Ron Bitton

759 total citations
19 papers, 376 citations indexed

About

Ron Bitton is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Ron Bitton has authored 19 papers receiving a total of 376 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Computer Networks and Communications, 10 papers in Information Systems and 8 papers in Artificial Intelligence. Recurrent topics in Ron Bitton's work include Network Security and Intrusion Detection (9 papers), Information and Cyber Security (7 papers) and Advanced Malware Detection Techniques (5 papers). Ron Bitton is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Information and Cyber Security (7 papers) and Advanced Malware Detection Techniques (5 papers). Ron Bitton collaborates with scholars based in Israel, Japan and United Kingdom. Ron Bitton's co-authors include Asaf Shabtai, Yuval Elovici, Ryusuke Masuoka, Ben Nassi, Lior Rokach, Rami Puzis, Bracha Shapira, Inderjeet Singh, Yair Meidan and Daniel Benatar and has published in prestigious journals such as ACM Computing Surveys, Machine Learning and Knowledge-Based Systems.

In The Last Decade

Ron Bitton

19 papers receiving 363 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ron Bitton Israel 12 160 152 136 86 61 19 376
Kai Zhou United States 12 97 0.6× 204 1.3× 132 1.0× 76 0.9× 61 1.0× 53 412
Xiaogang Zhu Australia 10 135 0.8× 175 1.2× 164 1.2× 212 2.5× 51 0.8× 31 554
Murtaza Ahmed Siddiqi South Korea 6 216 1.4× 109 0.7× 69 0.5× 62 0.7× 133 2.2× 8 375
Ion Bica Romania 13 301 1.9× 137 0.9× 138 1.0× 142 1.7× 46 0.8× 32 424
Kyusuk Han South Korea 11 330 2.1× 148 1.0× 207 1.5× 42 0.5× 154 2.5× 41 474
Samiha Ayed France 13 177 1.1× 148 1.0× 117 0.9× 47 0.5× 155 2.5× 37 382
S. Chithra India 10 161 1.0× 84 0.6× 77 0.6× 30 0.3× 65 1.1× 30 295
Nian Xue China 8 215 1.3× 113 0.7× 237 1.7× 26 0.3× 41 0.7× 24 419
Marwan Omar United States 12 161 1.0× 117 0.8× 107 0.8× 125 1.5× 50 0.8× 84 391

Countries citing papers authored by Ron Bitton

Since Specialization
Citations

This map shows the geographic impact of Ron Bitton's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ron Bitton with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ron Bitton more than expected).

Fields of papers citing papers by Ron Bitton

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ron Bitton. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ron Bitton. The network helps show where Ron Bitton may publish in the future.

Co-authorship network of co-authors of Ron Bitton

This figure shows the co-authorship network connecting the top 25 collaborators of Ron Bitton. A scholar is included among the top collaborators of Ron Bitton based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ron Bitton. Ron Bitton is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Bitton, Ron, et al.. (2024). Adversarial machine learning threat analysis and remediation in Open Radio Access Network (O-RAN). Journal of Network and Computer Applications. 236. 104090–104090. 3 indexed citations
2.
Bitton, Ron, et al.. (2024). Improving interpretability via regularization of neural activation sensitivity. Machine Learning. 113(9). 6165–6196. 2 indexed citations
3.
Bitton, Ron, et al.. (2023). Assessing Aircraft Security: A Comprehensive Survey and Methodology for Evaluation. ACM Computing Surveys. 56(4). 1–40. 12 indexed citations
4.
Bitton, Ron, et al.. (2022). Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Computing Surveys. 55(9). 1–36. 13 indexed citations
5.
Bitton, Ron, et al.. (2022). On the vulnerability of anti-malware solutions to DNS attacks. Computers & Security. 116. 102687–102687. 10 indexed citations
6.
Bitton, Ron, et al.. (2022). Security of Open Radio Access Networks. Computers & Security. 122. 102890–102890. 23 indexed citations
7.
Meidan, Yair, et al.. (2022). D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks. Computers & Security. 126. 103073–103073. 7 indexed citations
8.
Bitton, Ron, et al.. (2022). Contextual security awareness: A context-based approach for assessing the security awareness of users. Knowledge-Based Systems. 246. 108709–108709. 17 indexed citations
9.
Nassi, Ben, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, & Yuval Elovici. (2021). SoK: Security and Privacy in the Age of Commercial Drones. 1434–1451. 66 indexed citations
10.
Bitton, Ron, et al.. (2021). Heuristic Approach for Countermeasure Selection Using Attack Graphs. 1–16. 16 indexed citations
11.
Bitton, Ron, et al.. (2021). A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. 2574–2583. 15 indexed citations
13.
Bitton, Ron, et al.. (2019). IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution. Pervasive and Mobile Computing. 58. 101019–101019. 10 indexed citations
14.
Bitton, Ron, et al.. (2019). Design Procedure of Knowledge Base for Practical Attack Graph Generation. 594–601. 11 indexed citations
15.
Bitton, Ron & Asaf Shabtai. (2019). A Machine Learning-Based Intrusion Detection System for Securing Remote Desktop Connections to Electronic Flight Bag Servers. IEEE Transactions on Dependable and Secure Computing. 18(3). 1164–1181. 35 indexed citations
16.
Bitton, Ron, et al.. (2018). Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices. arXiv (Cornell University). 243–260. 1 indexed citations
17.
18.
Bitton, Ron, et al.. (2017). A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems. 153–156. 3 indexed citations
19.
Bitton, Ron, et al.. (2017). Taxonomy of mobile users' security awareness. Computers & Security. 73. 266–293. 32 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026