default search action
Abdun Naser Mahmood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2008
- [b1]Abdun Naser Mahmood:
Hierarchical clustering and summarization of network traffic data. University of Melbourne, Australia, 2008
Journal Articles
- 2025
- [j48]Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury:
ICS-LTU2022: A dataset for ICS vulnerabilities. Comput. Secur. 148: 104143 (2025) - 2024
- [j47]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. Comput. Secur. 142: 103864 (2024) - [j46]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms. ACM Comput. Surv. 56(6): 145:1-145:41 (2024) - [j45]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
A systematic literature review on Windows malware detection: Techniques, research issues, and future directions. J. Syst. Softw. 209: 111921 (2024) - [j44]Quynh Tu Ngo, Khoa Tran Phan, Abdun Mahmood, Wei Xiang:
Hybrid IRS-Assisted Secure Satellite Downlink Communications: A Fast Deep Reinforcement Learning Approach. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2858-2869 (2024) - [j43]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
A Secure Federated Learning Framework for Residential Short-Term Load Forecasting. IEEE Trans. Smart Grid 15(2): 2044-2055 (2024) - 2023
- [j42]Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury:
SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues. Comput. Secur. 125: 103028 (2023) - [j41]Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari:
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids. ACM Comput. Surv. 55(14s): 331:1-331:37 (2023) - [j40]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
False data injection threats in active distribution systems: A comprehensive survey. Future Gener. Comput. Syst. 140: 344-364 (2023) - [j39]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques. J. Netw. Comput. Appl. 218: 103704 (2023) - [j38]Abdullah Alsaedi, Zahir Tari, Md. Redowan Mahmud, Nour Moustafa, Abdun Mahmood, Adnan Anwar:
USMD: UnSupervised Misbehaviour Detection for Multi-Sensor Data. IEEE Trans. Dependable Secur. Comput. 20(1): 724-739 (2023) - [j37]Quynh Tu Ngo, Khoa Tran Phan, Abdun Mahmood, Wei Xiang:
Physical Layer Security in IRS-Assisted Cache-Enabled Satellite Communication Networks. IEEE Trans. Green Commun. Netw. 7(4): 1920-1931 (2023) - [j36]Juhar Ahmed Abdella, Zahir Tari, Md. Redowan Mahmud, Nasrin Sohrabi, Adnan Anwar, Abdun Mahmood:
HiCoOB: Hierarchical Concurrent Optimistic Blockchain Consensus Protocol for Peer-to-Peer Energy Trading Systems. IEEE Trans. Smart Grid 14(5): 3927-3943 (2023) - 2022
- [j35]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges. Future Gener. Comput. Syst. 130: 1-18 (2022) - [j34]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Mahmood, Jill Slay:
Two-Tier Cache-Aided Full-Duplex Hybrid Satellite-Terrestrial Communication Networks. IEEE Trans. Aerosp. Electron. Syst. 58(3): 1753-1765 (2022) - 2021
- [j33]Jakapan Suaboot, Adil Fahad, Zahir Tari, John C. Grundy, Abdun Naser Mahmood, Abdulmohsen Almalawi, Albert Y. Zomaya, Khalil Drira:
A Taxonomy of Supervised Learning for IDSs in SCADA Environments. ACM Comput. Surv. 53(2): 40:1-40:37 (2021) - [j32]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Mahmood, Jill Slay:
On Edge Caching in Satellite - IoT Networks. IEEE Internet Things Mag. 4(4): 107-112 (2021) - [j31]Haftu Tasew Reda, Biplob Ray, Pejman Peidaee, Adnan Anwar, Abdun Mahmood, Akhtar Kalam, Nahina Islam:
Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid. Sensors 21(4): 1554 (2021) - [j30]Juhar Ahmed Abdella, Zahir Tari, Adnan Anwar, Abdun Naser Mahmood, Fengling Han:
An Architecture and Performance Evaluation of Blockchain-Based Peer-to-Peer Energy Trading. IEEE Trans. Smart Grid 12(4): 3364-3378 (2021) - 2020
