Countries citing papers authored by George Kesidis
Since
Specialization
Citations
This map shows the geographic impact of George Kesidis's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by George Kesidis with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites George Kesidis more than expected).
This network shows the impact of papers produced by George Kesidis. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by George Kesidis. The network helps show where George Kesidis may publish in the future.
Co-authorship network of co-authors of George Kesidis
This figure shows the co-authorship network connecting the top 25 collaborators of George Kesidis.
A scholar is included among the top collaborators of George Kesidis based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with George Kesidis. George Kesidis is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Kesidis, George, et al.. (2017). Efficient max-min and proportional fair constrained multiresource scheduling.. arXiv (Cornell University).1 indexed citations
5.
Kesidis, George, et al.. (2017). Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks.. arXiv (Cornell University).2 indexed citations
6.
Kesidis, George, et al.. (2016). Neutrality in future public clouds: implications and challenges. IEEE International Conference on Cloud Computing Technology and Science. 90–95.8 indexed citations
Wang, Cheng, Bhuvan Urgaonkar, George Kesidis, Uday V. Shanbhag, & Qian Wang. (2014). A case for virtualizing the electric utility in cloud data centers. IEEE International Conference on Cloud Computing Technology and Science. 22–22.12 indexed citations
9.
Griffin, Christopher & George Kesidis. (2013). Good Behavior in a Communications System with Cooperative, Greedy, and Vigilante Players.. arXiv (Cornell University).1 indexed citations
10.
Celik, Z. Berkay, et al.. (2011). Salting public traces with attack traffic to test flow classifiers. USENIX Security Symposium. 3–3.23 indexed citations
Kesidis, George & Jean Walrand. (1993). A Review of Quick Simulation Methods for Queues. 17–21.2 indexed citations
20.
Walrand, Jean & George Kesidis. (1991). Review of 'Large Deviation Techniques in Decision, Simulation, and Estimation' (Bucklew, J.A.; 1990).. IEEE Transactions on Information Theory. 37. 1493.58 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.