Richard Smith

596 total citations
23 papers, 299 citations indexed

About

Richard Smith is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Richard Smith has authored 23 papers receiving a total of 299 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Information Systems, 9 papers in Computer Networks and Communications and 9 papers in Signal Processing. Recurrent topics in Richard Smith's work include Information and Cyber Security (13 papers), Network Security and Intrusion Detection (9 papers) and Advanced Malware Detection Techniques (9 papers). Richard Smith is often cited by papers focused on Information and Cyber Security (13 papers), Network Security and Intrusion Detection (9 papers) and Advanced Malware Detection Techniques (9 papers). Richard Smith collaborates with scholars based in United Kingdom, Australia and Algeria. Richard Smith's co-authors include Helge Janicke, Λέανδρος Μαγλαράς, Mohamed Amine Ferrag, D. Sterne, Fabio Caraffini, Allan F. Cook, Stefan Kühn, Ying He, Ali H. Al‐Bayatti and Andrew Nicholson and has published in prestigious journals such as SHILAP Revista de lepidopterología, Information Sciences and Australasian Journal of Paramedicine.

In The Last Decade

Richard Smith

22 papers receiving 277 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Richard Smith United Kingdom 10 178 145 112 90 79 23 299
Dina Hadžiosmanović Netherlands 5 144 0.8× 55 0.4× 82 0.7× 160 1.8× 75 0.9× 9 223
Andrea Carcano Italy 6 183 1.0× 50 0.3× 89 0.8× 204 2.3× 95 1.2× 9 276
Jason Jaskolka Canada 8 59 0.3× 75 0.5× 52 0.5× 23 0.3× 79 1.0× 47 181
Jeffrey Pawlick United States 6 131 0.7× 112 0.8× 70 0.6× 66 0.7× 41 0.5× 8 222
Anastasija Collen Switzerland 9 139 0.8× 107 0.7× 68 0.6× 32 0.4× 81 1.0× 22 247
Sandra Rueda Colombia 11 213 1.2× 136 0.9× 110 1.0× 57 0.6× 170 2.2× 28 357
Takoua Abdellatif Tunisia 9 170 1.0× 66 0.5× 55 0.5× 27 0.3× 133 1.7× 29 257
Μάριος Αναγνωστόπουλος Greece 9 215 1.2× 142 1.0× 155 1.4× 23 0.3× 155 2.0× 18 339
Alexander Branitskiy Russia 8 167 0.9× 60 0.4× 58 0.5× 66 0.7× 93 1.2× 20 230
Nicolai Kuntze Germany 9 82 0.5× 115 0.8× 60 0.5× 56 0.6× 89 1.1× 38 219

Countries citing papers authored by Richard Smith

Since Specialization
Citations

This map shows the geographic impact of Richard Smith's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Richard Smith with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Richard Smith more than expected).

Fields of papers citing papers by Richard Smith

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Richard Smith. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Richard Smith. The network helps show where Richard Smith may publish in the future.

Co-authorship network of co-authors of Richard Smith

This figure shows the co-authorship network connecting the top 25 collaborators of Richard Smith. A scholar is included among the top collaborators of Richard Smith based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Richard Smith. Richard Smith is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Smith, Richard, et al.. (2025). Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT). Computers, materials & continua/Computers, materials & continua (Print). 82(2). 3619–3641. 1 indexed citations
2.
Caraffini, Fabio, et al.. (2023). Driving in the Rain: A Survey toward Visibility Estimation through Windshields. International Journal of Intelligent Systems. 2023(1). 10 indexed citations
3.
Nicholson, Andrew, et al.. (2021). A Novel Hybrid Cyber Range for Security Exercises on Cyber-Physical Systems. Australasian Journal of Paramedicine. 8(1). 16–34. 1 indexed citations
4.
Kühn, Stefan, et al.. (2021). SCIPS: A serious game using a guidance mechanic to scaffold effective training for cyber security. Information Sciences. 580. 524–540. 13 indexed citations
5.
Smith, Richard, et al.. (2021). The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework. Computers & Security. 109. 102398–102398. 4 indexed citations
6.
Ferrag, Mohamed Amine, Λέανδρος Μαγλαράς, Helge Janicke, & Richard Smith. (2019). Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis. Electronic workshops in computing. 47 indexed citations
7.
Janicke, Helge, Richard Smith, Λέανδρος Μαγλαράς, & Allan F. Cook. (2018). Managing incident response in the industrial internet of things. International Journal of Internet Technology and Secured Transactions. 8(2). 251–251. 2 indexed citations
8.
Cook, Allan F., Λέανδρος Μαγλαράς, Richard Smith, & Helge Janicke. (2018). Managing incident response in the industrial internet of things. International Journal of Internet Technology and Secured Transactions. 8(2). 251–251. 9 indexed citations
9.
Smith, Richard, et al.. (2018). Vulnerability Analysis of Network Scanning on SCADA Systems. Security and Communication Networks. 2018. 1–21. 51 indexed citations
10.
Smith, Richard, et al.. (2017). SCIPS. Edinburgh Napier Research Repository (Edinburgh Napier University). 7(2). 1–15. 5 indexed citations
11.
Janicke, Helge, et al.. (2017). The industrial control system cyber defence triage process. Computers & Security. 70. 467–481. 36 indexed citations
12.
Janicke, Helge, et al.. (2017). Towards location-aware access control and data privacy in inter-cloud communications. 3. 739–744. 1 indexed citations
13.
Smith, Richard, et al.. (2017). An assessment of the application of IT security mechanisms to industrial control systems. International Journal of Internet Technology and Secured Transactions. 7(2). 144–144. 8 indexed citations
14.
Janicke, Helge, et al.. (2017). An assessment of the application of IT security mechanisms to industrial control systems. International Journal of Internet Technology and Secured Transactions. 7(2). 144–144. 9 indexed citations
15.
Smith, Richard, et al.. (2017). Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Journal of Sensor and Actuator Networks. 6(3). 16–16. 4 indexed citations
16.
Smith, Richard, et al.. (2016). Measuring the Risk of Cyber Attack in Industrial Control Systems. Electronic workshops in computing. 20 indexed citations
17.
Smith, Richard, et al.. (2016). Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure. Electronic workshops in computing. 9 indexed citations
18.
Μαγλαράς, Λέανδρος, et al.. (2016). The mimetic virus: a vector for cyberterrorism. International Journal of Business Continuity and Risk Management. 6(4). 259–259. 2 indexed citations
19.
Nicholson, Andrew, et al.. (2016). Attribution of Cyber Attacks on Industrial Control Systems. SHILAP Revista de lepidopterología. 3(7). e3–e3. 11 indexed citations
20.
Smith, Richard, et al.. (2002). Cooperative Intrusion Traceback and Response Architecture (CITRA). 1. 56–68. 49 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026