- [j29]Abebe Abeshu Diro, Haftu Reda, Naveen K. Chilamkurti, Abdun Naser Mahmood, Noor Zaman, Yunyoung Nam:
Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication. IEEE Access 8: 60539-60551 (2020) - [j28]Abdullah Alsaedi, Nour Moustafa, Zahir Tari, Abdun Naser Mahmood, Adnan Anwar:
TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems. IEEE Access 8: 165130-165150 (2020) - [j27]Jakapan Suaboot, Zahir Tari, Abdun Naser Mahmood, Albert Y. Zomaya, Wei Li:
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences. Comput. Secur. 92: 101773 (2020) - [j26]Haftu Tasew Reda, Abdun Naser Mahmood, Abebe Abeshu Diro, Naveen K. Chilamkurti, Suresh Kallam:
Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications. Neural Comput. Appl. 32(20): 16011-16023 (2020) - [j25]Zubair Shah, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari, Albert Y. Zomaya:
A Spatiotemporal Data Summarization Approach for Real-Time Operation of Smart Grid. IEEE Trans. Big Data 6(4): 624-637 (2020) - [j24]Md. Enamul Kabir, Abdun Naser Mahmood, Hua Wang, Abdul K. Mustafa:
Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing. IEEE Trans. Cloud Comput. 8(2): 408-417 (2020) - 2019
- [j23]Sanket Desai, Rabei Alhadad, Naveen K. Chilamkurti, Abdun Naser Mahmood:
A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure. Clust. Comput. 22(1): 43-69 (2019) - [j22]Sanket Desai, Rabei Alhadad, Abdun Naser Mahmood, Naveen K. Chilamkurti, Seungmin Rho:
Multi-State Energy Classifier to Evaluate the Performance of the NILM Algorithm. Sensors 19(23): 5236 (2019) - 2018
- [j21]Zubair Shah, Abdun Naser Mahmood, Michael Barlow, Zahir Tari, Xun Yi, Albert Y. Zomaya:
Computing Hierarchical Summary from Two-Dimensional Big Data Streams. IEEE Trans. Parallel Distributed Syst. 29(4): 803-818 (2018) - 2017
- [j20]Adnan Anwar, Abdun Naser Mahmood, Mark Pickering:
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements. J. Comput. Syst. Sci. 83(1): 58-72 (2017) - [j19]Adnan Anwar, Abdun Naser Mahmood, Zahir Tari:
Ensuring Data Integrity of OPF Module and Energy Database by Detecting Changes in Power Flow Patterns in Smart Grids. IEEE Trans. Ind. Informatics 13(6): 3299-3311 (2017) - [j18]Zubair Shah, Abdun Naser Mahmood, Zahir Tari, Albert Y. Zomaya:
A Technique for Efficient Query Estimation over Distributed Data Streams. IEEE Trans. Parallel Distributed Syst. 28(10): 2770-2783 (2017) - [j17]Adnan Anwar, Abdun Naser Mahmood, Javid Taheri, Zahir Tari, Albert Y. Zomaya:
HPC-Based Intelligent Volt/VAr Control of Unbalanced Distribution Smart Grid in the Presence of Noise. IEEE Trans. Smart Grid 8(3): 1446-1459 (2017) - 2016
- [j16]Mohiuddin Ahmed, Abdun Naser Mahmood, Md. Rafiqul Islam:
A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55: 278-288 (2016) - [j15]Mohiuddin Ahmed, Abdun Naser Mahmood, Jiankun Hu:
A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60: 19-31 (2016) - 2015
- [j14]Mohiuddin Ahmed, Adnan Anwar, Abdun Naser Mahmood, Zubair Shah, Michael J. Maher:
An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2(3): e5 (2015) - [j13]Adnan Anwar, Abdun Naser Mahmood, Zahir Tari:
Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid. Inf. Syst. 53: 201-212 (2015) - [j12]Zubair Shah, Abdun Naser Mahmood, Michael Barlow:
Computing discounted multidimensional hierarchical aggregates using modified Misra Gries algorithm. Perform. Evaluation 91: 170-186 (2015) - [j11]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
An Efficient Technique for Network Traffic Summarization using Multiview Clustering and Statistical Sampling. EAI Endorsed Trans. Scalable Inf. Syst. 2(5): e4 (2015) - 2014
