This map shows the geographic impact of Elda Paja's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Elda Paja with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Elda Paja more than expected).
This network shows the impact of papers produced by Elda Paja. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Elda Paja. The network helps show where Elda Paja may publish in the future.
Co-authorship network of co-authors of Elda Paja
This figure shows the co-authorship network connecting the top 25 collaborators of Elda Paja.
A scholar is included among the top collaborators of Elda Paja based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Elda Paja. Elda Paja is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Dalpiaz, Fabiano, Elda Paja, & Paolo Giorgini. (2016). Security Requirements Engineering: Designing Secure Socio-Technical Systems. Institutional Research Information System (Università degli Studi di Trento).18 indexed citations
8.
Li, Tong, Elda Paja, John Mylopoulos, Jennifer Horkoff, & Kristian Beckers. (2016). Security attack analysis using attack patterns. mediaTUM – the media and publications repository of the Technical University Munich (Technical University Munich). 1–13.16 indexed citations
9.
Salnitri, Mattia, et al.. (2015). STS-Tool 3.0: Maintaining security in socio-technical systems. Institutional Research Information System (Università degli Studi di Trento). 1367. 205–212.1 indexed citations
10.
Li, Tong, Jennifer Horkoff, Kristian Beckers, Elda Paja, & John Mylopoulos. (2015). A Holistic Approach to Attack Modeling and Analysis.. 49–54.2 indexed citations
11.
Paja, Elda, Jennifer Horkoff, & John Mylopoulos. (2015). The importance of teaching goal-oriented analysis techniques: an experience report. 37–42.2 indexed citations
Li, Tong, Elda Paja, John Mylopoulos, Jennifer Horkoff, & Kristian Beckers. (2015). Holistic security requirements analysis: An attacker's perspective. mediaTUM – the media and publications repository of the Technical University Munich (Technical University Munich). 282–283.4 indexed citations
14.
Paja, Elda, Fabiano Dalpiaz, & Paolo Giorgini. (2013). Designing Secure Socio-Technical Systems with STS-ml. Institutional Research Information System (Università degli Studi di Trento). 79–84.3 indexed citations
15.
Paja, Elda, et al.. (2013). STS-Tool: Specifying and Reasoning over Socio-Technical Security Requirements. Institutional Research Information System (Università degli Studi di Trento). 131–133.2 indexed citations
16.
Paja, Elda, et al.. (2012). Modelling Security Requirements in Socio-Technical Systems with STS-Tool. Institutional Research Information System (Università degli Studi di Trento). 155–162.3 indexed citations
Paja, Elda, Fabiano Dalpiaz, & Paolo Giorgini. (2012). Identifying Conflicts in Security Requirements with STS-ml. Unitn Eprints Research (Università Degli Studi di Trento).4 indexed citations
20.
Dalpiaz, Fabiano, Elda Paja, & Paolo Giorgini. (2011). Security Requirements Engineering for Service-Oriented Applications. Institutional Research Information System (Università degli Studi di Trento). 102–107.
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.