Countries citing papers authored by Mikhail Auguston
Since
Specialization
Citations
This map shows the geographic impact of Mikhail Auguston's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mikhail Auguston with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mikhail Auguston more than expected).
Fields of papers citing papers by Mikhail Auguston
This network shows the impact of papers produced by Mikhail Auguston. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mikhail Auguston. The network helps show where Mikhail Auguston may publish in the future.
Co-authorship network of co-authors of Mikhail Auguston
This figure shows the co-authorship network connecting the top 25 collaborators of Mikhail Auguston.
A scholar is included among the top collaborators of Mikhail Auguston based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Mikhail Auguston. Mikhail Auguston is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Auguston, Mikhail & Clifford Whitcomb. (2012). Behavior Models and Composition for Software and Systems Architecture. Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School).7 indexed citations
Auguston, Mikhail, et al.. (2007). Toward a Security Domain Model for Static Analysis and Verification of Information Systems.5 indexed citations
6.
Liu, Shih-Hsi, et al.. (2005). Quality of Service-Driven Requirements Analyses for Component Composition: A Two-Level Grammar++ Approach. Defense Technical Information Center (DTIC). 731–734.1 indexed citations
Bryant, Barrett R., et al.. (2004). Grammatically Interpreting Feature Compositions. Defense Technical Information Center (DTIC). 185–191.4 indexed citations
Michael, James, et al.. (2004). Phase II report on intelligent software decoys: intelligent software decoy tools for cyber counterintelligence and security countermeasures. Defense Technical Information Center (DTIC).3 indexed citations
12.
Bryant, Barrett R., et al.. (2003). Automating Feature-Oriented Domain Analysis. Defense Technical Information Center (DTIC). 944–949.17 indexed citations
13.
Raje, Rajeev R., et al.. (2003). Assembling Components with Aspect-Oriented Modeling/Specification. Defense Technical Information Center (DTIC).2 indexed citations
14.
Auguston, Mikhail, et al.. (2003). Some axioms and issues in the UFO dynamic analysis framework. Defense Technical Information Center (DTIC).4 indexed citations
15.
Michael, James, et al.. (2002). Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security. Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School).2 indexed citations
16.
Michael, James Bret, et al.. (2002). Software Decoys: Intrusion Detection and Countermeasures. Defense Technical Information Center (DTIC).16 indexed citations
17.
Raje, Rajeev R., et al.. (2001). A Unified Approach for the Integration of Distributed Heterogeneous Software Components. Defense Technical Information Center (DTIC).25 indexed citations
18.
Auguston, Mikhail. (1999). Tools for Program Dynamic Analysis, Testing, and Debugging Based on Event Grammars.3 indexed citations
19.
Auguston, Mikhail. (1994). A language for debugging automation.. Software Engineering and Knowledge Engineering. 108–115.9 indexed citations
20.
Fritzson, Peter, Mikhail Auguston, & Nahid Shahmehri. (1992). Using Assertions in Declarative and Operational Models for Automated Debugging. International Conference on Software Engineering.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.