Rabiah Ahmad

1.2k total citations
74 papers, 780 citations indexed

About

Rabiah Ahmad is a scholar working on Information Systems, Computer Networks and Communications and Sociology and Political Science. According to data from OpenAlex, Rabiah Ahmad has authored 74 papers receiving a total of 780 indexed citations (citations by other indexed papers that have themselves been cited), including 44 papers in Information Systems, 23 papers in Computer Networks and Communications and 14 papers in Sociology and Political Science. Recurrent topics in Rabiah Ahmad's work include Information and Cyber Security (27 papers), Network Security and Intrusion Detection (16 papers) and Advanced Malware Detection Techniques (9 papers). Rabiah Ahmad is often cited by papers focused on Information and Cyber Security (27 papers), Network Security and Intrusion Detection (16 papers) and Advanced Malware Detection Techniques (9 papers). Rabiah Ahmad collaborates with scholars based in Malaysia, Iraq and Australia. Rabiah Ahmad's co-authors include Zuraini Ismail, Ganthan Narayana Samy, Warusia Yassin, Aslinda Hassan, Mohammed Nasser Al‐Mhiqani, Zaheera Zainal Abidin, Karrar Hameed Abdulkareem, Ali Hussein Zolait, Mohd Faizal Abdollah and Shahrin Sahib and has published in prestigious journals such as SHILAP Revista de lepidopterología, Applied Sciences and Computers & Electrical Engineering.

In The Last Decade

Rabiah Ahmad

71 papers receiving 716 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Rabiah Ahmad Malaysia 14 433 326 194 144 97 74 780
Habtamu Abie Norway 16 392 0.9× 393 1.2× 193 1.0× 168 1.2× 46 0.5× 50 706
Paul Haskell‐Dowland Australia 15 313 0.7× 276 0.8× 227 1.2× 173 1.2× 83 0.9× 71 714
Mohammad Jabed Morshed Chowdhury Australia 17 657 1.5× 433 1.3× 167 0.9× 244 1.7× 56 0.6× 50 991
Dan Geer United States 18 519 1.2× 445 1.4× 199 1.0× 219 1.5× 85 0.9× 55 918
Steve Mansfield-Devine 16 468 1.1× 344 1.1× 272 1.4× 197 1.4× 134 1.4× 103 821
George Lawton Australia 17 321 0.7× 370 1.1× 113 0.6× 142 1.0× 96 1.0× 64 866
Abdullateef Oluwagbemiga Balogun Nigeria 19 514 1.2× 288 0.9× 192 1.0× 314 2.2× 47 0.5× 59 1.1k
Ahmad Firdaus Malaysia 18 450 1.0× 440 1.3× 396 2.0× 216 1.5× 105 1.1× 56 978
Boštjan Brumen Slovenia 13 758 1.8× 669 2.1× 285 1.5× 285 2.0× 117 1.2× 62 1.1k
Budi Rahardjo Indonesia 13 290 0.7× 246 0.8× 124 0.6× 238 1.7× 57 0.6× 92 665

Countries citing papers authored by Rabiah Ahmad

Since Specialization
Citations

This map shows the geographic impact of Rabiah Ahmad's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Rabiah Ahmad with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Rabiah Ahmad more than expected).

Fields of papers citing papers by Rabiah Ahmad

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Rabiah Ahmad. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Rabiah Ahmad. The network helps show where Rabiah Ahmad may publish in the future.

