D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 6,518 144 World Ranking 7979 National Ranking 3730

Research.com Recognitions

Awards & Achievements

2014 - ACM Senior Member

2014 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His primary areas of investigation include Computer security, Denial-of-service attack, The Internet, Cellular network and Computer network. In the field of Computer security, his study on Malware and Encryption overlaps with subjects such as Architecture. In general Encryption study, his work on Cryptosystem often relates to the realm of False positive paradox, thereby connecting several areas of interest.

In his study, which falls under the umbrella issue of Denial-of-service attack, Resource management is strongly linked to Cable modem. His The Internet research integrates issues from Telecommunications, Radio access network, Mobile device and Public land mobile network. His research in Computer network is mostly focused on Provisioning.

His most cited work include:

  • Secure attribute-based systems (313 citations)
  • CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data (218 citations)
  • (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers (217 citations)

What are the main themes of his work throughout his whole career to date?

Patrick Traynor mainly focuses on Computer security, Computer network, Cryptography, Internet privacy and The Internet. The various areas that he examines in his Computer security study include Cellular network and Denial-of-service attack. His Computer network research is multidisciplinary, incorporating perspectives in Adversary, Voice over IP and Mobile device.

His Cryptography research focuses on Protocol and how it relates to Outsourcing. His Internet privacy study combines topics from a wide range of disciplines, such as Web application, Mobile payment and Network security. Patrick Traynor works mostly in the field of The Internet, limiting it down to topics relating to Wireless and, in certain cases, Transmission.

He most often published in these fields:

  • Computer security (50.34%)
  • Computer network (22.82%)
  • Cryptography (16.78%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (50.34%)
  • Speech recognition (4.03%)
  • Speaker recognition (4.03%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Speech recognition, Speaker recognition, Protocol and Cryptography. The Computer security study combines topics in areas such as Payment card, Payment and Deprecation. His Speech recognition study also includes fields such as

  • Adversarial machine learning which is related to area like Exploit,
  • Biometrics which is related to area like Software deployment.

His Protocol research is classified as research in Computer network. His study on Cryptography also encompasses disciplines like

  • Oracle which intersects with area such as Distributed computing,
  • Privacy preserving and Transmitter most often made with reference to Guard. His study in the field of Domain Name System also crosses realms of Proof-of-work system.

Between 2017 and 2021, his most popular works were:

  • IDENTITY AND CONTENT AUTHENTICATION FOR PHONE CALLS (39 citations)
  • A Large Scale Investigation of Obfuscation Use in Google Play (33 citations)
  • Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems (32 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Computer security, Protocol, Payment, Authentication and Cryptography are his primary areas of study. His studies in Computer security integrate themes in fields like Handshake and Payment card. His Protocol research is included under the broader classification of Computer network.

Much of his study explores Computer network relationship to The Internet. Patrick Traynor has researched Authentication in several fields, including Computer hardware, Microphone, Hash function, Usability and Voice command device. His Cryptography research incorporates elements of Scheme, Instructions per second, Oracle and Guard.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Secure attribute-based systems

Matthew Pirretti;Patrick Traynor;Patrick Mcdaniel;Brent Waters.
Journal of Computer Security (2010)

781 Citations

Secure attribute-based systems

Matthew Pirretti;Patrick Traynor;Patrick Mcdaniel;Brent Waters.
Journal of Computer Security (2010)

781 Citations

Secure attribute-based systems

Matthew Pirretti;Patrick Traynor;Patrick McDaniel;Brent Waters.
computer and communications security (2006)

501 Citations

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)

407 Citations

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data

Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)

407 Citations

On cellular botnets: measuring the impact of malicious devices on a cellular network core

Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)

312 Citations

On cellular botnets: measuring the impact of malicious devices on a cellular network core

Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)

312 Citations

Exploiting open functionality in SMS-capable cellular networks

William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)

291 Citations

Exploiting open functionality in SMS-capable cellular networks

William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)

291 Citations

MAST: triage for market-scale mobile malware analysis

Saurabh Chakradeo;Bradley Reaves;Patrick Traynor;William Enck.
wireless network security (2013)

243 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Patrick Traynor

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 24

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 23

Thomas Schneider

Thomas Schneider

Technical University of Darmstadt

Publications: 20

Tatsuaki Okamoto

Tatsuaki Okamoto

NTT (Japan)

Publications: 20

Mauro Conti

Mauro Conti

University of Padua

Publications: 20

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 17

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 16

Xiaofeng Wang

Xiaofeng Wang

Free University of Bozen-Bolzano

Publications: 15

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 15

Kevin R. B. Butler

Kevin R. B. Butler

University of Florida

Publications: 15

Erol Gelenbe

Erol Gelenbe

Institute of Theoretical and Applied Informatics

Publications: 14

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 14

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 13

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 13

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 13

William Enck

William Enck

North Carolina State University

Publications: 13

Trending Scientists

Gudrun Klinker

Gudrun Klinker

Technical University of Munich

Pratima Bansal

Pratima Bansal

University of Western Ontario

Mario J. Paniccia

Mario J. Paniccia

Anello Photonics

Koji Kaya

Koji Kaya

National Institutes of Natural Sciences

Weixin Huang

Weixin Huang

University of Notre Dame

Ben Distel

Ben Distel

University of Amsterdam

Elena R. Alvarez-Buylla

Elena R. Alvarez-Buylla

National Autonomous University of Mexico

Warren W. Wakarchuk

Warren W. Wakarchuk

University of Alberta

James N. Moum

James N. Moum

Oregon State University

Lutz Weihermüller

Lutz Weihermüller

Forschungszentrum Jülich

Eugene F. Stoermer

Eugene F. Stoermer

University of Michigan–Ann Arbor

Benoit Lavraud

Benoit Lavraud

Federal University of Toulouse Midi-Pyrénées

Mark A. Ellenbogen

Mark A. Ellenbogen

Concordia University

Peter Sturmey

Peter Sturmey

Queens College, CUNY

Marco Boscaro

Marco Boscaro

University of Padua

David J. Webb

David J. Webb

University of Edinburgh

Something went wrong. Please try again later.