Tom Chothia

1.7k total citations
40 papers, 481 citations indexed

About

Tom Chothia is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Tom Chothia has authored 40 papers receiving a total of 481 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Networks and Communications, 21 papers in Information Systems and 21 papers in Artificial Intelligence. Recurrent topics in Tom Chothia's work include Advanced Malware Detection Techniques (11 papers), Advanced Authentication Protocols Security (8 papers) and Network Security and Intrusion Detection (8 papers). Tom Chothia is often cited by papers focused on Advanced Malware Detection Techniques (11 papers), Advanced Authentication Protocols Security (8 papers) and Network Security and Intrusion Detection (8 papers). Tom Chothia collaborates with scholars based in United Kingdom, Netherlands and France. Tom Chothia's co-authors include Richard Durbin, Kevin Howe, Mark Ryan, Myrto Arapinis, Eike Ritter, Catuscia Palamidessi, Yuxin Deng, Flavio D. Garcia, Dominic Duggan and Jun Pang and has published in prestigious journals such as Genome Research, Theoretical Computer Science and Science of Computer Programming.

In The Last Decade

Tom Chothia

37 papers receiving 462 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tom Chothia United Kingdom 12 241 193 162 79 73 40 481
Ashish Gehani United States 15 251 1.0× 427 2.2× 329 2.0× 238 3.0× 41 0.6× 70 804
Daniel R. Tauritz United States 12 299 1.2× 105 0.5× 91 0.6× 70 0.9× 143 2.0× 79 488
Guy Jacobson United States 9 160 0.7× 135 0.7× 55 0.3× 40 0.5× 31 0.4× 15 328
Diego F. Aranha Brazil 13 508 2.1× 319 1.7× 272 1.7× 85 1.1× 35 0.5× 66 736
Christopher Jefferson United Kingdom 14 278 1.2× 329 1.7× 81 0.5× 96 1.2× 96 1.3× 40 555
Lisa M. Marvel United States 12 184 0.8× 177 0.9× 139 0.9× 137 1.7× 35 0.5× 39 758
Hervé Chabanne France 13 231 1.0× 191 1.0× 404 2.5× 335 4.2× 23 0.3× 44 691
M. Sadegh Riazi United States 8 692 2.9× 82 0.4× 147 0.9× 32 0.4× 60 0.8× 16 772
Ricardo Dahab Brazil 13 377 1.6× 419 2.2× 238 1.5× 107 1.4× 30 0.4× 58 707
K. Muneeswaran United States 8 290 1.2× 208 1.1× 63 0.4× 108 1.4× 24 0.3× 24 408

Countries citing papers authored by Tom Chothia

Since Specialization
Citations

This map shows the geographic impact of Tom Chothia's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tom Chothia with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tom Chothia more than expected).

Fields of papers citing papers by Tom Chothia

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tom Chothia. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tom Chothia. The network helps show where Tom Chothia may publish in the future.

Co-authorship network of co-authors of Tom Chothia

This figure shows the co-authorship network connecting the top 25 collaborators of Tom Chothia. A scholar is included among the top collaborators of Tom Chothia based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tom Chothia. Tom Chothia is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Muench, Marius, et al.. (2024). Anti-Cheat: Attacks and the Effectiveness of Client-Side Defences. 30–43. 1 indexed citations
2.
Vanhoef, Mathy, et al.. (2022). The Closer You Look, The More You Learn. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2265–2278. 8 indexed citations
3.
Chothia, Tom, Ioana Boureanu, & Liqun Chen. (2019). Making Contactless EMV Robust Against Rogue Readers Colluding With Relay Attackers. Surrey Research Insight Open Access (The University of Surrey). 1 indexed citations
4.
Chothia, Tom, et al.. (2018). Phishing Attacks: Learning by Doing. USENIX Security Symposium. 2 indexed citations
5.
Chothia, Tom, Joeri de Ruiter, & Ben Smyth. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. Open Repository and Bibliography (University of Luxembourg). 1563–1580. 10 indexed citations
6.
Chothia, Tom, et al.. (2017). Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story. University of Birmingham Research Portal (University of Birmingham). 12 indexed citations
7.
Chothia, Tom, et al.. (2017). An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. University of Birmingham Research Portal (University of Birmingham). 743–756. 8 indexed citations
8.
Bordbar, Behzad, et al.. (2017). Towards an Understanding of the Misclassification Rates of Machine Learning-based Malware Detection Systems. University of Birmingham Research Portal (University of Birmingham). 101–112. 2 indexed citations
9.
Chothia, Tom & Joeri de Ruiter. (2016). Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom. University of Birmingham Research Portal (University of Birmingham). 1–8. 5 indexed citations
10.
Jaghoori, Mohammad Mahdi, et al.. (2016). Compositional schedulability analysis of real-time actor-based systems. Acta Informatica. 54(4). 343–378. 5 indexed citations
11.
Marin, Eduard, Dave Singelée, Flavio D. Garcia, et al.. (2016). On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. Lirias (KU Leuven). 226–236. 51 indexed citations
12.
Arapinis, Myrto, Tom Chothia, Eike Ritter, & Mark Ryan. (2010). Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. Edinburgh Research Explorer (University of Edinburgh). 49 indexed citations
13.
Arbab, Farhad, et al.. (2009). From coordination to stochastic models of QoS. Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands. 1–27. 8 indexed citations
14.
Jaghoori, Mohammad Mahdi, Frank S. de Boer, Tom Chothia, & Marjan Sirjani. (2009). Schedulability of asynchronous real-time concurrent objects. The Journal of Logic and Algebraic Programming. 78(5). 402–416. 15 indexed citations
15.
Arapinis, Myrto, Tom Chothia, Eike Ritter, & Mark Ryan. (2009). Untraceability in the applied pi-calculus. 1–6. 5 indexed citations
16.
Chothia, Tom & Dominic Duggan. (2007). Capability passing processes. Science of Computer Programming. 66(3). 184–204.
17.
Chothia, Tom. (2007). Securing pseudo identities in an anonymous peer-to-peer file-sharing network. 3823. 279–282. 2 indexed citations
18.
Deng, Yuxin, Tom Chothia, Catuscia Palamidessi, & Jun Pang. (2006). Metrics for Action-labelled Quantitative Transition Systems. Electronic Notes in Theoretical Computer Science. 153(2). 79–96. 42 indexed citations
19.
Chothia, Tom & Dominic Duggan. (2004). Abstractions for fault-tolerant global computing. Theoretical Computer Science. 322(3). 567–613. 5 indexed citations
20.
Howe, Kevin, Tom Chothia, & Richard Durbin. (2002). GAZE: A Generic Framework for the Integration of Gene-Prediction Data by Dynamic Programming. Genome Research. 12(9). 1418–1427. 56 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026