607 total citations 34 papers, 352 citations indexed
About
Rosslin John Robles is a scholar working on Computer Networks and Communications, Information Systems and Control and Systems Engineering.
According to data from OpenAlex, Rosslin John Robles has authored 34 papers receiving a total of 352 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Computer Networks and Communications, 13 papers in Information Systems and 9 papers in Control and Systems Engineering. Recurrent topics in Rosslin John Robles's work include Smart Grid Security and Resilience (9 papers), Network Security and Intrusion Detection (9 papers) and Advanced Malware Detection Techniques (8 papers). Rosslin John Robles is often cited by papers focused on Smart Grid Security and Resilience (9 papers), Network Security and Intrusion Detection (9 papers) and Advanced Malware Detection Techniques (8 papers). Rosslin John Robles collaborates with scholars based in South Korea, Philippines and Portugal. Rosslin John Robles's co-authors include Tai-hoon Kim, Tai-hoon Kim, Minkyu Choi, Seoksoo Kim, Hojjat Adeli, Eun‐Suk Cho, Ronnie D. Caytiles, Minkyu Choi, Sang-Soo Yeo and Tae Hee Kim and has published in prestigious journals such as Communications in computer and information science, International Journal of Advanced Science and Technology and International Journal of Control and Automation.
In The Last Decade
Rosslin John Robles
23 papers
receiving
301 citations
Peers — A (Enhanced Table)
Peers by citation overlap · career bar shows stage (early→late)
cites ·
hero ref
Countries citing papers authored by Rosslin John Robles
Since
Specialization
Citations
This map shows the geographic impact of Rosslin John Robles's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Rosslin John Robles with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Rosslin John Robles more than expected).
Fields of papers citing papers by Rosslin John Robles
This network shows the impact of papers produced by Rosslin John Robles. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Rosslin John Robles. The network helps show where Rosslin John Robles may publish in the future.
Co-authorship network of co-authors of Rosslin John Robles
This figure shows the co-authorship network connecting the top 25 collaborators of Rosslin John Robles.
A scholar is included among the top collaborators of Rosslin John Robles based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Rosslin John Robles. Rosslin John Robles is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Stoica, Adrian‐Mihail & Rosslin John Robles. (2014). Encryption Scheme for Control Systems through Web.
2.
Choi, Minkyu, et al.. (2013). Utilization of different encryption schemes for securing SCADA component communication.2 indexed citations
3.
Robles, Rosslin John, et al.. (2013). SOX and its effects on IT Security Governance.1 indexed citations
4.
Robles, Rosslin John & Minkyu Choi. (2013). Assessment of the Vulnerabilities of SCADA, Control Systems and Critical Infrastructure Systems.10 indexed citations
Choi, Minkyu, et al.. (2010). A Proposed Architecture for SCADA System with Mobile Sensors. 한국정보기술학회논문지. 8(5). 13–20.2 indexed citations
9.
Robles, Rosslin John, et al.. (2010). Communication Security solution for internet SCADA. 461–463.5 indexed citations
10.
Robles, Rosslin John & Tai-hoon Kim. (2010). A Review on Security in Smart Home Development. International Journal of Advanced Science and Technology. 15. 13–22.81 indexed citations
11.
Robles, Rosslin John, et al.. (2010). Penetration Testing in Internet Protocol. 457–460.2 indexed citations
Choi, Minkyu, et al.. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. 3(3). 77–86.29 indexed citations
18.
Robles, Rosslin John, et al.. (2008). Common Threats and Vulnerabilities of Critical Infrastructures. International Journal of Control and Automation. 1(1). 17–22.9 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.