Omar Zakaria

860 total citations
50 papers, 471 citations indexed

About

Omar Zakaria is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Omar Zakaria has authored 50 papers receiving a total of 471 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Computer Networks and Communications, 13 papers in Artificial Intelligence and 12 papers in Information Systems. Recurrent topics in Omar Zakaria's work include Chaos-based Image/Signal Encryption (7 papers), Mobile Ad Hoc Networks (7 papers) and Advanced Malware Detection Techniques (7 papers). Omar Zakaria is often cited by papers focused on Chaos-based Image/Signal Encryption (7 papers), Mobile Ad Hoc Networks (7 papers) and Advanced Malware Detection Techniques (7 papers). Omar Zakaria collaborates with scholars based in Malaysia, United Kingdom and Pakistan. Omar Zakaria's co-authors include Abdullah Gani, Othman Omran Khalifa, Mohamed Abomhara, B. B. Zaidan, A. A. Zaidan, Nor Badrul Anuar, Xichun Li, Rosli Salleh, Hasimi Sallehudin and Hamdan O. Alanazi and has published in prestigious journals such as SHILAP Revista de lepidopterología, The Journal of Organic Chemistry and Journal of Applied Sciences.

In The Last Decade

Omar Zakaria

43 papers receiving 386 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Omar Zakaria Malaysia 12 189 137 123 122 116 50 471
Jeffrey Junfeng Pan Hong Kong 9 88 0.5× 114 0.8× 207 1.7× 152 1.2× 123 1.1× 11 487
Simone Raponi Qatar 11 267 1.4× 43 0.3× 158 1.3× 178 1.5× 100 0.9× 16 534
Haleh Amintoosi Iran 12 285 1.5× 37 0.3× 197 1.6× 213 1.7× 56 0.5× 40 489
Songnian Zhang Canada 13 106 0.6× 48 0.4× 328 2.7× 121 1.0× 107 0.9× 69 529
Stephen W. Neville Canada 10 314 1.7× 79 0.6× 134 1.1× 216 1.8× 63 0.5× 43 477
Byung K. Yi United States 10 223 1.2× 80 0.6× 51 0.4× 86 0.7× 44 0.4× 33 471
Miguel Soriano Spain 16 430 2.3× 75 0.5× 262 2.1× 123 1.0× 48 0.4× 78 719
Kawuu W. Lin Taiwan 14 183 1.0× 74 0.5× 112 0.9× 194 1.6× 124 1.1× 49 482
Jean‐Charles Grégoire Canada 14 303 1.6× 95 0.7× 75 0.6× 89 0.7× 50 0.4× 78 492
Sergiy Gnatyuk Ukraine 11 160 0.8× 76 0.6× 156 1.3× 98 0.8× 36 0.3× 89 411

Countries citing papers authored by Omar Zakaria

Since Specialization
Citations

This map shows the geographic impact of Omar Zakaria's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Omar Zakaria with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Omar Zakaria more than expected).

Fields of papers citing papers by Omar Zakaria

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Omar Zakaria. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Omar Zakaria. The network helps show where Omar Zakaria may publish in the future.

Co-authorship network of co-authors of Omar Zakaria

This figure shows the co-authorship network connecting the top 25 collaborators of Omar Zakaria. A scholar is included among the top collaborators of Omar Zakaria based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Omar Zakaria. Omar Zakaria is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zakaria, Omar, et al.. (2018). Measuring Cybersecurity Wellness Index of Critical Organisations. 4 indexed citations
2.
Ismail, Waidah, et al.. (2018). Readiness of Information Security Management Systems (ISMS) Policy on Hospital Staff Using e-Patuh System. Journal of Telecommunication Electronic and Computer Engineering (JTEC). 10. 47–52. 1 indexed citations
3.
Zakaria, Omar, et al.. (2018). Establishment of User Requirements Handbook based on the Situational Awareness Knowledge for Malaysian Military Observers. International Journal of Engineering & Technology. 7(4.15). 35–38.
4.
Zakaria, Omar, et al.. (2012). Improving Exposure of intrusion deception system through implementation of hybrid honeypot. The International Arab Journal of Information Technology. 9(5). 436–444. 14 indexed citations
5.
Gani, Abdullah, et al.. (2011). Review of mobile short message service security issues and techniques towards the solution. Scientific Research and Essays. 6(6). 1147–1165. 25 indexed citations
6.
Abomhara, Mohamed, Othman Omran Khalifa, A. A. Zaidan, et al.. (2011). An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography. International Journal of the Physical Sciences. 6(16). 4053–4063. 7 indexed citations
7.
Zaidan, A. A., et al.. (2010). Novel approach for high (secure and rate) data hidden within triplex space for executable file. Scientific Research and Essays. 5(15). 1965–1977. 24 indexed citations
8.
Kiah, Miss Laiha Mat, et al.. (2010). A biological model to improve PE malware detection: Review. International Journal of the Physical Sciences. 5(15). 2236–2247. 2 indexed citations
10.
Zakaria, Omar. (2009). Blind Signal Detection and Identification Over the 2.4GHz ISM Band for Cognitive. The Journal of Organic Chemistry. 75(2). 342–52. 3 indexed citations
11.
Gani, Abdullah, Han Qi, Nor Badrul Anuar, & Omar Zakaria. (2009). Enhancing DSR protocol performance in mobile ad hoc network using ACK reply. WSEAS TRANSACTIONS on COMMUNICATIONS archive. 8(2). 227–236. 8 indexed citations
12.
Gani, Abdullah, et al.. (2009). Multi-bandwidth data path design for 5G wireless mobile internets. WSEAS Transactions on Information Science and Applications archive. 6(2). 159–168. 7 indexed citations
13.
Anuar, Nor Badrul, et al.. (2009). Usability and performance of secure mobile messaging: M-PKI. WSEAS Transactions on Information Science and Applications archive. 6(2). 179–189. 4 indexed citations
14.
Abomhara, Mohamed, Omar Zakaria, & Othman Omran Khalifa. (2009). An Overview of Video Encryption Techniques. International Journal of Computer Theory and Engineering. 103–110. 40 indexed citations
15.
Anuar, Nor Badrul, et al.. (2008). GSM mobile SMS/MMS using public key infrastructure: m-PKI. WSEAS Transactions on Computers archive. 7(8). 1219–1229. 6 indexed citations
16.
Anuar, Nor Badrul, et al.. (2008). Mobile messaging using public key infrastructure: m-PKI. Annual Conference on Computers. 76–81. 1 indexed citations
17.
Gani, Abdullah, et al.. (2008). Radio Frequency Combination for TCP/IP Suite Protocol Improvement in 4G Mobile Internet Networks. 5 indexed citations
18.
Zakaria, Omar. (2005). Information Security Culture and Leadership.. 415. 4 indexed citations
19.
Zakaria, Omar. (2004). Understanding Challenges of Information Security Culture: A Methodological Issue.. 83–93. 12 indexed citations
20.
Gani, Abdullah, et al.. (2004). A Markov Decision Process Model for Traffic Prioritisation Provisioning. Informing Science and IT Education Conference.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026