H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 31 Citations 7,515 200 World Ranking 7951 National Ranking 63

Research.com Recognitions

Awards & Achievements

2015 - ACM Distinguished Member

2015 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

Computer network, Computer security, Real-time computing, Authentication and Cloud computing are his primary areas of study. His research integrates issues of Wireless, Key distribution in wireless sensor networks and Distributed computing in his study of Computer network. His Computer security research incorporates themes from Wireless network, The Internet, Cloud computing security and Interoperability.

His biological study spans a wide range of topics, including General Packet Radio Service, GPRS core network, Network congestion, Throughput and Algorithm. The Algorithm study combines topics in areas such as Scalable TCP, Compound TCP and HSTCP. His HSTCP research incorporates elements of CUBIC TCP and TCP Westwood.

His most cited work include:

  • The NewReno Modification to TCP's Fast Recovery Algorithm (1305 citations)
  • Security in Software Defined Networks: A Survey (244 citations)
  • Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks (211 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Host Identity Protocol, The Internet and Distributed computing. His Computer network study combines topics from a wide range of disciplines, such as Scalability and Multihoming. His research in Computer security intersects with topics in Cloud computing, Cloud computing security and Software-defined networking.

His study in Host Identity Protocol is interdisciplinary in nature, drawing from both Encryption, Local area network, IPsec and Mobile computing. His The Internet study incorporates themes from Server and Network security. The study incorporates disciplines such as Real-time computing and Internet Group Management Protocol, Inter-domain in addition to Network packet.

He most often published in these fields:

  • Computer network (70.97%)
  • Computer security (29.84%)
  • Host Identity Protocol (20.97%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer network (70.97%)
  • Computer security (29.84%)
  • Communications system (8.47%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer network, Computer security, Communications system, Cloud computing and Software-defined networking. Andrei Gurtov has researched Computer network in several fields, including Security service and Scalability. His Computer security research is multidisciplinary, relying on both Wireless network, Network Functions Virtualization and The Internet.

His Cloud computing study combines topics in areas such as Relay and Broadband. The concepts of his Software-defined networking study are interwoven with issues in Routing control plane, Protocol and Mobile computing. His Authentication research includes themes of Wireless and Server.

Between 2015 and 2021, his most popular works were:

  • Overview of 5G Security Challenges and Solutions (112 citations)
  • The Quest for Privacy in the Internet of Things (99 citations)
  • Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments (82 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

Andrei Gurtov focuses on Computer network, Computer security, Cloud computing, Software-defined networking and OpenFlow. His Computer network study frequently links to adjacent areas such as Distributed computing. The various areas that Andrei Gurtov examines in his Computer security study include Wireless network and The Internet.

His Cloud computing research is multidisciplinary, incorporating perspectives in Information privacy, Internet privacy, Broadband and Distributed database. His OpenFlow research integrates issues from Security service, Virtualization, Scalability, IPsec and Testbed. Andrei Gurtov combines subjects such as Cellular network, Host Identity Protocol and Tunnel Setup Protocol with his study of IPsec.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

The NewReno Modification to TCP's Fast Recovery Algorithm

S. Floyd;T. Henderson;A. Gurtov.
The NewReno Modification to TCP's Fast Recovery Algorithm (2004)

2112 Citations

Security in Software Defined Networks: A Survey

Ijaz Ahmad;Suneth Namal;Mika Ylianttila;Andrei Gurtov.
IEEE Communications Surveys and Tutorials (2015)

373 Citations

Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks

Pekka Nikander;Andrei Gurtov;Thomas R Henderson.
IEEE Communications Surveys and Tutorials (2010)

276 Citations

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

Pawani Porambage;Corinna Schmitt;Pardeep Kumar;Andrei Gurtov.
wireless communications and networking conference (2014)

185 Citations

Modeling wireless links for transport protocols

Andrei Gurtov;Sally Floyd.
acm special interest group on data communication (2004)

184 Citations

Overview of 5G Security Challenges and Solutions

Ijaz Ahmad;Tanesh Kumar;Madhusanka Liyanage;Jude Okwuibe.
IEEE Communications Standards Magazine (2018)

171 Citations

The Quest for Privacy in the Internet of Things

Pawani Porambage;Mika Ylianttila;Corinna Schmitt;Pardeep Kumar.
ieee international conference on cloud computing technology and science (2016)

150 Citations

Host Identity Protocol (HIP): Towards the Secure Mobile Internet

Andrei Gurtov.
TAEBDC-2013 (2008)

148 Citations

Responding to spurious timeouts in TCP

A. Gurtov;R. Ludwig.
international conference on computer communications (2003)

135 Citations

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Pardeep Kumar;Andrei Gurtov;Jari Iinatti;Mika Ylianttila.
IEEE Sensors Journal (2016)

126 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Andrei Gurtov

Mika Ylianttila

Mika Ylianttila

University of Oulu

Publications: 37

Stefan Schmid

Stefan Schmid

University of Vienna

Publications: 23

Mario Gerla

Mario Gerla

University of California, Los Angeles

Publications: 19

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 17

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 16

Raj Jain

Raj Jain

Washington University in St. Louis

Publications: 16

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 14

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 13

M. Y. Sanadidi

M. Y. Sanadidi

University of California, Los Angeles

Publications: 13

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 12

Mauro Conti

Mauro Conti

University of Padua

Publications: 11

Hongke Zhang

Hongke Zhang

Beijing Jiaotong University

Publications: 11

Georges Kaddoum

Georges Kaddoum

École de Technologie Supérieure

Publications: 11

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 11

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 10

Something went wrong. Please try again later.