Scott Musman

559 total citations
19 papers, 362 citations indexed

About

Scott Musman is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Scott Musman has authored 19 papers receiving a total of 362 indexed citations (citations by other indexed papers that have themselves been cited), including 9 papers in Information Systems, 7 papers in Computer Networks and Communications and 6 papers in Artificial Intelligence. Recurrent topics in Scott Musman's work include Information and Cyber Security (8 papers), Cybersecurity and Cyber Warfare Studies (4 papers) and Advanced SAR Imaging Techniques (4 papers). Scott Musman is often cited by papers focused on Information and Cyber Security (8 papers), Cybersecurity and Cyber Warfare Studies (4 papers) and Advanced SAR Imaging Techniques (4 papers). Scott Musman collaborates with scholars based in United States. Scott Musman's co-authors include Charles M. Bachmann, Dermot Kerr, Andrew Turner, Michael G. Tanner, Paul J. Lehner, Lashon B. Booker, Brian Edmonds, Michael R. Grimaila, Mark S. Pfaff and Yikun Liu and has published in prestigious journals such as Neural Networks, IEEE Transactions on Aerospace and Electronic Systems and Mathematical and Computer Modelling.

In The Last Decade

Scott Musman

17 papers receiving 337 citations

Peers

Scott Musman
Scott Musman
Citations per year, relative to Scott Musman Scott Musman (= 1×) peers Hamid Esmaeili Najafabadi

Countries citing papers authored by Scott Musman

Since Specialization
Citations

This map shows the geographic impact of Scott Musman's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Scott Musman with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Scott Musman more than expected).

Fields of papers citing papers by Scott Musman

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Scott Musman. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Scott Musman. The network helps show where Scott Musman may publish in the future.

Co-authorship network of co-authors of Scott Musman

This figure shows the co-authorship network connecting the top 25 collaborators of Scott Musman. A scholar is included among the top collaborators of Scott Musman based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Scott Musman. Scott Musman is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Musman, Scott, et al.. (2019). Steps toward a principled approach to automating cyber responses. 47–47. 5 indexed citations
2.
Musman, Scott & Andrew Turner. (2018). A game oriented approach to minimizing cybersecurity risk. International Journal of Safety and Security Engineering. 8(2). 212–222. 14 indexed citations
3.
Musman, Scott & Andrew Turner. (2017). A game theoretic approach to cyber security risk management. The Journal of Defense Modeling and Simulation Applications Methodology Technology. 15(2). 127–146. 30 indexed citations
4.
Musman, Scott. (2016). Assessing prescriptive improvements to a system's cyber security and resilience. 1–6. 10 indexed citations
5.
Musman, Scott, et al.. (2015). A Cyber Mission Impact assessment tool. 1–7. 15 indexed citations
6.
Musman, Scott & Michael R. Grimaila. (2013). Mission Assurance Challenges within the Military Environment. RePEc: Research Papers in Economics. 5(2). 51–65. 1 indexed citations
7.
Drury, Jill L., Gary Klein, Scott Musman, Yikun Liu, & Mark S. Pfaff. (2012). Requirements for Data Mining the Decision Space. 1 indexed citations
8.
Musman, Scott, et al.. (2011). A systems engineering approach for crown jewels estimation and mission assurance decision making. 11. 210–216. 17 indexed citations
9.
Musman, Scott, et al.. (2011). Computing the impact of cyber attacks on complex missions. 46–51. 45 indexed citations
10.
Musman, Scott, et al.. (2011). 7.6.2 Computing the Impact of Cyber Attacks on Complex Missions. INCOSE International Symposium. 21(1). 978–983. 6 indexed citations
11.
Musman, Scott, et al.. (2007). A Tool for Parallel Distributed Reasoning about Computing Networks.. National Conference on Artificial Intelligence. 104–107.
12.
Bachmann, Charles M., et al.. (2003). Lateral inhibition neural networks for classification of simulated radar imagery. Zenodo (CERN European Organization for Nuclear Research). 2. 115–120. 8 indexed citations
13.
15.
Musman, Scott, et al.. (2000). Optimizing ship length estimates from ISAR images. 163–168 vol.1. 7 indexed citations
16.
Musman, Scott, et al.. (1997). Sensor planning for elusive targets. Mathematical and Computer Modelling. 25(3). 103–115. 25 indexed citations
17.
Musman, Scott, Dermot Kerr, & Charles M. Bachmann. (1996). Automatic recognition of ISAR ship images. IEEE Transactions on Aerospace and Electronic Systems. 32(4). 1392–1404. 150 indexed citations
18.
Bachmann, Charles M., et al.. (1994). Unsupervised BCM projection pursuit algorithms for classification of simulated radar presentations. Neural Networks. 7(4). 709–728. 15 indexed citations
19.
Musman, Scott, et al.. (1993). APPLICATION OF A REAL-TIME CONTROL STRATEGY FOR BAYESIAN BELIEF NETWORKS TO SHIP CLASSIFICATION PROBLEM SOLVING. International Journal of Pattern Recognition and Artificial Intelligence. 7(3). 513–526. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026