutz, Daniel E., et al.. (2016). Examining the relationship between security metrics and user ratings of mobile apps: a case study. 8–14. 11 indexed citations
13.
Munaiah, Nuthan, et al.. (2016). Curating GitHub for engineered software projects. 5 indexed citations
14.
Munaiah, Nuthan, et al.. (2016). Darwin: a static analysis dataset of malicious and benign Android apps. 26–29. 6 indexed citations
15.
Munaiah, Nuthan, et al.. (2016). Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project. Empirical Software Engineering. 22(3). 1305–1347. 15 indexed citations
16.
Munaiah, Nuthan & Andrew Meneely. (2016). Vulnerability severity scoring and bounties: why the disconnect?. 8–14. 27 indexed citations
17.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026