This map shows the geographic impact of Tom Chothia's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tom Chothia with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tom Chothia more than expected).
This network shows the impact of papers produced by Tom Chothia. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tom Chothia. The network helps show where Tom Chothia may publish in the future.
Co-authorship network of co-authors of Tom Chothia
This figure shows the co-authorship network connecting the top 25 collaborators of Tom Chothia.
A scholar is included among the top collaborators of Tom Chothia based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Tom Chothia. Tom Chothia is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Vanhoef, Mathy, et al.. (2022). The Closer You Look, The More You Learn. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2265–2278.8 indexed citations
3.
Chothia, Tom, Ioana Boureanu, & Liqun Chen. (2019). Making Contactless EMV Robust Against Rogue Readers Colluding With Relay Attackers. Surrey Research Insight Open Access (The University of Surrey).1 indexed citations
4.
Chothia, Tom, et al.. (2018). Phishing Attacks: Learning by Doing. USENIX Security Symposium.2 indexed citations
5.
Chothia, Tom, Joeri de Ruiter, & Ben Smyth. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. Open Repository and Bibliography (University of Luxembourg). 1563–1580.10 indexed citations
6.
Chothia, Tom, et al.. (2017). Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story. University of Birmingham Research Portal (University of Birmingham).12 indexed citations
Chothia, Tom & Joeri de Ruiter. (2016). Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom. University of Birmingham Research Portal (University of Birmingham). 1–8.5 indexed citations
Arbab, Farhad, et al.. (2009). From coordination to stochastic models of QoS. Centrum Wiskunde & Informatica (CWI), the national research institute for mathematics and computer science in the Netherlands. 1–27.8 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.