619 total citations 9 papers, 317 citations indexed
About
Stephen Northcutt is a scholar working on Computer Networks and Communications, Hardware and Architecture and General Energy.
According to data from OpenAlex, Stephen Northcutt has authored 9 papers receiving a total of 317 indexed citations (citations by other indexed papers that have themselves been cited), including 5 papers in Computer Networks and Communications, 2 papers in Hardware and Architecture and 1 paper in General Energy. Recurrent topics in Stephen Northcutt's work include Network Security and Intrusion Detection (5 papers), Ethics in Business and Education (1 paper) and Integrated Circuits and Semiconductor Failure Analysis (1 paper). Stephen Northcutt is often cited by papers focused on Network Security and Intrusion Detection (5 papers), Ethics in Business and Education (1 paper) and Integrated Circuits and Semiconductor Failure Analysis (1 paper). Stephen Northcutt collaborates with scholars based in United States, Belgium and Canada. Stephen Northcutt's co-authors include Mark A. Cooper, Jeff Riley, Ronald W. Ritchey, John Green, David J. Marchette, Eric Cole and Karen Kent and has published in prestigious journals such as EDPACS, CERN Document Server (European Organization for Nuclear Research) and Medical Entomology and Zoology.
Citations per year, relative to Stephen Northcutt Stephen Northcutt (= 1×)
peers
Terrance Goan
Countries citing papers authored by Stephen Northcutt
Since
Specialization
Citations
This map shows the geographic impact of Stephen Northcutt's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Stephen Northcutt with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Stephen Northcutt more than expected).
Fields of papers citing papers by Stephen Northcutt
This network shows the impact of papers produced by Stephen Northcutt. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Stephen Northcutt. The network helps show where Stephen Northcutt may publish in the future.
Co-authorship network of co-authors of Stephen Northcutt
This figure shows the co-authorship network connecting the top 25 collaborators of Stephen Northcutt.
A scholar is included among the top collaborators of Stephen Northcutt based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Stephen Northcutt. Stephen Northcutt is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Northcutt, Stephen. (2005). Inside Network Perimeter Security. CERN Document Server (European Organization for Nuclear Research).22 indexed citations
3.
Northcutt, Stephen. (2004). IT Ethics Handbook:: Right and Wrong for IT Professionals. CERN Document Server (European Organization for Nuclear Research).3 indexed citations
Northcutt, Stephen, et al.. (2002). Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems. Medical Entomology and Zoology.16 indexed citations
6.
Northcutt, Stephen, et al.. (2001). Intrusion Signatures and Analysis. Medical Entomology and Zoology.43 indexed citations
Northcutt, Stephen, et al.. (1999). Network Intrusion Detection. CERN Document Server (European Organization for Nuclear Research).86 indexed citations
9.
Green, John, et al.. (1999). Analysis Techniques for Detecting Coordinated Attacks and Probes. 1–9.16 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.