This map shows the geographic impact of Nina Taft's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nina Taft with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nina Taft more than expected).
This network shows the impact of papers produced by Nina Taft. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nina Taft. The network helps show where Nina Taft may publish in the future.
Co-authorship network of co-authors of Nina Taft
This figure shows the co-authorship network connecting the top 25 collaborators of Nina Taft.
A scholar is included among the top collaborators of Nina Taft based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Nina Taft. Nina Taft is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Peddinti, Sai Teja, et al.. (2021). A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. USENIX Security Symposium. 803–820.7 indexed citations
2.
Peddinti, Sai Teja, et al.. (2017). Exploring decision making with android's runtime permission dialogs using in-context surveys. Document Server@UHasselt (UHasselt). 195–210.24 indexed citations
3.
Taft, Nina, et al.. (2016). Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the {US}. Symposium On Usable Privacy and Security. 271–285.15 indexed citations
Fall, Kevin, et al.. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications.. ISCRAM.37 indexed citations
10.
Rubinstein, Benjamin I. P., Blaine Nelson, Ling Huang, et al.. (2009). ANTIDOTE. 1–14.189 indexed citations
11.
Rubinstein, Benjamin I. P., Blaine Nelson, Ling Huang, et al.. (2008). Evading Anomaly Detection through Variance Injection Attacks on PCA (Extended Abstract). 5230.2 indexed citations
Taft, Nina, et al.. (2005). A Fast Lightweight Approach to Orgin-Destination IP Traffic Estimation Using Partial Measurements. eScholarship (California Digital Library).2 indexed citations
Nucci, Antonio, Rene L. Cruz, Nina Taft, & Christophe Diot. (2004). Design of IGP Link Weights for Estimation of Traffic Matrices.. 2341–2351.6 indexed citations
Medina, Andrés Muñoz, Kavé Salamatian, Nina Taft, Ibrahim Matta, & Christophe Diot. (2004). A Two-step Statistical Approach for Inferring Network TrafficDemands (Revises Technical Report BUCS-2003-003). OpenBU (Boston University).1 indexed citations
20.
Lakhina, Anukool, Konstantina Papagiannaki, Mark Crovella, et al.. (2003). Analysis of OD Flows (Raw Data). OpenBU/Boston University Institutional Repository (Boston University).2 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.