Richard Ford

834 total citations
48 papers, 495 citations indexed

About

Richard Ford is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Richard Ford has authored 48 papers receiving a total of 495 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Networks and Communications, 18 papers in Information Systems and 18 papers in Signal Processing. Recurrent topics in Richard Ford's work include Advanced Malware Detection Techniques (18 papers), Network Security and Intrusion Detection (15 papers) and Information and Cyber Security (8 papers). Richard Ford is often cited by papers focused on Advanced Malware Detection Techniques (18 papers), Network Security and Intrusion Detection (15 papers) and Information and Cyber Security (8 papers). Richard Ford collaborates with scholars based in United States, Canada and Italy. Richard Ford's co-authors include Sarah Gordon, Marco Carvalho, Matt Bishop, Anil Somayaji, Jared D. DeMott, David A. Wheeler, William H. Allen, Jens Gregor, Michael G. Thomason and Eugene H. Spafford and has published in prestigious journals such as Science, Computers in Human Behavior and Pattern Recognition.

In The Last Decade

Richard Ford

43 papers receiving 432 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Richard Ford United States 10 265 148 120 118 110 48 495
Curtis A. Carver United States 14 460 1.7× 203 1.4× 104 0.9× 184 1.6× 212 1.9× 33 1.1k
Shamal Faily United Kingdom 13 317 1.2× 65 0.4× 149 1.2× 84 0.7× 66 0.6× 76 576
Ronald Dodge United States 9 375 1.4× 180 1.2× 79 0.7× 91 0.8× 70 0.6× 22 452
Ivan Fléchais United Kingdom 17 473 1.8× 127 0.9× 286 2.4× 164 1.4× 128 1.2× 58 801
Noam Ben‐Asher United States 11 318 1.2× 284 1.9× 126 1.1× 191 1.6× 123 1.1× 27 651
Affan Yasin China 13 320 1.2× 79 0.5× 79 0.7× 89 0.8× 122 1.1× 45 523
Michail Tsikerdekis United States 11 193 0.7× 120 0.8× 130 1.1× 89 0.8× 131 1.2× 29 464
Joseph Migga Kizza United States 10 129 0.5× 131 0.9× 80 0.7× 68 0.6× 92 0.8× 37 344
Geber Ramalho Brazil 13 110 0.4× 63 0.4× 104 0.9× 87 0.7× 221 2.0× 64 682
Rajendra K. Raj United States 11 304 1.1× 96 0.6× 62 0.5× 31 0.3× 153 1.4× 78 566

Countries citing papers authored by Richard Ford

Since Specialization
Citations

This map shows the geographic impact of Richard Ford's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Richard Ford with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Richard Ford more than expected).

Fields of papers citing papers by Richard Ford

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Richard Ford. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Richard Ford. The network helps show where Richard Ford may publish in the future.

Co-authorship network of co-authors of Richard Ford

This figure shows the co-authorship network connecting the top 25 collaborators of Richard Ford. A scholar is included among the top collaborators of Richard Ford based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Richard Ford. Richard Ford is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ford, Richard, et al.. (2014). Bacterial quorum sensing for coordination of targeted malware. 101–108.
2.
Carvalho, Marco & Richard Ford. (2014). Moving-Target Defenses for Computer Networks. IEEE Security & Privacy. 12(2). 73–76. 48 indexed citations
3.
Ford, Richard, et al.. (2012). All your base are belong to US. 105–114. 8 indexed citations
4.
Ford, Richard, et al.. (2012). Towards Metrics for Cyber Security. eScholarship (California Digital Library). 4 indexed citations
5.
Bishop, Matt, Richard Ford, & Marco Ramilli. (2011). Results-oriented security. 7. 42–49. 1 indexed citations
6.
Somayaji, Anil, Yiru Li, Hajime Inoue, José M. Fernandez, & Richard Ford. (2009). Evaluating security products with clinical trials. PolyPublie (École Polytechnique de Montréal). 3–3. 8 indexed citations
7.
Somayaji, Anil & Richard Ford. (2009). Proceedings of the 2009 workshop on New security paradigms workshop. 14 indexed citations
8.
Ford, Richard & William H. Allen. (2009). Malware Shall Greatly Increase .... IEEE Security & Privacy. 7(6). 69–71. 3 indexed citations
9.
Workman, Michael, Richard Ford, & William H. Allen. (2008). A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. Information Security Journal A Global Perspective. 17(5-6). 267–277. 3 indexed citations
10.
Ford, Richard, et al.. (2008). Danger theory and collaborative filtering in MANETs. 5(4). 345–355. 2 indexed citations
11.
Ford, Richard & William H. Allen. (2007). How Not to Be Seen. IEEE Security & Privacy. 5(1). 67–69. 3 indexed citations
12.
Gordon, Sarah & Richard Ford. (2006). On the definition and classification of cyber crime. 2(1). 5 indexed citations
13.
Ford, Richard, et al.. (2006). Predation and the cost of replication: New approaches to malware prevention?. Computers & Security. 25(4). 257–264. 6 indexed citations
14.
Ford, Richard, et al.. (2005). Suppressing the Spread of Email Malcode using Short-term Message Recall. 1(1-2). 4–12. 2 indexed citations
15.
Ford, Richard, et al.. (2005). Internet instability and disturbance. 3–3. 1 indexed citations
16.
Ford, Richard. (2004). The future of virus detection. Information Security Technical Report. 9(2). 19–26. 1 indexed citations
17.
Ford, Richard, et al.. (2004). The Insider, Naivety, and Hostility: Security Perfect Storm?. Queue. 2(4). 58–65. 1 indexed citations
18.
Munroe, Paul, et al.. (2001). Increasing student involvement in materials engineering service subjects for mechanical engineers. International journal of engineering education. 17(6). 529–537. 5 indexed citations
19.
Gordon, Sarah & Richard Ford. (1997). Real world anti-virus product reviews and evaluations — Part 2. Network Security. 1997(1). 11–18.
20.
Gordon, Sarah & Richard Ford. (1996). Real world anti-virus product reviews and evaluations — Part 1. Network Security. 1996(12). 14–18. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026