584 total citations 52 papers, 392 citations indexed
About
Ron Ruhl is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence.
According to data from OpenAlex, Ron Ruhl has authored 52 papers receiving a total of 392 indexed citations (citations by other indexed papers that have themselves been cited), including 37 papers in Information Systems, 22 papers in Computer Networks and Communications and 18 papers in Artificial Intelligence. Recurrent topics in Ron Ruhl's work include Information and Cyber Security (11 papers), Advanced Malware Detection Techniques (11 papers) and Privacy, Security, and Data Protection (9 papers). Ron Ruhl is often cited by papers focused on Information and Cyber Security (11 papers), Advanced Malware Detection Techniques (11 papers) and Privacy, Security, and Data Protection (9 papers). Ron Ruhl collaborates with scholars based in Canada, United States and Russia. Ron Ruhl's co-authors include Pavol Zavarsky, Dale Lindskog, Amer Aljaedi, Zhitao Huang, Jaspreet Singh, Bo‐Yan Chen and Sergey Butakov and has published in prestigious journals such as International Journal of Internet Technology and Secured Transactions, Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering and 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE).
In The Last Decade
Ron Ruhl
52 papers
receiving
351 citations
Peers — A (Enhanced Table)
Peers by citation overlap · career bar shows stage (early→late)
cites ·
hero ref
This map shows the geographic impact of Ron Ruhl's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ron Ruhl with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ron Ruhl more than expected).
This network shows the impact of papers produced by Ron Ruhl. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ron Ruhl. The network helps show where Ron Ruhl may publish in the future.
Co-authorship network of co-authors of Ron Ruhl
This figure shows the co-authorship network connecting the top 25 collaborators of Ron Ruhl.
A scholar is included among the top collaborators of Ron Ruhl based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Ron Ruhl. Ron Ruhl is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Lindskog, Dale, et al.. (2013). Redesigning secure element access control for NFC enabled android smartphones using mobile trusted computing. International Conference on Information Society. 27–34.3 indexed citations
6.
Lindskog, Dale, et al.. (2013). Two techniques for detecting packed portable executable files. International Conference on Information Society. 22–26.1 indexed citations
7.
Lindskog, Dale, et al.. (2013). A Forensic Study of the Effectiveness of Selected Anti-Virus Products Against SSDT Hooking Rootkits. Scholarly Commons (Embry–Riddle Aeronautical University). 137–160.2 indexed citations
Zavarsky, Pavol, et al.. (2012). Enhanced side-channel analysis method to detect hardware virtualization based rootkits. 192–201.3 indexed citations
10.
Zavarsky, Pavol, et al.. (2012). The implementation of a full EMV smartcard for a point-of-sale transaction. 28–35.2 indexed citations
11.
Zavarsky, Pavol, et al.. (2012). Collusion threat profile analysis: Review and analysis of MERIT model. 212–217.2 indexed citations
12.
Zavarsky, Pavol, et al.. (2012). The study of evasion of packed PE from static detection. 99–104.11 indexed citations
13.
Zavarsky, Pavol, et al.. (2012). A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. 150–157.4 indexed citations
Ruhl, Ron, et al.. (1997). Vergleich der Risikofaktorenmodelle in Deutschland nach TRGS 440 und in Österreich nach Piringer. 57. 289–293.2 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.