Sajad Khorsandroo

1.1k total citations · 1 hit paper
27 papers, 612 citations indexed

About

Sajad Khorsandroo is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Sajad Khorsandroo has authored 27 papers receiving a total of 612 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Computer Networks and Communications, 9 papers in Information Systems and 9 papers in Signal Processing. Recurrent topics in Sajad Khorsandroo's work include Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (9 papers) and Software-Defined Networks and 5G (6 papers). Sajad Khorsandroo is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Advanced Malware Detection Techniques (9 papers) and Software-Defined Networks and 5G (6 papers). Sajad Khorsandroo collaborates with scholars based in United States, Malaysia and Taiwan. Sajad Khorsandroo's co-authors include Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Ali Şaman Tosun, Rafidah Md Noor, Roberto Doriguzzi-Corin, Kaushik Roy, Xiaohong Yuan, Niraj Thapa and Kaushik Roy and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Ecotoxicology and Environmental Safety.

In The Last Decade

Sajad Khorsandroo

25 papers receiving 586 citations

Hit Papers

Security and Privacy in Smart Farming: Challenges and Opp... 2020 2026 2022 2024 2020 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sajad Khorsandroo United States 11 331 162 134 119 118 27 612
Mahmoud Abdelsalam United States 13 367 1.1× 252 1.6× 208 1.6× 223 1.9× 226 1.9× 24 761
Ravindra C. Thool India 14 330 1.0× 161 1.0× 222 1.7× 153 1.3× 158 1.3× 57 769
Anusha Vangala India 8 349 1.1× 135 0.8× 114 0.9× 437 3.7× 55 0.5× 20 657
Abhishek Khanna India 5 310 0.9× 289 1.8× 72 0.5× 133 1.1× 33 0.3× 8 782
Dae‐Heon Park South Korea 11 335 1.0× 188 1.2× 60 0.4× 134 1.1× 28 0.2× 25 668
Koushik Majumder India 10 299 0.9× 100 0.6× 79 0.6× 112 0.9× 45 0.4× 63 566
Nurzaman Ahmed India 14 587 1.8× 250 1.5× 81 0.6× 108 0.9× 46 0.4× 58 988
Surbhi Sharma India 11 183 0.6× 168 1.0× 93 0.7× 104 0.9× 37 0.3× 35 580

Countries citing papers authored by Sajad Khorsandroo

Since Specialization
Citations

This map shows the geographic impact of Sajad Khorsandroo's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sajad Khorsandroo with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sajad Khorsandroo more than expected).

Fields of papers citing papers by Sajad Khorsandroo

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sajad Khorsandroo. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sajad Khorsandroo. The network helps show where Sajad Khorsandroo may publish in the future.

Co-authorship network of co-authors of Sajad Khorsandroo

This figure shows the co-authorship network connecting the top 25 collaborators of Sajad Khorsandroo. A scholar is included among the top collaborators of Sajad Khorsandroo based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sajad Khorsandroo. Sajad Khorsandroo is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Vishwamitra, Nishant, et al.. (2025). AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab. 12(1). 8–8. 1 indexed citations
2.
Abdelsalam, Mahmoud, et al.. (2025). Explainable Artificial Intelligence (XAI) for Malware Analysis: A Survey of Techniques, Applications, and Open Challenges. IEEE Access. 13. 61611–61640. 3 indexed citations
3.
Khorsandroo, Sajad, et al.. (2025). An innovative supply chain solution for information management in cyber resilience: Blockchain technology. Journal of Innovation & Knowledge. 10(4). 100744–100744. 1 indexed citations
4.
Abdelsalam, Mahmoud, et al.. (2025). Deep learning based XIoT malware analysis: A comprehensive survey, taxonomy, and research challenges. Journal of Network and Computer Applications. 242. 104258–104258.
5.
Khorsandroo, Sajad, et al.. (2024). DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks. Journal of Network and Systems Management. 32(2). 1 indexed citations
7.
Khorsandroo, Sajad, et al.. (2023). Cybersecurity and privacy in smart bioprinting. Bioprinting. 36. e00321–e00321. 11 indexed citations
8.
Ameri, Rasoul, Chung-Chian Hsu, Shahab S. Band, et al.. (2023). Forecasting PM 2.5 concentration based on integrating of CEEMDAN decomposition method with SVM and LSTM. Ecotoxicology and Environmental Safety. 266. 115572–115572. 17 indexed citations
9.
Khorsandroo, Sajad, et al.. (2023). Machine learning based fileless malware traffic classification using image visualization. Cybersecurity. 6(1). 9 indexed citations
10.
Khorsandroo, Sajad, et al.. (2023). Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets. 18 indexed citations
11.
Khorsandroo, Sajad, et al.. (2022). Machine Learning Algorithms and Frameworks in Ransomware Detection. IEEE Access. 10. 117597–117610. 11 indexed citations
12.
Thapa, Niraj, et al.. (2020). Anomaly Detection on IoT Network Intrusion Using Machine Learning. 1–5. 47 indexed citations
13.
Yuan, Xiaohong, et al.. (2020). Teaching Flooding Attack to the SDN Data Plane with POGIL. 194–199. 3 indexed citations
14.
Khorsandroo, Sajad & Ali Şaman Tosun. (2019). White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane. 100–107. 5 indexed citations
15.
Khorsandroo, Sajad & Ali Şaman Tosun. (2018). Time Inference Attacks on Software Defined Networks: Challenges and Countermeasures. 342–349. 11 indexed citations
16.
Nasir, Mostofa Kamal, et al.. (2013). Vehicle Adhoc Sensor Network Framework to Provide Green Communication for Urban Operation Rescue. 1(2). 77–82. 11 indexed citations
17.
Khorsandroo, Sajad, et al.. (2012). The role of psychophysics laws in quality of experience assessment. 446–452. 6 indexed citations
18.
Noor, Rafidah Md, et al.. (2012). Using VANET to support green vehicle communications for urban operation rescue. 324–328. 6 indexed citations
19.
Khorsandroo, Sajad, et al.. (2012). Stimulus-centric versus perception-centric relations in quality of experience assessment. 30. 1–6. 5 indexed citations
20.
Khorsandroo, Sajad, et al.. (2012). A generic quantitative relationship between quality of experience and packet loss in video streaming services. 30. 352–356. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026