This map shows the geographic impact of Sean W. Smith's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sean W. Smith with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sean W. Smith more than expected).
This network shows the impact of papers produced by Sean W. Smith. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sean W. Smith. The network helps show where Sean W. Smith may publish in the future.
Co-authorship network of co-authors of Sean W. Smith
This figure shows the co-authorship network connecting the top 25 collaborators of Sean W. Smith.
A scholar is included among the top collaborators of Sean W. Smith based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Sean W. Smith. Sean W. Smith is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Novak, Christopher, et al.. (2017). Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.. Symposium On Usable Privacy and Security.1 indexed citations
4.
Korbar, Bruno, et al.. (2016). Validating an Agent-Based Model of Human Password Behavior. National Conference on Artificial Intelligence.4 indexed citations
5.
Koppel, Ross, et al.. (2016). Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. Symposium On Usable Privacy and Security.6 indexed citations
6.
Smith, Sean W., et al.. (2015). Mismorphism: a Semiotic Model of Computer Security Circumvention. 172–182.4 indexed citations
Bratus, Sergey, et al.. (2011). Using hierarchal change mining to manage network security policy evolution. 8–8.3 indexed citations
11.
Stolfo, Salvatore J., et al.. (2010). Insider Attack and Cyber Security: Beyond the Hacker. Digital Access to Libraries (Université catholique de Louvain (UCL), l'Université de Namur (UNamur) and the Université Saint-Louis (USL-B)).36 indexed citations
Stolfo, Salvatore J., et al.. (2008). Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security). Springer eBooks.3 indexed citations
14.
Kapadia, Apu, Patrick P. Tsang, & Sean W. Smith. (2007). Attribute-Based Publishing with Hidden Credentials and Hidden Policies.. Network and Distributed System Security Symposium.74 indexed citations
15.
Smith, Sean W., et al.. (2005). Shemp: secure hardware enhanced myproxy.6 indexed citations
16.
Smith, Sean W., et al.. (2004). USING SPKI/SDSI FOR DISTRIBUTED MAINTENANCE OF ATTRIBUTE RELEASE POLICIES IN SHIBBOLETH ∞. 218–226.7 indexed citations
17.
Smith, Sean W.. (2004). Probing End-User IT Security Practices--Through Homework.. The EDUCAUSE quarterly/EDUCAUSE quarterly. 27(4). 68–71.5 indexed citations
18.
Shubina, Anna & Sean W. Smith. (2004). Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting System.. 29–39.4 indexed citations
19.
Seligman, Paul J. & Sean W. Smith. (2004). DETECTING UNAUTHORIZED USE IN ONLINE JOURNAL ARCHIVES: A CASE STUDY ∞. 209–217.1 indexed citations
20.
Smith, Sean W., et al.. (2001). Improving DES coprocessor throughput for short operations. USENIX Security Symposium. 6–6.10 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.