Journal of Computer Virology and Hacking Techniques

307 papers and 3.2k indexed citations i.

About

The 307 papers published in Journal of Computer Virology and Hacking Techniques in the last decades have received a total of 3.2k indexed citations. Papers published in Journal of Computer Virology and Hacking Techniques usually cover Signal Processing (194 papers), Computer Networks and Communications (176 papers) and Artificial Intelligence (140 papers) specifically the topics of Advanced Malware Detection Techniques (191 papers), Network Security and Intrusion Detection (147 papers) and Software Testing and Debugging Techniques (41 papers). The most active scholars publishing in Journal of Computer Virology and Hacking Techniques are Mark Stamp, Thomas H. Austin, Fabio Di Troia, Ali Hamzeh, Corrado Aaron Visaggio, Mathieu Cunche, Rajesh Kumar, Xiaosong Zhang, Riaz Ullah Khan and Francesco Mercaldo.

In The Last Decade

Fields of papers published in Journal of Computer Virology and Hacking Techniques

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers published in Journal of Computer Virology and Hacking Techniques. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers published in Journal of Computer Virology and Hacking Techniques.

Countries where authors publish in Journal of Computer Virology and Hacking Techniques

Since Specialization
Citations

This map shows the geographic impact of research published in Journal of Computer Virology and Hacking Techniques. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers published in Journal of Computer Virology and Hacking Techniques with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Journal of Computer Virology and Hacking Techniques more than expected).

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar’s output or impact.

Explore journals with similar magnitude of impact

Rankless by CCL
2025