Stephen McCombie

413 total citations
22 papers, 261 citations indexed

About

Stephen McCombie is a scholar working on Information Systems, Signal Processing and Political Science and International Relations. According to data from OpenAlex, Stephen McCombie has authored 22 papers receiving a total of 261 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Information Systems, 9 papers in Signal Processing and 6 papers in Political Science and International Relations. Recurrent topics in Stephen McCombie's work include Cybercrime and Law Enforcement Studies (12 papers), Advanced Malware Detection Techniques (9 papers) and Spam and Phishing Detection (6 papers). Stephen McCombie is often cited by papers focused on Cybercrime and Law Enforcement Studies (12 papers), Advanced Malware Detection Techniques (9 papers) and Spam and Phishing Detection (6 papers). Stephen McCombie collaborates with scholars based in Australia, United States and Netherlands. Stephen McCombie's co-authors include Paul Watters, Josef Pieprzyk, Robert Layton, Sarah Morrison, Alex Ng, Kara Nance, Matthew Warren and James D. Ramsay and has published in prestigious journals such as Australasian Journal of Paramedicine, IEEE Security & Privacy and Library trends.

In The Last Decade

Stephen McCombie

22 papers receiving 237 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Stephen McCombie Australia 11 180 75 68 57 42 22 261
Rodrigo Werlinger Canada 8 363 2.0× 80 1.1× 83 1.2× 45 0.8× 162 3.9× 14 416
Jeffrey Hunker United States 7 218 1.2× 68 0.9× 78 1.1× 54 0.9× 132 3.1× 13 287
Miltiadis Kandias Greece 8 108 0.6× 41 0.5× 66 1.0× 61 1.1× 95 2.3× 11 199
Amir Javed United Kingdom 9 88 0.5× 52 0.7× 86 1.3× 170 3.0× 127 3.0× 29 318
Randall F. Trzeciak United States 7 265 1.5× 89 1.2× 84 1.2× 101 1.8× 170 4.0× 9 348
Mohammadreza Ebrahimi United States 10 159 0.9× 54 0.7× 118 1.7× 134 2.4× 53 1.3× 22 307
Mark Gondree United States 10 196 1.1× 44 0.6× 41 0.6× 165 2.9× 120 2.9× 16 316
Sadaf Hina Malaysia 9 161 0.9× 35 0.5× 58 0.9× 50 0.9× 108 2.6× 22 268
Javier Pastor-Galindo Spain 8 135 0.8× 89 1.2× 60 0.9× 77 1.4× 45 1.1× 22 242
Eileen Kowalski 5 246 1.4× 87 1.2× 83 1.2× 89 1.6× 152 3.6× 5 345

Countries citing papers authored by Stephen McCombie

Since Specialization
Citations

This map shows the geographic impact of Stephen McCombie's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Stephen McCombie with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Stephen McCombie more than expected).

Fields of papers citing papers by Stephen McCombie

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Stephen McCombie. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Stephen McCombie. The network helps show where Stephen McCombie may publish in the future.

Co-authorship network of co-authors of Stephen McCombie

This figure shows the co-authorship network connecting the top 25 collaborators of Stephen McCombie. A scholar is included among the top collaborators of Stephen McCombie based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Stephen McCombie. Stephen McCombie is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
McCombie, Stephen, et al.. (2021). Follow the money: Revealing risky nodes in a Ransomware-Bitcoin network. Proceedings of the ... Annual Hawaii International Conference on System Sciences. 9 indexed citations
2.
McCombie, Stephen, et al.. (2020). Discerning payment patterns in Bitcoin from ransomware attacks. Journal of Money Laundering Control. 23(3). 545–589. 18 indexed citations
4.
McCombie, Stephen, et al.. (2020). Analysis Techniques for Illicit Bitcoin Transactions. Frontiers in Computer Science. 2. 10 indexed citations
5.
McCombie, Stephen, et al.. (2019). A target-centric intelligence approach to WannaCry 2.0. Journal of Money Laundering Control. 22(4). 646–665. 18 indexed citations
6.
McCombie, Stephen, et al.. (2019). The elusive field of cyber intelligence: Notes from the educational front. 27(2). 22–42. 1 indexed citations
7.
McCombie, Stephen, et al.. (2019). The US 2016 presidential election & Russia’s troll farms. Intelligence & National Security. 35(1). 95–114. 22 indexed citations
8.
McCombie, Stephen. (2018). Threat actor oriented strategy: knowing your enemy to better defend, detect and respond to cyber-attacks. 26(1). 24–41. 1 indexed citations
9.
Watters, Paul, et al.. (2013). ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?. FedUni ResearchOnline (Federation University Australia). 44–49. 10 indexed citations
10.
Nance, Kara, et al.. (2012). Visualization of ATM Usage Patterns to Detect Counterfeit Cards Usage. 3081–3088. 5 indexed citations
11.
Layton, Robert, Stephen McCombie, & Paul Watters. (2012). Authorship Attribution of IRC Messages Using Inverse Author Frequency. FedUni ResearchOnline (Federation University Australia). 7–13. 17 indexed citations
12.
Watters, Paul, Stephen McCombie, Robert Layton, & Josef Pieprzyk. (2012). Characterising and predicting cyber attacks using the Cyber Attacker Model Profile (CAMP). Journal of Money Laundering Control. 15(4). 430–441. 2 indexed citations
13.
McCombie, Stephen, et al.. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing Intelligence and Counter Terrorism. 7(1). 80–91. 61 indexed citations
14.
McCombie, Stephen & Josef Pieprzyk. (2010). Winning the Phishing War: A Strategy for Australia. 79–86. 15 indexed citations
15.
Watters, Paul & Stephen McCombie. (2010). A methodology for analyzing the credential marketplace. Journal of Money Laundering Control. 14(1). 32–43. 3 indexed citations
16.
McCombie, Stephen, et al.. (2009). A Preliminary Profiling of Internet Money Mules: An Australian Perspective. FedUni ResearchOnline (Federation University Australia). 482–487. 24 indexed citations
17.
McCombie, Stephen, Josef Pieprzyk, & Paul Watters. (2009). Cybercrime Attribution: An Eastern European Case Study. Australasian Journal of Paramedicine. 41–51. 15 indexed citations
18.
McCombie, Stephen, et al.. (2008). FORENSIC CHARACTERISTICS OF PHISHING - Petty Theft or Organized Crime?. 149–157. 17 indexed citations
19.
McCombie, Stephen. (2008). Trouble in Florida: The Genesis of Phishing attacks on Australian Banks. Australasian Journal of Paramedicine. 113–128. 6 indexed citations
20.
McCombie, Stephen & Matthew Warren. (2000). A profile of an information warfare attack. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026