This map shows the geographic impact of Justin Cappos's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Justin Cappos with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Justin Cappos more than expected).
This network shows the impact of papers produced by Justin Cappos. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Justin Cappos. The network helps show where Justin Cappos may publish in the future.
Co-authorship network of co-authors of Justin Cappos
This figure shows the co-authorship network connecting the top 25 collaborators of Justin Cappos.
A scholar is included among the top collaborators of Justin Cappos based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Justin Cappos. Justin Cappos is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Curtmola, Reza, et al.. (2019). in-toto: Providing farm-to-table guarantees for bits and bytes. USENIX Security Symposium. 1393–1410.13 indexed citations
2.
Curtmola, Reza, et al.. (2018). le-git-imate. 469–482.2 indexed citations
3.
Kokoris-Kogias, Eleftherios, Philipp Jovanovic, Nicolas Gailly, et al.. (2017). CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. Infoscience (Ecole Polytechnique Fédérale de Lausanne). 2017. 1271–1287.30 indexed citations
4.
Cappos, Justin, et al.. (2017). Mercury: Bandwidth-effective prevention of rollback attacks against community repositories. USENIX Annual Technical Conference. 673–688.7 indexed citations
5.
Cappos, Justin, et al.. (2017). Securing Software Updates for Automotives Using Uptane.. 42.3 indexed citations
6.
Li, Yiwen, et al.. (2017). Lock-in-pop: Securing privileged operating system kernels by keeping on the beaten path. USENIX Annual Technical Conference. 1–13.10 indexed citations
7.
Cappos, Justin, et al.. (2016). Diplomat: using delegations to protect community repositories. Networked Systems Design and Implementation. 567–581.15 indexed citations
8.
Curtmola, Reza, et al.. (2016). On omitting commits and committing omissions: Preventing Git metadata tampering that (re)introduces software vulnerabilities. USENIX Security Symposium. 379–395.6 indexed citations
9.
Zhuang, Yanyan, et al.. (2015). Privacy-preserving experimentation with sensibility testbed. 40(4). 18–21.2 indexed citations
Cappos, Justin & Ivan Beschastnikh. (2010). Teaching networking and distributed systems with Seattle: tutorial presentation. Journal of computing sciences in colleges. 25(5). 308–310.2 indexed citations
13.
Cappos, Justin & Jonathan Jacky. (2010). Model-based testing without a model: assessing portability in the Seattle testbed. International Conference on Systems. 4–4.
14.
Cappos, Justin & Ivan Beschastnikh. (2009). Teaching networking and distributed systems with Seattle. Journal of computing sciences in colleges. 25(1). 173–174.2 indexed citations
15.
Cappos, Justin, et al.. (2009). package managers still vulnerable: how to protect your systems. 34(1). 7–15.1 indexed citations
16.
Cappos, Justin, et al.. (2008). Centralized Package Management Using Stork.. 33.1 indexed citations
17.
Cappos, Justin & John H. Hartman. (2008). San Fermín: aggregating large data sets using a binomial swap forest. Networked Systems Design and Implementation. 147–160.12 indexed citations
18.
Cappos, Justin, et al.. (2008). Dependable self-hosting distributed systems using constraints. 11–11.6 indexed citations
Cappos, Justin, et al.. (2007). Stork: package management for distributed VM environments. USENIX Large Installation Systems Administration Conference. 7.16 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.