1.4k total citations 40 papers, 735 citations indexed
About
Juraj Somorovsky is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications.
According to data from OpenAlex, Juraj Somorovsky has authored 40 papers receiving a total of 735 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Artificial Intelligence, 18 papers in Information Systems and 17 papers in Computer Networks and Communications. Recurrent topics in Juraj Somorovsky's work include Advanced Malware Detection Techniques (13 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (11 papers). Juraj Somorovsky is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), Cryptographic Implementations and Security (12 papers) and Security and Verification in Computing (11 papers). Juraj Somorovsky collaborates with scholars based in Germany, United Kingdom and United States. Juraj Somorovsky's co-authors include Jörg Schwenk, Tibor Jager, Meiko Jensen, Sebastian Schinzel, Christian Mainka, Mario Heiderich, Nils Gruschka, Luigi Lo Iacono, Andreas Mayer and Paul Rösler and has published in prestigious journals such as Network and Distributed System Security Symposium, it - Information Technology and USENIX Security Symposium.
In The Last Decade
Juraj Somorovsky
39 papers
receiving
682 citations
Peers — A (Enhanced Table)
Peers by citation overlap · career bar shows stage (early→late)
cites ·
hero ref
Countries citing papers authored by Juraj Somorovsky
Since
Specialization
Citations
This map shows the geographic impact of Juraj Somorovsky's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Juraj Somorovsky with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Juraj Somorovsky more than expected).
Fields of papers citing papers by Juraj Somorovsky
This network shows the impact of papers produced by Juraj Somorovsky. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Juraj Somorovsky. The network helps show where Juraj Somorovsky may publish in the future.
Co-authorship network of co-authors of Juraj Somorovsky
This figure shows the co-authorship network connecting the top 25 collaborators of Juraj Somorovsky.
A scholar is included among the top collaborators of Juraj Somorovsky based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Juraj Somorovsky. Juraj Somorovsky is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Fiterău-Broştean, Paul, et al.. (2020). Analysis of DTLS Implementations Using Protocol State Fuzzing.. KTH Publication Database DiVA (KTH Royal Institute of Technology). 2523–2540.23 indexed citations
Mainka, Christian, et al.. (2015). How to break XML encryption – automatically. 11–11.6 indexed citations
17.
Somorovsky, Juraj, et al.. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. TUbilio (Technical University of Darmstadt).41 indexed citations
18.
Jager, Tibor, Kenneth G. Paterson, & Juraj Somorovsky. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. Network and Distributed System Security Symposium.17 indexed citations
Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, et al.. (2011). All your clouds are belong to us. Publication Server of Bonn-Rhein-Sieg University of Applied Sciences (Bonn-Rhein-Sieg University of Applied Sciences).1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.