Sean W. Smith

5.0k total citations
155 papers, 2.5k citations indexed

About

Sean W. Smith is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Sean W. Smith has authored 155 papers receiving a total of 2.5k indexed citations (citations by other indexed papers that have themselves been cited), including 84 papers in Artificial Intelligence, 69 papers in Information Systems and 57 papers in Computer Networks and Communications. Recurrent topics in Sean W. Smith's work include Security and Verification in Computing (48 papers), Advanced Malware Detection Techniques (42 papers) and Cryptography and Data Security (32 papers). Sean W. Smith is often cited by papers focused on Security and Verification in Computing (48 papers), Advanced Malware Detection Techniques (42 papers) and Cryptography and Data Security (32 papers). Sean W. Smith collaborates with scholars based in United States, United Kingdom and Australia. Sean W. Smith's co-authors include Apu Kapadia, Patrick P. Tsang, Ross Koppel, David M. Nicol, Denise Anthony, Meiyuan Zhao, Sergey Bratus, Man Ho Au, Timothy Williamson and Jim Blythe and has published in prestigious journals such as Experimental Neurology, Computer and Journal of the American Medical Informatics Association.

In The Last Decade

Sean W. Smith

146 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sean W. Smith United States 27 1.5k 1.1k 817 573 319 155 2.5k
Seungyeop Han United States 14 869 0.6× 980 0.9× 1.0k 1.3× 1.3k 2.2× 383 1.2× 24 2.5k
Dinghao Wu United States 28 1.0k 0.7× 1.2k 1.1× 516 0.6× 1.4k 2.5× 104 0.3× 103 2.4k
Awais Rashid United Kingdom 28 2.2k 1.4× 2.8k 2.6× 856 1.0× 426 0.7× 318 1.0× 268 3.7k
Zakir Durumeric United States 25 2.0k 1.3× 1.2k 1.2× 2.1k 2.6× 1.4k 2.5× 340 1.1× 57 3.5k
Vanja Josifovski United States 31 1.6k 1.1× 1.3k 1.2× 1.1k 1.4× 655 1.1× 251 0.8× 93 3.1k
Stefanos Gritzalis Greece 32 1.6k 1.1× 1.5k 1.4× 1.8k 2.2× 771 1.3× 709 2.2× 230 3.7k
Kirill Levchenko United States 28 1.1k 0.8× 2.2k 2.1× 1.4k 1.8× 822 1.4× 495 1.6× 67 3.2k
Matthew Smith Germany 28 949 0.6× 1.9k 1.8× 1.0k 1.3× 1.2k 2.0× 691 2.2× 118 3.2k
Matt Bishop United States 29 1.5k 1.0× 2.0k 1.9× 1.6k 1.9× 1.5k 2.6× 500 1.6× 220 3.6k

Countries citing papers authored by Sean W. Smith

Since Specialization
Citations

This map shows the geographic impact of Sean W. Smith's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sean W. Smith with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sean W. Smith more than expected).

Fields of papers citing papers by Sean W. Smith

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sean W. Smith. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sean W. Smith. The network helps show where Sean W. Smith may publish in the future.

Co-authorship network of co-authors of Sean W. Smith

This figure shows the co-authorship network connecting the top 25 collaborators of Sean W. Smith. A scholar is included among the top collaborators of Sean W. Smith based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sean W. Smith. Sean W. Smith is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Smith, Sean W., et al.. (2021). What We Have Here Is Failure to Validate: Summer of LangSec. IEEE Security & Privacy. 19(3). 17–23. 3 indexed citations
2.
Smith, Sean W.. (2020). Securing the Internet of Things: An Ongoing Challenge. Computer. 53(6). 62–66. 5 indexed citations
3.
Novak, Christopher, et al.. (2017). Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.. Symposium On Usable Privacy and Security. 1 indexed citations
4.
Korbar, Bruno, et al.. (2016). Validating an Agent-Based Model of Human Password Behavior. National Conference on Artificial Intelligence. 4 indexed citations
5.
Koppel, Ross, et al.. (2016). Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. Symposium On Usable Privacy and Security. 6 indexed citations
6.
Smith, Sean W., et al.. (2015). Mismorphism: a Semiotic Model of Computer Security Circumvention. 172–182. 4 indexed citations
7.
Smith, Sean W., et al.. (2013). Privacy-preserving screen capture: Towards closing the loop for health IT usability. Journal of Biomedical Informatics. 46(4). 721–733. 5 indexed citations
8.
Smith, Sean W. & Ross Koppel. (2013). Healthcare information technology's relativity problems: a typology of how patients' physical reality, clinicians' mental models, and healthcare information technology differ. Journal of the American Medical Informatics Association. 21(1). 117–131. 65 indexed citations
9.
Smith, Sean W., et al.. (2012). XUTools: UNIX commands for processing next-generation structured text. USENIX Large Installation Systems Administration Conference. 83–100. 1 indexed citations
10.
Bratus, Sergey, et al.. (2011). Using hierarchal change mining to manage network security policy evolution. 8–8. 3 indexed citations
11.
Stolfo, Salvatore J., et al.. (2010). Insider Attack and Cyber Security: Beyond the Hacker. Digital Access to Libraries (Université catholique de Louvain (UCL), l'Université de Namur (UNamur) and the Université Saint-Louis (USL-B)). 36 indexed citations
12.
Smith, Sean W.. (2010). Hardware Security Modules. 283–304. 2 indexed citations
13.
Stolfo, Salvatore J., et al.. (2008). Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security). Springer eBooks. 3 indexed citations
14.
Kapadia, Apu, Patrick P. Tsang, & Sean W. Smith. (2007). Attribute-Based Publishing with Hidden Credentials and Hidden Policies.. Network and Distributed System Security Symposium. 74 indexed citations
15.
Smith, Sean W., et al.. (2005). Shemp: secure hardware enhanced myproxy. 6 indexed citations
16.
Smith, Sean W., et al.. (2004). USING SPKI/SDSI FOR DISTRIBUTED MAINTENANCE OF ATTRIBUTE RELEASE POLICIES IN SHIBBOLETH ∞. 218–226. 7 indexed citations
17.
Smith, Sean W.. (2004). Probing End-User IT Security Practices--Through Homework.. ˜The œEDUCAUSE quarterly/EDUCAUSE quarterly. 27(4). 68–71. 5 indexed citations
18.
Shubina, Anna & Sean W. Smith. (2004). Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System.. 29–39. 4 indexed citations
19.
Seligman, Paul J. & Sean W. Smith. (2004). DETECTING UNAUTHORIZED USE IN ONLINE JOURNAL ARCHIVES: A CASE STUDY ∞. 209–217. 1 indexed citations
20.
Smith, Sean W., et al.. (2001). Improving DES coprocessor throughput for short operations. USENIX Security Symposium. 6–6. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026