Ron Ruhl

584 total citations
52 papers, 392 citations indexed

About

Ron Ruhl is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Ron Ruhl has authored 52 papers receiving a total of 392 indexed citations (citations by other indexed papers that have themselves been cited), including 37 papers in Information Systems, 22 papers in Computer Networks and Communications and 18 papers in Artificial Intelligence. Recurrent topics in Ron Ruhl's work include Information and Cyber Security (11 papers), Advanced Malware Detection Techniques (11 papers) and Privacy, Security, and Data Protection (9 papers). Ron Ruhl is often cited by papers focused on Information and Cyber Security (11 papers), Advanced Malware Detection Techniques (11 papers) and Privacy, Security, and Data Protection (9 papers). Ron Ruhl collaborates with scholars based in Canada, United States and Russia. Ron Ruhl's co-authors include Pavol Zavarsky, Dale Lindskog, Amer Aljaedi, Zhitao Huang, Jaspreet Singh, Bo‐Yan Chen and Sergey Butakov and has published in prestigious journals such as International Journal of Internet Technology and Secured Transactions, Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering and 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE).

In The Last Decade

Ron Ruhl

52 papers receiving 351 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ron Ruhl Canada 12 286 166 155 114 33 52 392
Siti Rahayu Selamat Malaysia 12 274 1.0× 218 1.3× 199 1.3× 87 0.8× 42 1.3× 39 436
Dale Lindskog Canada 12 309 1.1× 232 1.4× 193 1.2× 110 1.0× 31 0.9× 45 398
Howard Chivers United Kingdom 12 216 0.8× 117 0.7× 122 0.8× 93 0.8× 31 0.9× 31 328
Luca Verderame Italy 11 230 0.8× 201 1.2× 120 0.8× 97 0.9× 29 0.9× 34 366
Sean Barnum United States 9 374 1.3× 208 1.3× 175 1.1× 96 0.8× 39 1.2× 12 457
Victor Clincy United States 11 159 0.6× 106 0.6× 134 0.9× 93 0.8× 33 1.0× 31 299
Van-Hau Pham Vietnam 11 203 0.7× 160 1.0× 261 1.7× 170 1.5× 20 0.6× 79 439
Roberto Carbone Italy 11 329 1.2× 118 0.7× 215 1.4× 176 1.5× 23 0.7× 42 450
Ziad A. Al-Sharif Jordan 11 267 0.9× 141 0.8× 159 1.0× 131 1.1× 68 2.1× 34 365
Flavio Lombardi Italy 10 422 1.5× 119 0.7× 287 1.9× 222 1.9× 35 1.1× 31 593

Countries citing papers authored by Ron Ruhl

Since Specialization
Citations

This map shows the geographic impact of Ron Ruhl's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ron Ruhl with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ron Ruhl more than expected).

Fields of papers citing papers by Ron Ruhl

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ron Ruhl. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ron Ruhl. The network helps show where Ron Ruhl may publish in the future.

Co-authorship network of co-authors of Ron Ruhl

This figure shows the co-authorship network connecting the top 25 collaborators of Ron Ruhl. A scholar is included among the top collaborators of Ron Ruhl based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ron Ruhl. Ron Ruhl is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ruhl, Ron, et al.. (2020). Securing the Authentication Process of LTE Base Stations. 2020 International Conference on Electrical, Communication, and Computer Engineering (ICECCE). 1–6. 2 indexed citations
3.
Ruhl, Ron, et al.. (2015). Fingerprint security for protecting EMV payment cards. i. 95–101. 3 indexed citations
4.
Lindskog, Dale, et al.. (2014). An Alternate Secure Element Access Control for NFC Enabled Android Smartphones. 4(1). 391–399. 1 indexed citations
5.
Lindskog, Dale, et al.. (2013). Redesigning secure element access control for NFC enabled android smartphones using mobile trusted computing. International Conference on Information Society. 27–34. 3 indexed citations
6.
Lindskog, Dale, et al.. (2013). Two techniques for detecting packed portable executable files. International Conference on Information Society. 22–26. 1 indexed citations
7.
Lindskog, Dale, et al.. (2013). A Forensic Study of the Effectiveness of Selected Anti-Virus Products Against SSDT Hooking Rootkits. Scholarly Commons (Embry–Riddle Aeronautical University). 137–160. 2 indexed citations
9.
Zavarsky, Pavol, et al.. (2012). Enhanced side-channel analysis method to detect hardware virtualization based rootkits. 192–201. 3 indexed citations
10.
Zavarsky, Pavol, et al.. (2012). The implementation of a full EMV smartcard for a point-of-sale transaction. 28–35. 2 indexed citations
11.
Zavarsky, Pavol, et al.. (2012). Collusion threat profile analysis: Review and analysis of MERIT model. 212–217. 2 indexed citations
12.
Zavarsky, Pavol, et al.. (2012). The study of evasion of packed PE from static detection. 99–104. 11 indexed citations
13.
Zavarsky, Pavol, et al.. (2012). A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management. 150–157. 4 indexed citations
14.
Zavarsky, Pavol, et al.. (2011). Trend Analysis of the CVE for Software Vulnerability Management. 1290–1293. 33 indexed citations
15.
Zavarsky, Pavol, et al.. (2011). Performance Evaluation of Oracle VM Server Virtualization Software 64 Bit Linux Environment. 51–57. 6 indexed citations
16.
Zavarsky, Pavol, et al.. (2011). An Analysis of CVSS v2 Environmental Scoring. 1125–1130. 13 indexed citations
17.
Lindskog, Dale, et al.. (2011). Risk Mitigation Strategies for Mobile Wi-Fi Robot Toys from Online Pedophiles. 1220–1223. 10 indexed citations
19.
Zavarsky, Pavol, et al.. (2009). Threat Modeling for CSRF Attacks. 486–491. 34 indexed citations
20.
Ruhl, Ron, et al.. (1997). Vergleich der Risikofaktorenmodelle in Deutschland nach TRGS 440 und in Österreich nach Piringer. 57. 289–293. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026