Countries citing papers authored by Peter Kieseberg
Since
Specialization
Citations
This map shows the geographic impact of Peter Kieseberg's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Peter Kieseberg with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Peter Kieseberg more than expected).
This network shows the impact of papers produced by Peter Kieseberg. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Peter Kieseberg. The network helps show where Peter Kieseberg may publish in the future.
Co-authorship network of co-authors of Peter Kieseberg
This figure shows the co-authorship network connecting the top 25 collaborators of Peter Kieseberg.
A scholar is included among the top collaborators of Peter Kieseberg based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Peter Kieseberg. Peter Kieseberg is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Tjoa, Simon, et al.. (2024). Cyber Resilience Fundamentals. Studies in systems, decision and control.1 indexed citations
Holzinger, Andreas, Peter Kieseberg, & Heimo Müller. (2020). KANDINSKY Patterns: A Swiss-Knife for the Study of Explainable AI.. ERCIM news/ERCIM news online edition. 2020(120).1 indexed citations
6.
Holzinger, Katharina, et al.. (2018). Can we Trust Machine Learning Results? Artificial Intelligence in Safety-Critical Decision Support.. ERCIM news/ERCIM news online edition. 2018.14 indexed citations
Kieseberg, Peter, Peter Frühwirt, & Sebastian Schrittwieser. (2017). Security Testing for Mobile Applications.. ERCIM news/ERCIM news online edition. 2017.
9.
Malle, Bernd, Peter Kieseberg, & Andreas Holzinger. (2017). Interactive Anonymization for Privacy aware Machine Learning. TUGraz OPEN Library (Graz University of Technology). 15–26.3 indexed citations
10.
Malle, Bernd, Peter Kieseberg, Sebastian Schrittwieser, & Andreas Holzinger. (2016). Privacy Aware Machine Learning and the "Right to be Forgotten".. ERCIM news/ERCIM news online edition. 2016(10). 22–23.5 indexed citations
11.
Kieseberg, Peter, Edgar Weippl, & Sebastian Schrittwieser. (2016). Detection of Data Leaks in Collaborative Data Driven Research.. ERCIM news/ERCIM news online edition. 2016.1 indexed citations
12.
Kieseberg, Peter, Edgar Weippl, & Andreas Holzinger. (2016). Trust for the Doctor-in-the-Loop. ERCIM news/ERCIM news online edition. 2016(1). 32–33.1 indexed citations
13.
Kieseberg, Peter, et al.. (2015). CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism.. ERCIM news/ERCIM news online edition. 2015.1 indexed citations
14.
Kieseberg, Peter. (2015). A Structured Approach to Defence Simulation Training.. ERCIM news/ERCIM news online edition. 2015.1 indexed citations
Hochreiner, Christoph, Peter Frühwirt, Zhendong Ma, et al.. (2014). Genie in a Model? Why Model Driven Security will not secure your Web Application.. 5. 44–62.2 indexed citations
Schrittwieser, Sebastian, Peter Frühwirt, Peter Kieseberg, et al.. (2012). Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.. Network and Distributed System Security Symposium.70 indexed citations
Kieseberg, Peter, et al.. (2010). QR code security. 430–435.84 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.