Co-authorship network of co-authors of Rabiah Ahmad

This figure shows the co-authorship network connecting the top 25 collaborators of Rabiah Ahmad. A scholar is included among the top collaborators of Rabiah Ahmad based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Rabiah Ahmad. Rabiah Ahmad is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Sahri, Nor Masri, et al.. (2024). A Light Review on Cyber Security Awareness Models for the Elderly. Journal of Advanced Research in Applied Sciences and Engineering Technology. 44(1). 31–45. 1 indexed citations
2.
Ahmad, Rabiah, et al.. (2023). Development of Cybersecurity Competency and Professional Talent for Cyber Ummah. International Journal of Sustainable Construction Engineering and Technology (Universiti Tun Hussein Onn Malaysia). 4(2).
3.
Hussain, Wan Mohd Hirwani Wan, et al.. (2022). The Used of UTAUT Model in Initial Coin Offerings: A Conceptual Paper. International Journal of Academic Research in Business and Social Sciences. 12(7). 1 indexed citations
4.
Al‐Mhiqani, Mohammed Nasser, Rabiah Ahmad, Zaheera Zainal Abidin, et al.. (2021). A new intelligent multilayer framework for insider threat detection. Computers & Electrical Engineering. 97. 107597–107597. 56 indexed citations
5.
Al‐Mhiqani, Mohammed Nasser, Rabiah Ahmad, Zaheera Zainal Abidin, et al.. (2020). A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations. Applied Sciences. 10(15). 5208–5208. 79 indexed citations
6.
Ahmad, Rabiah, et al.. (2020). The Development of Constraints in Role-based Access Control: A Systematic Review. 2(1). 87–96. 1 indexed citations
7.
Yassin, Warusia, et al.. (2019). An Insider Threat Categorization Framework for Automated Manufacturing Execution System. 3(2). 31–41. 3 indexed citations
8.
Ahmad, Rabiah, et al.. (2018). A Conceptual Model of Role Based Access Control Using Role Mining Algorithm. Indonesian Journal of Electrical Engineering and Computer Science. 12(3). 1394–1394. 1 indexed citations
9.
Samy, Ganthan Narayana, Bharanidharan Shanmugam, Nurazean Maarop, et al.. (2018). Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method. Advanced Science Letters. 24(1). 739–743. 2 indexed citations
10.
Ahmad, Rabiah, et al.. (2018). Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems. International Journal of Advanced Computer Science and Applications. 9(1). 67 indexed citations
11.
Hassanien, Aboul Ella, Mohamed Mostafa Fouad, Azizah Abdul Manaf, et al.. (2016). Multimedia Forensics and Security: Foundations, Innovations, and Applications. Springer eBooks. 1 indexed citations
12.
Samy, Ganthan Narayana, et al.. (2015). The Proposed Public Key Infrastructure Authentication Framework (PKIAF) for Malaysian Government Agencies. Advanced Science Letters. 21(10). 3161–3164. 3 indexed citations
13.
Foozy, Cik Feresa Mohd, Rabiah Ahmad, & Mohd Faizal Abdollah. (2014). A Framework for SMS Spam and Phishing Detection in Malay Language: a Case Study. International Review on Computers and Software (IRECOS). 9(7). 1248–1255. 4 indexed citations
14.
Ahmad, Rabiah, et al.. (2013). INFORMATION SECURITY AND PRIVACY AWARENESS IN ONLINE SOCIAL NETWORKS AMONG UTEM UNDERGRADUATE STUDENTS. 6(1). 101–110. 1 indexed citations
15.
Ismail, Zuraini, et al.. (2013). Protecting Personal Medical Information: Asian Perspectives. International Journal of Computer and Communication Engineering. 468–472. 2 indexed citations
16.
Ahmad, Rabiah, et al.. (2012). TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD. 1(4). 280–288. 9 indexed citations
17.
Ahmad, Rabiah, et al.. (2012). The Application of Mixed Method in Developing a Cyber Terrorism Framework. Journal of Information Security. 3(3). 209–214. 5 indexed citations
18.
Zeidanloo, Hossein Rouhani, Azizah Abdul Manaf, Rabiah Ahmad, Mazdak Zamani, & Saman Shojae Chaeikar. (2010). A proposed framework for P2P botnet detection. 15(2). 35–43. 15 indexed citations
19.
Samy, Ganthan Narayana, Rabiah Ahmad, & Zuraini Ismail. (2010). A framework for integrated risk management process using survival analysis approach in information security. 39. 185–190. 3 indexed citations
20.
Samy, Ganthan Narayana, Rabiah Ahmad, & Zuraini Ismail. (2009). Threats to Health Information Security. 540–543. 25 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026