Naveen Sastry is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems.
According to data from OpenAlex, Naveen Sastry has authored 15 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Computer Networks and Communications, 7 papers in Artificial Intelligence and 6 papers in Information Systems. Recurrent topics in Naveen Sastry's work include Security and Verification in Computing (5 papers), Advanced Malware Detection Techniques (5 papers) and Distributed systems and fault tolerance (4 papers). Naveen Sastry is often cited by papers focused on Security and Verification in Computing (5 papers), Advanced Malware Detection Techniques (5 papers) and Distributed systems and fault tolerance (4 papers). Naveen Sastry collaborates with scholars based in United States. Naveen Sastry's co-authors include David Wagner, Chris Karlof, Umesh Shankar, David Wagner, David A. Patterson, Jonathan Traupman, David Oppenheimer, William H. Tetzlaff, Mike Y. Chen and George Candea and has published in prestigious journals such as Network and Distributed System Security Symposium, USENIX Security Symposium and UC Berkeley.
In The Last Decade
Naveen Sastry
14 papers
receiving
2.1k citations
Hit Papers
What are hit papers?
Hit papers significantly outperform the citation benchmark for their cohort. A paper qualifies
if it has ≥500 total citations, achieves ≥1.5× the top-1% citation threshold for papers in the
same subfield and year (this is the minimum needed to enter the top 1%, not the average
within it), or reaches the top citation threshold in at least one of its specific research
topics.
TinySec
20041.1k citationsChris Karlof, Naveen Sastry et al.profile →
Peers — A (Enhanced Table)
Peers by citation overlap · career bar shows stage (early→late)
cites ·
hero ref
This map shows the geographic impact of Naveen Sastry's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Naveen Sastry with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Naveen Sastry more than expected).
This network shows the impact of papers produced by Naveen Sastry. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Naveen Sastry. The network helps show where Naveen Sastry may publish in the future.
Co-authorship network of co-authors of Naveen Sastry
This figure shows the co-authorship network connecting the top 25 collaborators of Naveen Sastry.
A scholar is included among the top collaborators of Naveen Sastry based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Naveen Sastry. Naveen Sastry is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Wagner, David M., David Jefferson, Matt Bishop, Chris Karlof, & Naveen Sastry. (2006). Security Analysis of the Diebold AccuBasic Interpreter.25 indexed citations
3.
Sastry, Naveen, Tadayoshi Kohno, & David Wagner. (2006). Designing voting machines for verification. 22.24 indexed citations
4.
Karlof, Chris, Naveen Sastry, & David Wagner. (2005). Cryptographic voting protocols: a systems perspective. USENIX Security Symposium. 3–3.61 indexed citations
5.
Borisov, Nikita, Rob Johnson, Naveen Sastry, & David Wagner. (2005). Fixing races for fun and profit: how to abuse atime. USENIX Security Symposium. 20–20.27 indexed citations
6.
Karlof, Chris, Naveen Sastry, Yaping Li, Adrian Perrig, & J. D. Tygar. (2004). Distillation Codes and Applications to DoS Resistant Multicast Authentication. Network and Distributed System Security Symposium.63 indexed citations
Sastry, Naveen, et al.. (2002). FIG: A Prototype Tool for Online Verification of Recovery Mechanisms.32 indexed citations
13.
Patterson, David A., Aaron Brown, George Candea, et al.. (2002). Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies. UC Berkeley.258 indexed citations
14.
Patterson, David A., Aaron Brown, George Candea, et al.. (2002). Recovery Oriented Computing (ROC): Motivation, Definition, Techniques,.14 indexed citations
15.
Patterson, David A., Aaron Brown, George Candea, et al.. (2002). Recovery Oriented Computing: Motivation, Definition, Principles, and Examples.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.