H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 53 Citations 16,418 136 World Ranking 2500 National Ranking 3

Research.com Recognitions

Awards & Achievements

2020 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His main research concerns Computer network, Wireless ad hoc network, Computer security, Mobile ad hoc network and Vehicular ad hoc network. His Computer network research integrates issues from Distributed computing and Security association. The Wireless ad hoc network study combines topics in areas such as Wireless network and Routing protocol.

His Computer security research is multidisciplinary, incorporating perspectives in Node, Software deployment and Wireless. His work deals with themes such as Adversary and Optimized Link State Routing Protocol, which intersect with Vehicular ad hoc network. His Ad hoc wireless distribution service research focuses on subjects like Adaptive quality of service multi-hop routing, which are linked to Delay-tolerant networking.

His most cited work include:

  • Stimulating cooperation in self-organizing mobile ad hoc networks (1049 citations)
  • Self-organized public-key management for mobile ad hoc networks (794 citations)
  • The quest for security in mobile ad hoc networks (772 citations)

What are the main themes of his work throughout his whole career to date?

Levente Buttyán mostly deals with Computer network, Computer security, Wireless sensor network, Wireless ad hoc network and Distributed computing. His Computer network research is multidisciplinary, relying on both Key distribution in wireless sensor networks and Wireless network. His Computer security study frequently links to adjacent areas such as Internet privacy.

Levente Buttyán has included themes like Mobile ad hoc network, Node, Packet forwarding and Nash equilibrium in his Wireless ad hoc network study. The concepts of his Distributed computing study are interwoven with issues in Link-state routing protocol and Dynamic Source Routing. He interconnects Wireless Routing Protocol and Adaptive quality of service multi-hop routing in the investigation of issues within Ad hoc wireless distribution service.

He most often published in these fields:

  • Computer network (48.15%)
  • Computer security (39.15%)
  • Wireless sensor network (19.58%)

What were the highlights of his more recent work (between 2012-2021)?

  • Computer security (39.15%)
  • Cryptography (11.64%)
  • Computer network (48.15%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Cryptography, Computer network, Distributed computing and Wireless sensor network. Levente Buttyán combines subjects such as Session and Vehicular ad hoc network with his study of Computer security. His Cryptography research is multidisciplinary, incorporating elements of Object, Bootstrapping, Artificial intelligence and Obfuscation.

His Computer network study frequently involves adjacent topics like Fuzz testing. His research investigates the connection between Distributed computing and topics such as Robustness that intersect with issues in Network configuration, Adversarial system, Software deployment, Network topology and Denial-of-service attack. His study in Wireless sensor network is interdisciplinary in nature, drawing from both Wireless ad hoc network, Data security and Telecommunications.

Between 2012 and 2021, his most popular works were:

  • A Survey of Interdependent Information Security Games (88 citations)
  • Embedded systems security: Threats, vulnerabilities, and attack taxonomy (69 citations)
  • A survey of security issues in hardware virtualization (57 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

Computer security, Cryptography, Malware, Computer network and Wireless sensor network are his primary areas of study. His research integrates issues of Control models, Order and Game theory in his study of Computer security. His Cryptographic primitive study in the realm of Cryptography interacts with subjects such as Work.

The various areas that Levente Buttyán examines in his Computer network study include Denial-of-service attack, Distributed computing and Robustness. His Distributed computing research includes themes of Hash chain, Overhead and Reliability. His Wireless sensor network study combines topics in areas such as Adversarial system, Software deployment, Hash function, Merkle tree and Protocol.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Stimulating cooperation in self-organizing mobile ad hoc networks

Levente Buttyán;Jean-Pierre Hubaux.
Mobile Networks and Applications (2003)

1675 Citations

Self-organized public-key management for mobile ad hoc networks

S. Capkun;L. Buttyan;J.-P. Hubaux.
IEEE Transactions on Mobile Computing (2003)

1305 Citations

The quest for security in mobile ad hoc networks

Jean-Pierre Hubaux;Levente Buttyán;Srdan Capkun.
mobile ad hoc networking and computing (2001)

1228 Citations

Enforcing service availability in mobile ad-hoc WANs

Levente Buttyán;Jean-Pierre Hubaux.
mobile ad hoc networking and computing (2000)

875 Citations

Secure vehicular communication systems: design and architecture

P. Papadimitratos;L. Buttyan;T. Holczer;E. Schoch.
IEEE Communications Magazine (2008)

639 Citations

SECTOR: secure tracking of node encounters in multi-hop wireless networks

Srdjan Čapkun;Levente Buttyán;Jean-Pierre Hubaux.
security of ad hoc and sensor networks (2003)

592 Citations

Self organization in mobile ad hoc networks: the approach of Terminodes

L. Blazevic;L. Buttyan;S. Capkun;S. Giordano.
IEEE Communications Magazine (2001)

584 Citations

Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks

Levente Buttyan;Jean-Pierre Hubaux.
(2001)

543 Citations

Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing

Levente Buttyan;Jean-Pierre Hubaux.
(2007)

484 Citations

Nash equilibria of packet forwarding strategies in wireless ad hoc networks

M. Felegyhazi;J.-P. Hubaux;L. Buttyan.
IEEE Transactions on Mobile Computing (2006)

448 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Levente Buttyán

Frank Kargl

Frank Kargl

University of Ulm

Publications: 53

Panos Papadimitratos

Panos Papadimitratos

Royal Institute of Technology

Publications: 46

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 45

Jean-Pierre Hubaux

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

Publications: 42

Jie Wu

Jie Wu

Temple University

Publications: 32

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 31

John S. Baras

John S. Baras

University of Maryland, College Park

Publications: 24

Mauro Conti

Mauro Conti

University of Padua

Publications: 21

Yuguang Fang

Yuguang Fang

University of Florida

Publications: 21

Mario Gerla

Mario Gerla

University of California, Los Angeles

Publications: 20

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 20

Sajal K. Das

Sajal K. Das

Missouri University of Science and Technology

Publications: 19

Sudip Misra

Sudip Misra

Indian Institute of Technology Kharagpur

Publications: 19

Saurabh Bagchi

Saurabh Bagchi

Purdue University West Lafayette

Publications: 18

Fan Wu

Fan Wu

Shanghai Jiao Tong University

Publications: 18

Something went wrong. Please try again later.