Sean Peisert

2.2k total citations
97 papers, 1.2k citations indexed

About

Sean Peisert is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Sean Peisert has authored 97 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 45 papers in Computer Networks and Communications, 38 papers in Artificial Intelligence and 37 papers in Information Systems. Recurrent topics in Sean Peisert's work include Network Security and Intrusion Detection (35 papers), Advanced Malware Detection Techniques (22 papers) and Smart Grid Security and Resilience (20 papers). Sean Peisert is often cited by papers focused on Network Security and Intrusion Detection (35 papers), Advanced Malware Detection Techniques (22 papers) and Smart Grid Security and Resilience (20 papers). Sean Peisert collaborates with scholars based in United States, Italy and Netherlands. Sean Peisert's co-authors include Matt Bishop, Anna Scaglione, Chuck McParland, Mahdi Jamei, Keith Marzullo, Ciaran Roberts, Reinhard Gentz, Alex McEachern, Emma Stewart and Sean Whalen and has published in prestigious journals such as Communications of the ACM, CHEST Journal and IEEE Transactions on Power Systems.

In The Last Decade

Sean Peisert

91 papers receiving 1.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sean Peisert United States 20 466 379 338 325 277 97 1.2k
Homayun Motameni Iran 20 449 1.0× 392 1.0× 397 1.2× 82 0.3× 49 0.2× 115 1.3k
Sujeet Shenoi United States 19 512 1.1× 393 1.0× 428 1.3× 353 1.1× 435 1.6× 90 1.1k
Tho Quan Vietnam 15 286 0.6× 397 1.0× 603 1.8× 45 0.1× 235 0.8× 99 1.1k
Frederick T. Sheldon United States 20 923 2.0× 725 1.9× 605 1.8× 380 1.2× 451 1.6× 152 1.7k
Norziana Jamil Malaysia 16 325 0.7× 239 0.6× 296 0.9× 122 0.4× 180 0.6× 104 958
Mário M. Freire Portugal 15 714 1.5× 622 1.6× 416 1.2× 40 0.1× 205 0.7× 100 1.3k
Saeed Jalili Iran 18 252 0.5× 335 0.9× 510 1.5× 71 0.2× 131 0.5× 92 981
Ulf Lindqvist United States 15 784 1.7× 372 1.0× 430 1.3× 265 0.8× 437 1.6× 55 1.1k
Qishi Wu United States 16 985 2.1× 453 1.2× 180 0.5× 116 0.4× 135 0.5× 93 1.2k
Rong‐Jian Chen Taiwan 17 403 0.9× 307 0.8× 613 1.8× 30 0.1× 456 1.6× 59 1.7k

Countries citing papers authored by Sean Peisert

Since Specialization
Citations

This map shows the geographic impact of Sean Peisert's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sean Peisert with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sean Peisert more than expected).

Fields of papers citing papers by Sean Peisert

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sean Peisert. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sean Peisert. The network helps show where Sean Peisert may publish in the future.

Co-authorship network of co-authors of Sean Peisert

This figure shows the co-authorship network connecting the top 25 collaborators of Sean Peisert. A scholar is included among the top collaborators of Sean Peisert based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sean Peisert. Sean Peisert is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Peisert, Sean. (2022). Unsafe at Any Clock Speed: The Insecurity of Computer System Design, Implementation, and Operation. IEEE Security & Privacy. 20(1). 4–9. 1 indexed citations
2.
Chuah, Chen‐Nee, et al.. (2022). Differentially Private Map Matching for Mobility Trajectories. eScholarship (California Digital Library). 293–303. 2 indexed citations
3.
Lawson, Christopher E., Jose Manuel Martí, Tijana Radivojević, et al.. (2020). Machine learning for metabolic engineering: A review. Metabolic Engineering. 63. 34–60. 191 indexed citations
4.
Ghosal, Dipak, et al.. (2020). Anomaly Detection for Science DMZs Using System Performance Data. 99. 492–496. 2 indexed citations
5.
Peisert, Sean & Reinhard Gentz. (2019). An Examination and Survey of Random Bit Flips and Scientific Computing. IUScholarWorks (Indiana University).
6.
Jamei, Mahdi, Anna Scaglione, & Sean Peisert. (2018). Low-Resolution Fault Localization Using Phasor Measurement Units with Community Detection. eScholarship (California Digital Library). 12 indexed citations
7.
Peisert, Sean, et al.. (2017). ASLR: How Robust Is the Randomness?. 34–41. 9 indexed citations
8.
Jamei, Mahdi, Anna Scaglione, Ciaran Roberts, et al.. (2017). Online Thevenin parameter tracking using synchrophasor data. eScholarship (California Digital Library). 1–5. 9 indexed citations
9.
Leigh, Jennifer S. A., et al.. (2017). Monitoring Big Data Transfers Over International Research Network Connections. eScholarship (California Digital Library). 2 indexed citations
10.
Leigh, Jason, et al.. (2017). Big Data and Analysis of Data Transfers for International Research Networks Using NetSage. eScholarship (California Digital Library). 31. 344–351. 4 indexed citations
11.
Adams, Jason Y., et al.. (2015). Automated Mechanical Ventilator Waveform Analysis of Patient-Ventilator Asynchrony. CHEST Journal. 148(4). 175A–175A. 2 indexed citations
12.
Wang, Zhifang, et al.. (2012). Networked loads in the distribution grid. eScholarship (California Digital Library). 2012(1). 1–7. 2 indexed citations
13.
Peisert, Sean & Stephen Schwab. (2011). Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test. USENIX Security Symposium. 4 indexed citations
14.
Peisert, Sean, et al.. (2010). Modeling and analyzing faults to improve election process robustness. USF Scholarship Repository (University of San Francisco). 1–8. 13 indexed citations
15.
Peisert, Sean, et al.. (2010). Modeling Faults to Improve Election Process Robustness. eScholarship (California Digital Library). 2010. 1. 2 indexed citations
16.
Bishop, Matt, et al.. (2009). E-voting and forensics: prying open the black box. eScholarship (California Digital Library). 2009. 3–3. 7 indexed citations
17.
Bishop, Matt, et al.. (2008). Resolving the Unexpected in Elections: Election Officials' Options. EngagedScholarship @ Cleveland State University (Cleveland State University). 2 indexed citations
18.
Peisert, Sean, et al.. (2007). Toward Models for Forensic Analysis. 3–15. 30 indexed citations
19.
Peisert, Sean. (2005). Forensics For System Administrators. eScholarship (California Digital Library). 30(4). 34–42. 8 indexed citations
20.
Peisert, Sean, et al.. (2000). A Programming Model for Automated Decomposition on Heterogeneous Clusters of Multiprocessors. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026