Simon Heron

1.3k total citations · 1 hit paper
8 papers, 772 citations indexed

About

Simon Heron is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Simon Heron has authored 8 papers receiving a total of 772 indexed citations (citations by other indexed papers that have themselves been cited), including 4 papers in Computer Networks and Communications, 3 papers in Information Systems and 3 papers in Signal Processing. Recurrent topics in Simon Heron's work include Network Security and Intrusion Detection (4 papers), Advanced Malware Detection Techniques (3 papers) and Cybercrime and Law Enforcement Studies (2 papers). Simon Heron is often cited by papers focused on Network Security and Intrusion Detection (4 papers), Advanced Malware Detection Techniques (3 papers) and Cybercrime and Law Enforcement Studies (2 papers). Simon Heron collaborates with scholars based in Czechia. Simon Heron's co-authors include and has published in prestigious journals such as Network Security.

In The Last Decade

Simon Heron

8 papers receiving 705 citations

Hit Papers

Advanced Encryption Standard (AES) 2009 2026 2014 2020 2009 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Simon Heron Czechia 5 519 359 198 187 131 8 772
J.-J. Quisquater Belgium 13 696 1.3× 402 1.1× 217 1.1× 389 2.1× 127 1.0× 29 1.0k
René Cumplido Mexico 14 322 0.6× 242 0.7× 135 0.7× 132 0.7× 111 0.8× 86 710
Claudia Feregrino-Uribe Mexico 14 310 0.6× 282 0.8× 94 0.5× 186 1.0× 99 0.8× 80 618
Avinash L. Varna United States 15 404 0.8× 615 1.7× 96 0.5× 105 0.6× 142 1.1× 34 942
Xuejia Lai China 14 548 1.1× 401 1.1× 147 0.7× 144 0.8× 114 0.9× 82 894
Morris J. Dworkin United States 7 391 0.8× 271 0.8× 146 0.7× 99 0.5× 71 0.5× 16 569
Johann Großschädl Luxembourg 16 458 0.9× 203 0.6× 175 0.9× 231 1.2× 57 0.4× 46 639
Paris Kitsos Greece 19 552 1.1× 318 0.9× 178 0.9× 184 1.0× 81 0.6× 93 973
Kannan Srinathan India 12 305 0.6× 247 0.7× 213 1.1× 181 1.0× 134 1.0× 55 640
Frederik Armknecht Germany 18 544 1.0× 112 0.3× 270 1.4× 322 1.7× 118 0.9× 54 859

Countries citing papers authored by Simon Heron

Since Specialization
Citations

This map shows the geographic impact of Simon Heron's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Simon Heron with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Simon Heron more than expected).

Fields of papers citing papers by Simon Heron

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Simon Heron. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Simon Heron. The network helps show where Simon Heron may publish in the future.

No nodes

All Works

8 of 8 papers shown
1.
Heron, Simon. (2010). Denial of service: motivations and trends. Network Security. 2010(5). 10–12. 6 indexed citations
2.
Heron, Simon. (2009). Online privacy and browser security. Network Security. 2009(6). 4–7. 1 indexed citations
3.
Heron, Simon. (2009). Advanced Encryption Standard (AES). Network Security. 2009(12). 8–12. 718 indexed citations breakdown →
4.
Heron, Simon. (2009). Technologies for spam detection. Network Security. 2009(1). 11–15. 25 indexed citations
5.
Heron, Simon. (2008). Parasitic malware: The resurgence of an old threat. Network Security. 2008(3). 15–18. 3 indexed citations
6.
Heron, Simon. (2007). Working the botnet: how dynamic DNS is revitalising the zombie army. Network Security. 2007(1). 9–11. 10 indexed citations
7.
Heron, Simon. (2007). Botnet command and control techniques. Network Security. 2007(4). 13–16. 7 indexed citations
8.
Heron, Simon. (2007). The rise and rise of the keyloggers. Network Security. 2007(6). 4–6. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026