- [j10]Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood:
PPFSCADA: Privacy preserving framework for SCADA data publishing. Future Gener. Comput. Syst. 37: 496-511 (2014) - [j9]Amir Aryani, Fabrizio Perin, Mircea Lungu, Abdun Naser Mahmood, Oscar Nierstrasz:
Predicting dependences using domain-based coupling. J. Softw. Evol. Process. 26(1): 50-76 (2014) - 2013
- [j8]Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari:
A Probabilistic Model to Predict the Survivability of SCADA Systems. IEEE Trans. Ind. Informatics 9(4): 1975-1985 (2013) - 2011
- [j7]Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood:
A clustering based system for instant detection of cardiac abnormalities from compressed ECG. Expert Syst. Appl. 38(5): 4705-4713 (2011) - [j6]Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood:
Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient. J. Medical Syst. 35(6): 1349-1358 (2011) - [j5]Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood:
Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy. J. Netw. Comput. Appl. 34(4): 1150-1159 (2011) - [j4]Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari:
SCADASim - A Framework for Building SCADA Simulations. IEEE Trans. Smart Grid 2(4): 589-597 (2011) - 2010
- [j3]Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Christopher Leckie:
Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic. J. Netw. Comput. Appl. 33(4): 491-502 (2010) - 2009
- [j2]Md. Rafiqul Islam, Wanlei Zhou, Yang Xiang, Abdun Naser Mahmood:
Spam filtering for network traffic security on a multi-core environment. Concurr. Comput. Pract. Exp. 21(10): 1307-1320 (2009) - 2008
- [j1]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis. IEEE Trans. Knowl. Data Eng. 20(6): 752-767 (2008)
Conference and Workshop Papers
- 2023
- [c23]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. INFOCOM Workshops 2023: 1-6 - 2021
- [c22]Quynh Tu Ngo, Khoa Tran Phan, Wei Xiang, Abdun Naser Mahmood, Jill Slay:
Two-Tier Cache-Aided Full-Duplex Content Delivery in Satellite-Terrestrial Networks. CSoNet 2021: 291-302 - 2016
- [c21]Adnan Anwar, Abdun Naser Mahmood, Mark Pickering:
Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements. PAISI 2016: 180-192 - [c20]Zubair Shah, Abdun Naser Mahmood, Michael Barlow:
Computing Hierarchical Summary of the Data Streams. PAKDD (2) 2016: 168-179 - [c19]Adnan Anwar, Abdun Naser Mahmood, Mark Pickering:
Estimation of smart grid topology using SCADA measurements. SmartGridComm 2016: 539-544 - 2015
- [c18]Adnan Anwar, Abdun Naser Mahmood, Zubair Shah:
A Data-Driven Approach to Distinguish Cyber-Attacks from Physical Faults in a Smart Grid. CIKM 2015: 1811-1814 - 2014
- [c17]Zubair Shah, Abdun Naser Mahmood:
A summarization paradigm for big data. IEEE BigData 2014: 61-63 - [c16]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
An Efficient Approach for Complex Data Summarization Using Multiview Clustering. Infoscale 2014: 38-47 - [c15]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
A Novel Approach for Network Traffic Summarization. Infoscale 2014: 51-60 - [c14]Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher:
Heart Disease Diagnosis Using Co-clustering. Infoscale 2014: 61-70 - [c13]Zubair Shah, Abdun Naser Mahmood, Jill Slay:
Forensic Potentials of Solid State Drives. SecureComm (2) 2014: 113-126 - [c12]Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa:
Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure Control. SecureComm (2) 2014: 157-172 - [c11]Mohiuddin Ahmed, Abdun Naser Mahmood:
Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection. SecureComm (2) 2014: 204-219 - [c10]Adnan Anwar, Abdun Naser Mahmood, Mohiuddin Ahmed:
