This map shows the geographic impact of Len Sassaman's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Len Sassaman with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Len Sassaman more than expected).
This network shows the impact of papers produced by Len Sassaman. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Len Sassaman. The network helps show where Len Sassaman may publish in the future.
Co-authorship network of co-authors of Len Sassaman
This figure shows the co-authorship network connecting the top 25 collaborators of Len Sassaman.
A scholar is included among the top collaborators of Len Sassaman based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Len Sassaman. Len Sassaman is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
13 of 13 papers shown
1.
Sassaman, Len, et al.. (2014). Subliminal Channels in the Private Information Retrieval Protocols. ACM Transactions on Reconfigurable Technology and Systems.
Sassaman, Len, et al.. (2011). The Halting Problems of Network Stack Insecurity.. 36.19 indexed citations
5.
Bratus, Sergey, et al.. (2011). Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.. 36.41 indexed citations
6.
Sassaman, Len, et al.. (2011). Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach.1 indexed citations
7.
Sassaman, Len, et al.. (2010). Exploiting the Forest with Trees.1 indexed citations
8.
Sassaman, Len, et al.. (2010). The rise of Distributed, Decentralized, Amateur/Citizen Science and Do It Yourself Biology: Safety and Security Concerns.2 indexed citations
9.
Sassaman, Len, et al.. (2008). Freezing more than bits: chilling effects of the OLPC XO security model. 5.1 indexed citations
10.
Sassaman, Len, Bram Cohen, & Nick Mathewson. (2005). The pynchon gate. 1–9.25 indexed citations
11.
Dingledine, Roger & Len Sassaman. (2003). Attacks on Anonymity Systems: Theory and Practice.
Sassaman, Len. (2002). The Promise of Privacy.. USENIX Large Installation Systems Administration Conference.2 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.