This map shows the geographic impact of Dave Levin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dave Levin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dave Levin more than expected).
This network shows the impact of papers produced by Dave Levin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dave Levin. The network helps show where Dave Levin may publish in the future.
Co-authorship network of co-authors of Dave Levin
This figure shows the co-authorship network connecting the top 25 collaborators of Dave Levin.
A scholar is included among the top collaborators of Dave Levin based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Dave Levin. Dave Levin is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Kohler, Eddie, et al.. (2023). No Root Store Left Behind. VTechWorks (Virginia Tech). 295–301.2 indexed citations
Bock, Kevin W., et al.. (2021). Weaponizing Middleboxes for {TCP} Reflected Amplification. USENIX Security Symposium. 3345–3361.3 indexed citations
6.
Bock, Kevin W., et al.. (2020). Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Whitelister. USENIX Security Symposium.7 indexed citations
7.
Garman, Christina, et al.. (2020). Achieving Keyless {CDNs} with Conclaves. USENIX Security Symposium. 735–751.7 indexed citations
8.
Chandrasekaran, B., et al.. (2020). A Deeper Look at Web Content Availability and Consistency over HTTP/S..2 indexed citations
Bock, Kevin W., et al.. (2018). King of the Hill: A Novel Cybersecurity Competition for Teaching Penetration Testing.. USENIX Security Symposium.16 indexed citations
11.
Levin, Dave, et al.. (2017). DeTor: Provably Avoiding Geographic Regions in Tor.. USENIX Security Symposium. 343–359.6 indexed citations
12.
Chung, Taejoong, Roland van Rijswijk-Deij, B. Chandrasekaran, et al.. (2017). A longitudinal, end-to-end view of the DNSSEC ecosystem. University of Twente Research Information. 1307–1322.43 indexed citations
13.
Levin, Dave, et al.. (2015). Alibi Routing. 611–624.25 indexed citations
Levin, Dave, John R. Douceur, Jacob R. Lorch, & Thomas Moscibroda. (2009). TrInc: small trusted hardware for large distributed systems. Networked Systems Design and Implementation. 1–14.113 indexed citations
17.
Lumezanu, Cristian, Randy Baden, Dave Levin, Neil Spring, & Bobby Bhattacharjee. (2009). Symbiotic relationships in internet routing overlays. Networked Systems Design and Implementation. 83(6). 467–480.27 indexed citations
18.
Bender, Adam, Neil Spring, Dave Levin, & Bobby Bhattacharjee. (2007). Accountability as a service. 5.26 indexed citations
19.
Levin, Dave, Rob Sherwood, & Bobby Bhattacharjee. (2006). Fair File Swarming with FOX..17 indexed citations
20.
Dyn, Nira & Dave Levin. (1994). The subdivision experience. 229–244.13 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.