This map shows the geographic impact of Larry Feldman's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Larry Feldman with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Larry Feldman more than expected).
This network shows the impact of papers produced by Larry Feldman. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Larry Feldman. The network helps show where Larry Feldman may publish in the future.
Co-authorship network of co-authors of Larry Feldman
This figure shows the co-authorship network connecting the top 25 collaborators of Larry Feldman.
A scholar is included among the top collaborators of Larry Feldman based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Larry Feldman. Larry Feldman is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Moody, Dustin, et al.. (2018). Securing Tomorrow's Information through Post-Quantum Cryptography | NIST.2 indexed citations
3.
Black, Paul E., et al.. (2017). Dramatically Reducing Software Vulnerabilities | NIST.5 indexed citations
4.
Johnson, Christopher S., et al.. (2017). Cyber Threat Intelligence and Information Sharing | NIST.1 indexed citations
5.
Iorga, Michaela, et al.. (2017). The NIST Definition of Fog Computing.23 indexed citations
6.
Feldman, Larry, et al.. (2017). Updated NIST Guidance for Bluetooth Security.2 indexed citations
7.
Pillitteri, Victoria, et al.. (2017). The Cybersecurity Framework: Implementation Guidance for Federal Agencies.8 indexed citations
8.
Souppaya, Murugiah, et al.. (2017). Guide for Cybersecurity Incident Recovery.3 indexed citations
9.
Ferraiolo, David F., et al.. (2016). Exploring the Next Generation of Access Control Methodologies | NIST.3 indexed citations
10.
Scarfone, Karen, et al.. (2016). Implementing Trusted Geolocation Services in the Cloud | NIST.1 indexed citations
11.
Dempsey, Kelley, et al.. (2015). Release of NIST Special Publication 800-53A, Revision 4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations | NIST.4 indexed citations
12.
Dworkin, Morris J., et al.. (2015). Additional Secure Hash Algorithm Standards Offer New Opportunities for Data Protection | NIST.1 indexed citations
13.
Souppaya, Murugiah, et al.. (2015). Stopping Malware and Unauthorized Software through Application Whitelisting | NIST.
14.
Regenscheid, Andrew, et al.. (2015). NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization.8 indexed citations
15.
Feldman, Larry, et al.. (2014). Release of NIST Special Publication 800-157, Guidelines for Derived Personal Identity Verification (PIV) Credentials | NIST.1 indexed citations
Mell, Peter, et al.. (1969). CAESARS Framework Extension: An Enterprise Continuous Monitoring Technical Reference Architecture (Draft).1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.