Scott Knight

430 total citations
34 papers, 208 citations indexed

About

Scott Knight is a scholar working on Signal Processing, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Scott Knight has authored 34 papers receiving a total of 208 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Signal Processing, 13 papers in Artificial Intelligence and 8 papers in Computer Networks and Communications. Recurrent topics in Scott Knight's work include Advanced Malware Detection Techniques (13 papers), Network Security and Intrusion Detection (7 papers) and Software Testing and Debugging Techniques (6 papers). Scott Knight is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), Network Security and Intrusion Detection (7 papers) and Software Testing and Debugging Techniques (6 papers). Scott Knight collaborates with scholars based in Canada, Germany and France. Scott Knight's co-authors include Thomas Dean, John A. Clark, Sylvain Leblanc, José M. Fernandez, Tom Dean, Songtao Zhang, Patrick C. K. Hung, Allison Barto, Koby Smith and Scott T. Acton and has published in prestigious journals such as Future Generation Computer Systems, IEEE Transactions on Information Forensics and Security and Optical Engineering.

In The Last Decade

Scott Knight

30 papers receiving 184 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Scott Knight Canada 9 93 86 75 71 42 34 208
Musard Balliu Sweden 11 198 2.1× 176 2.0× 112 1.5× 108 1.5× 26 0.6× 27 285
Ronghai Yang Hong Kong 6 117 1.3× 207 2.4× 99 1.3× 134 1.9× 97 2.3× 9 290
Yung Ryn Choe United States 7 118 1.3× 96 1.1× 156 2.1× 68 1.0× 23 0.5× 19 254
Keisuke Takemori Japan 8 89 1.0× 197 2.3× 242 3.2× 114 1.6× 65 1.5× 25 289
Amit Praseed India 9 178 1.9× 167 1.9× 234 3.1× 105 1.5× 13 0.3× 10 315
Matthew Elder United States 9 122 1.3× 152 1.8× 267 3.6× 169 2.4× 34 0.8× 21 362
Prakash Kolan United States 9 128 1.4× 50 0.6× 184 2.5× 136 1.9× 14 0.3× 12 287
Thomas Given-Wilson France 9 96 1.0× 75 0.9× 105 1.4× 54 0.8× 19 0.5× 25 203
Timothy L. Hinrichs United States 7 169 1.8× 91 1.1× 164 2.2× 179 2.5× 42 1.0× 16 320
Rodolphe Ortalo France 3 34 0.4× 97 1.1× 189 2.5× 181 2.5× 52 1.2× 3 238

Countries citing papers authored by Scott Knight

Since Specialization
Citations

This map shows the geographic impact of Scott Knight's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Scott Knight with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Scott Knight more than expected).

Fields of papers citing papers by Scott Knight

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Scott Knight. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Scott Knight. The network helps show where Scott Knight may publish in the future.

Co-authorship network of co-authors of Scott Knight

This figure shows the co-authorship network connecting the top 25 collaborators of Scott Knight. A scholar is included among the top collaborators of Scott Knight based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Scott Knight. Scott Knight is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Coyle, Laura, Scott Knight, Allison Barto, et al.. (2019). Ultra-Stable Telescope Research and Analysis (ULTRA). Bulletin of the American Astronomical Society. 51(7). 80. 1 indexed citations
2.
Knight, Scott, et al.. (2018). A systematic approach of feature selection for encrypted network traffic classification. 1–8. 15 indexed citations
3.
Knight, Scott, et al.. (2018). ORGODEX: Service Portfolios for the Cloud. 21. 887–890. 1 indexed citations
4.
Feinberg, Lee D., Matthew R. Bolcar, Scott Knight, & David C. Redding. (2017). Ultra-Stable Segmented Telescope Sensing and Control Architecture. 1 indexed citations
5.
Knight, Scott, et al.. (2017). A timing-based covert channel for SCADA networks. PolyPublie (École Polytechnique de Montréal). 8–15. 4 indexed citations
6.
Knight, Scott, et al.. (2016). Cybersecurity: A Generic Reference Curriculum. Connections The Quarterly Journal. 16(2). 1 indexed citations
7.
Fernandez, José M., et al.. (2016). A Modbus command and control channel. PolyPublie (École Polytechnique de Montréal). 16 indexed citations
8.
Brand, Jeffrey E., et al.. (2014). Mining Constructivism in the University: The case of creative mode. e-publications@bond (Bond University). 57–74. 1 indexed citations
9.
Fernandez, José M., et al.. (2014). Modelling physical impact of cyber attacks. PolyPublie (École Polytechnique de Montréal). 1–6. 2 indexed citations
10.
Krotofil, Marina, et al.. (2014). Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape. 1 indexed citations
11.
Fernandez, José M., et al.. (2013). An isolated virtual cluster for SCADA network security research. Electronic workshops in computing. 13 indexed citations
12.
Clark, John A., Sylvain Leblanc, & Scott Knight. (2011). Risks associated with USB Hardware Trojan devices used by insiders. 201–208. 12 indexed citations
13.
Knight, Scott, et al.. (2010). Role Explosion: Acknowledging the Problem.. Software Engineering Research and Practice. 349–355. 22 indexed citations
14.
Knight, Scott, et al.. (2010). PINPRICK ATTACKS A LESSER INCLUDED CASE. PolyPublie (École Polytechnique de Montréal). 3 indexed citations
15.
Clark, John A., Sylvain Leblanc, & Scott Knight. (2010). Compromise through USB-based Hardware Trojan Horse device. Future Generation Computer Systems. 27(5). 555–563. 19 indexed citations
16.
Knight, Scott, et al.. (2009). One Employee and Several Applications: An Information Management Case Study.. Software Engineering Research and Practice. 179–185. 1 indexed citations
17.
Knight, Scott, et al.. (2009). Permutation-based steganographic channels. 67–73. 2 indexed citations
18.
Zhang, Songtao, Thomas Dean, & Scott Knight. (2007). Lightweight State Based Mutation Testing for Security. 223–232. 2 indexed citations
19.
Dean, Thomas, et al.. (2005). SCL: a language for security testing of network applications. Conference of the Centre for Advanced Studies on Collaborative Research. 155–164. 15 indexed citations
20.
Knight, Scott, et al.. (2004). Syntax-based Vulnerability Testing of Frame-based Network Protocols.. 155–160. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026