Steve Mansfield-Devine

1.3k total citations
103 papers, 821 citations indexed

About

Steve Mansfield-Devine is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Steve Mansfield-Devine has authored 103 papers receiving a total of 821 indexed citations (citations by other indexed papers that have themselves been cited), including 42 papers in Information Systems, 22 papers in Computer Networks and Communications and 15 papers in Signal Processing. Recurrent topics in Steve Mansfield-Devine's work include Information and Cyber Security (22 papers), Network Security and Intrusion Detection (20 papers) and Cybercrime and Law Enforcement Studies (17 papers). Steve Mansfield-Devine is often cited by papers focused on Information and Cyber Security (22 papers), Network Security and Intrusion Detection (20 papers) and Cybercrime and Law Enforcement Studies (17 papers). Steve Mansfield-Devine collaborates with scholars based in . Steve Mansfield-Devine's co-authors include and has published in prestigious journals such as Computer Fraud & Security, Network Security and Biometric Technology Today.

In The Last Decade

Steve Mansfield-Devine

94 papers receiving 741 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Steve Mansfield-Devine 16 468 344 272 197 134 103 821
Harjinder Singh Lallie United Kingdom 10 475 1.0× 280 0.8× 200 0.7× 136 0.7× 150 1.1× 36 852
Rabiah Ahmad Malaysia 14 433 0.9× 326 0.9× 194 0.7× 144 0.7× 97 0.7× 74 780
Herbert J. Mattord United States 11 705 1.5× 298 0.9× 174 0.6× 140 0.7× 160 1.2× 48 1.0k
Johan van Niekerk South Africa 11 575 1.2× 264 0.8× 126 0.5× 98 0.5× 161 1.2× 37 895
Wolter Pieters Netherlands 18 535 1.1× 221 0.6× 148 0.5× 303 1.5× 315 2.4× 90 1.0k
Rick Kuhn United States 15 381 0.8× 194 0.6× 113 0.4× 231 1.2× 152 1.1× 77 907
Andréa Cullen United Kingdom 17 345 0.7× 280 0.8× 165 0.6× 142 0.7× 80 0.6× 39 840
Christos Kalloniatis Greece 17 498 1.1× 154 0.4× 198 0.7× 269 1.4× 332 2.5× 77 850
Thomas R. Peltier United States 14 612 1.3× 269 0.8× 141 0.5× 103 0.5× 128 1.0× 31 806
Mariki M. Eloff South Africa 17 934 2.0× 340 1.0× 188 0.7× 218 1.1× 143 1.1× 65 1.2k

Countries citing papers authored by Steve Mansfield-Devine

Since Specialization
Citations

This map shows the geographic impact of Steve Mansfield-Devine's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Steve Mansfield-Devine with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Steve Mansfield-Devine more than expected).

Fields of papers citing papers by Steve Mansfield-Devine

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Steve Mansfield-Devine. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Steve Mansfield-Devine. The network helps show where Steve Mansfield-Devine may publish in the future.

No nodes

All Works

20 of 20 papers shown
1.
Mansfield-Devine, Steve. (2018). Nation-state attacks: the start of a new Cold War?. Network Security. 2018(11). 15–19. 2 indexed citations
2.
Mansfield-Devine, Steve. (2018). Identity crisis: the disconnect between business and IT executives. Computer Fraud & Security. 2018(4). 16–20. 1 indexed citations
3.
Mansfield-Devine, Steve. (2018). Critical infrastructure: understanding the threat. Computer Fraud & Security. 2018(7). 16–20. 11 indexed citations
4.
Mansfield-Devine, Steve. (2018). The intelligent way to protect complex environments. Network Security. 2018(5). 13–17.
5.
Mansfield-Devine, Steve. (2018). The best form of defence – the benefits of red teaming. Computer Fraud & Security. 2018(10). 8–12. 11 indexed citations
6.
Mansfield-Devine, Steve. (2017). Bad behaviour: exploiting human weaknesses. Computer Fraud & Security. 2017(1). 17–20. 4 indexed citations
7.
Mansfield-Devine, Steve. (2017). Going critical: attacks against national infrastructure. Network Security. 2017(11). 16–19. 1 indexed citations
8.
Mansfield-Devine, Steve. (2016). Open banking: opportunity and danger. Computer Fraud & Security. 2016(10). 8–13. 25 indexed citations
9.
Mansfield-Devine, Steve. (2016). Creating security operations centres that work. Network Security. 2016(5). 15–18. 6 indexed citations
10.
Mansfield-Devine, Steve. (2015). When advertising turns nasty. Network Security. 2015(11). 5–8. 5 indexed citations
11.
Mansfield-Devine, Steve. (2015). Biometrics in developing countries. Biometric Technology Today. 2015(4). 5–8. 3 indexed citations
12.
Mansfield-Devine, Steve. (2015). The Ashley Madison affair. Network Security. 2015(9). 8–16. 23 indexed citations
13.
Mansfield-Devine, Steve. (2014). Hacking on an industrial scale. Network Security. 2014(9). 12–16. 2 indexed citations
14.
Mansfield-Devine, Steve. (2012). Android malware and mitigations. Network Security. 2012(11). 12–20. 14 indexed citations
15.
Mansfield-Devine, Steve. (2012). Android architecture: attacking the weak points. Network Security. 2012(10). 5–12. 21 indexed citations
16.
Mansfield-Devine, Steve. (2012). Estonia: what doesn't kill you makes you stronger. Network Security. 2012(7). 12–20. 6 indexed citations
17.
Mansfield-Devine, Steve. (2011). Hacktivism: assessing the damage. Network Security. 2011(8). 5–13. 15 indexed citations
18.
Mansfield-Devine, Steve. (2011). Single Sign-On: matching convenience with security. Biometric Technology Today. 2011(7). 7–11. 2 indexed citations
19.
Mansfield-Devine, Steve. (2010). Battle of the botnets. Network Security. 2010(5). 4–6. 6 indexed citations
20.
Mansfield-Devine, Steve. (2010). The perils of sharing. Network Security. 2010(1). 11–13. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026