Shareeful Islam

2.7k total citations
84 papers, 1.5k citations indexed

About

Shareeful Islam is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Shareeful Islam has authored 84 papers receiving a total of 1.5k indexed citations (citations by other indexed papers that have themselves been cited), including 68 papers in Information Systems, 23 papers in Artificial Intelligence and 19 papers in Computer Networks and Communications. Recurrent topics in Shareeful Islam's work include Information and Cyber Security (41 papers), Network Security and Intrusion Detection (17 papers) and Software Engineering Research (16 papers). Shareeful Islam is often cited by papers focused on Information and Cyber Security (41 papers), Network Security and Intrusion Detection (17 papers) and Software Engineering Research (16 papers). Shareeful Islam collaborates with scholars based in United Kingdom, Greece and Germany. Shareeful Islam's co-authors include Haralambos Mouratidis, Halima Ibrahim Kure, Siv Hilde Houmb, Christos Kalloniatis, Abel Yeboah-Ofori, Jan Jürjens, Stefanos Gritzalis, Mohammad A. Razzaque, Edgar Weippl and Kurt Schneider and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Shareeful Islam

81 papers receiving 1.4k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shareeful Islam United Kingdom 25 952 373 345 210 163 84 1.5k
Sasha Romanosky United States 15 1.1k 1.2× 484 1.3× 178 0.5× 366 1.7× 48 0.3× 40 1.6k
Antonio Vetrò Italy 20 1.3k 1.3× 547 1.5× 396 1.1× 98 0.5× 206 1.3× 70 1.9k
Mathias Ekstedt Sweden 27 1.5k 1.6× 913 2.4× 282 0.8× 349 1.7× 716 4.4× 133 2.2k
Atif Ahmad Australia 22 1.3k 1.4× 593 1.6× 139 0.4× 270 1.3× 311 1.9× 97 1.7k
Herbert J. Mattord United States 11 705 0.7× 298 0.8× 140 0.4× 174 0.8× 109 0.7× 48 1.0k
Ruth Breu Austria 21 930 1.0× 347 0.9× 331 1.0× 209 1.0× 360 2.2× 138 1.3k
Muthu Ramachandran United Kingdom 16 695 0.7× 452 1.2× 341 1.0× 72 0.3× 137 0.8× 97 1.2k
José-Norberto Mazón Spain 18 496 0.5× 455 1.2× 372 1.1× 112 0.5× 319 2.0× 102 1.2k
Henderik A. Proper Netherlands 20 820 0.9× 324 0.9× 526 1.5× 107 0.5× 1.0k 6.4× 186 1.7k
Pontus Johnson Sweden 25 1.2k 1.3× 696 1.9× 302 0.9× 142 0.7× 1.0k 6.4× 127 2.0k

Countries citing papers authored by Shareeful Islam

Since Specialization
Citations

This map shows the geographic impact of Shareeful Islam's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shareeful Islam with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shareeful Islam more than expected).

Fields of papers citing papers by Shareeful Islam

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shareeful Islam. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shareeful Islam. The network helps show where Shareeful Islam may publish in the future.

Co-authorship network of co-authors of Shareeful Islam

This figure shows the co-authorship network connecting the top 25 collaborators of Shareeful Islam. A scholar is included among the top collaborators of Shareeful Islam based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shareeful Islam. Shareeful Islam is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kumar, Prabhat, et al.. (2025). Blockchain Based Information Security and Privacy Protection: Challenges and Future Directions using Computational Literature Review. Proceedings of the ... Annual Hawaii International Conference on System Sciences. 1 indexed citations
2.
Islam, Shareeful, et al.. (2025). Large language model based hybrid framework for automatic vulnerability detection with explainable AI for cybersecurity enhancement. Integrated Computer-Aided Engineering. 33(1). 38–54.
3.
Kioskli, Kitty, et al.. (2025). A risk and conformity assessment framework to ensure security and resilience of healthcare systems and medical supply chain. International Journal of Information Security. 24(2). 1 indexed citations
4.
Islam, Shareeful, et al.. (2025). Intelligent dynamic cybersecurity risk management framework with explainability and interpretability of AI models for enhancing security and resilience of digital infrastructure. Journal of Reliable Intelligent Environments. 11(3). 12–12. 3 indexed citations
6.
Aljuhani, Ahamed, et al.. (2024). Digital Twins-enabled Zero Touch Network: A smart contract and explainable AI integrated cybersecurity framework. Future Generation Computer Systems. 156. 191–205. 24 indexed citations
7.
Islam, Shareeful, et al.. (2024). Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience. Sensors. 24(15). 4859–4859. 4 indexed citations
8.
Islam, Shareeful, et al.. (2024). Integrating Human Factors into Data-driven Threat Management for Overall Security Enhancement. AHFE international. 1 indexed citations
9.
Islam, Shareeful, et al.. (2024). Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI. SHILAP Revista de lepidopterología. 18. 100598–100598. 3 indexed citations
11.
Mouratidis, Haralambos, et al.. (2023). Modelling language for cyber security incident handling for critical infrastructures. Computers & Security. 128. 103139–103139. 15 indexed citations
12.
Javeed, Danish, Muhammad Shahid Saeed, Prabhat Kumar, et al.. (2023). Federated Learning-Based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges. IEEE Transactions on Consumer Electronics. 70(1). 2618–2627. 42 indexed citations
13.
Silvestri, Stefano, et al.. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors. 23(2). 651–651. 29 indexed citations
14.
Yeboah-Ofori, Abel & Shareeful Islam. (2019). Cyber Security Threat Modeling for Supply Chain Organizational Environments. Future Internet. 11(3). 63–63. 60 indexed citations
15.
Yeboah-Ofori, Abel, Shareeful Islam, & Allan J. Brimicombe. (2019). Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network. UWL Repository (University of West London). 37–42. 13 indexed citations
16.
Islam, Shareeful, et al.. (2017). A Framework for Cloud Based E-Government from the Perspective of Developing Countries. Future Internet. 9(4). 80–80. 20 indexed citations
17.
Islam, Shareeful, Stefan Fenz, Edgar Weippl, & Christos Kalloniatis. (2016). Migration Goals and Risk Management in Cloud Computing. ROAR (University of East London). 7(3). 44–73. 5 indexed citations
18.
Islam, Shareeful, et al.. (2013). Implementation of digital forensics investigations using a goal-driven approach for a questioned contract. 1 indexed citations
19.
Islam, Shareeful, et al.. (2009). Goal and Risk Factors in Offshore Outsourced Software Development from Vendor's Viewpoint. 347–352. 27 indexed citations
20.
Islam, Shareeful & Wei Dong. (2008). Human factors in software security risk management. 13–16. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026