Prithvi Bisht

751 total citations
10 papers, 378 citations indexed

About

Prithvi Bisht is a scholar working on Artificial Intelligence, Information Systems and Signal Processing. According to data from OpenAlex, Prithvi Bisht has authored 10 papers receiving a total of 378 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Artificial Intelligence, 9 papers in Information Systems and 5 papers in Signal Processing. Recurrent topics in Prithvi Bisht's work include Security and Verification in Computing (10 papers), Web Application Security Vulnerabilities (9 papers) and Advanced Malware Detection Techniques (5 papers). Prithvi Bisht is often cited by papers focused on Security and Verification in Computing (10 papers), Web Application Security Vulnerabilities (9 papers) and Advanced Malware Detection Techniques (5 papers). Prithvi Bisht collaborates with scholars based in United States. Prithvi Bisht's co-authors include V. N. Venkatakrishnan, P. Madhusudan, Timothy L. Hinrichs, Sruthi Bandhakavi, A. Prasad Sistla, Lenore D. Zuck and Mike Ter Louw and has published in prestigious journals such as Lecture notes in computer science, ACM Transactions on Information and System Security and Journal of Computer Security.

In The Last Decade

Prithvi Bisht

10 papers receiving 332 citations

Peers

Prithvi Bisht
Hayawardh Vijayakumar United States
Dongseok Jang United States
Ben Hermann Germany
Shuo Tang United States
Hung Phan United States
Jonathan Crussell United States
Asmaa Sallam United States
Hayawardh Vijayakumar United States
Prithvi Bisht
Citations per year, relative to Prithvi Bisht Prithvi Bisht (= 1×) peers Hayawardh Vijayakumar

Countries citing papers authored by Prithvi Bisht

Since Specialization
Citations

This map shows the geographic impact of Prithvi Bisht's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Prithvi Bisht with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Prithvi Bisht more than expected).

Fields of papers citing papers by Prithvi Bisht

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Prithvi Bisht. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Prithvi Bisht. The network helps show where Prithvi Bisht may publish in the future.

Co-authorship network of co-authors of Prithvi Bisht

This figure shows the co-authorship network connecting the top 25 collaborators of Prithvi Bisht. A scholar is included among the top collaborators of Prithvi Bisht based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Prithvi Bisht. Prithvi Bisht is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

10 of 10 papers shown
1.
Bisht, Prithvi, et al.. (2014). Automated detection of parameter tampering opportunities and vulnerabilities in web applications. Journal of Computer Security. 22(3). 415–465. 4 indexed citations
2.
Bisht, Prithvi, et al.. (2013). TamperProof. 129–140. 15 indexed citations
3.
Bisht, Prithvi, et al.. (2012). WAVES: Automatic Synthesis of Client-Side Validation Code for Web Applications. 46–53. 6 indexed citations
4.
Bisht, Prithvi, et al.. (2012). SWIPE. 295–306. 6 indexed citations
5.
Bisht, Prithvi, et al.. (2011). WAPTEC. 575–586. 53 indexed citations
6.
Venkatakrishnan, V. N., et al.. (2010). WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications. Lecture notes in computer science. 6503. 3–26. 2 indexed citations
7.
Bisht, Prithvi, A. Prasad Sistla, & V. N. Venkatakrishnan. (2010). TAPS. 645–647. 8 indexed citations
8.
Bisht, Prithvi, P. Madhusudan, & V. N. Venkatakrishnan. (2010). CANDID. ACM Transactions on Information and System Security. 13(2). 1–39. 113 indexed citations
9.
Bisht, Prithvi, et al.. (2010). NoTamper. 607–618. 70 indexed citations
10.
Bandhakavi, Sruthi, Prithvi Bisht, P. Madhusudan, & V. N. Venkatakrishnan. (2007). CANDID. 12–24. 101 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026