False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid Operation. SecureComm (2) 2014: 252-266 - 2013
- [c9]Zubair Shah, Rashid Naseem, Mehmet A. Orgun, Abdun Naser Mahmood, Sara Shahzad:
Software Clustering Using Automated Feature Subset Selection. ADMA (2) 2013: 47-58 - [c8]Zubair Shah, Abdun Naser Mahmood, Mehmet A. Orgun, M. Hadi Mashinchi:
Subset Selection Classifier (SSC): A Training Set Reduction Method. CSE 2013: 862-869 - 2012
- [c7]Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa:
New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. SecureComm 2012: 256-272 - 2011
- [c6]Amir Aryani, Fabrizio Perin, Mircea Lungu, Abdun Naser Mahmood, Oscar Nierstrasz:
Can We Predict Dependencies Using Domain information? WCRE 2011: 55-64 - 2010
- [c5]Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari:
An Analytical Framework for Evaluating Survivability of SCADA Systems. CIT 2010: 877-881 - [c4]Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari:
Survivable SCADA Systems: An Analytical Framework Using Performance Modelling. GLOBECOM 2010: 1-5 - 2009
- [c3]Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu:
Building a SCADA Security Testbed. NSS 2009: 357-364 - 2007
- [c2]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
A scalable sampling scheme for clustering in network traffic analysis. Infoscale 2007: 38 - 2006
- [c1]Abdun Naser Mahmood, Christopher Leckie, Parampalli Udaya:
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis. Networking 2006: 1092-1098
Parts in Books or Collections
- 2010
- [p1]Abdun Naser Mahmood, Christopher Leckie, Jiankun Hu, Zahir Tari, Mohammed Atiquzzaman:
Network Traffic Analysis and SCADA Security. Handbook of Information and Communication Security 2010: 383-405
Informal and Other Publications
- 2024
- [i19]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls. CoRR abs/2407.13355 (2024) - [i18]Muhammad Akbar Husnoo, Adnan Anwar, Md Enamul Haque, Abdun Naser Mahmood:
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach. CoRR abs/2407.15879 (2024) - 2023
- [i17]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination. CoRR abs/2303.16956 (2023) - [i16]Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FedDiSC: A Computation-efficient Federated Learning Framework for Power Systems Disturbance and Cyber Attack Discrimination. CoRR abs/2304.03640 (2023) - 2022
- [i15]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers. CoRR abs/2203.00219 (2022) - [i14]Haftu Tasew Reda, Abdun Mahmood, Adnan Anwar, Naveen K. Chilamkurti:
Adversarial Models Towards Data Availability and Integrity of Distributed State Estimation for Industrial IoT-Based Smart Grid. CoRR abs/2206.06027 (2022) - [i13]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
MalDetConv: Automated Behaviour-based Malware Detection Framework Based on Natural Language Processing and Deep Learning Techniques. CoRR abs/2209.03547 (2022) - [i12]Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms. CoRR abs/2209.03622 (2022) - [i11]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
A Secure Federated Learning Framework for Residential Short Term Load Forecasting. CoRR abs/2209.14547 (2022) - 2021
- [i10]Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood:
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts. CoRR abs/2103.10594 (2021) - [i9]Haftu Tasew Reda, Adnan Anwar, Abdun Naser Mahmood, Zahir Tari:
A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grid. CoRR abs/2103.16085 (2021) - [i8]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey. CoRR abs/2111.14251 (2021) - 2016
- [i7]Adnan Anwar, Abdun Naser Mahmood, Mark Pickering:
Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements. CoRR abs/1605.06180 (2016) - 2014
- [i6]Adnan Anwar, Abdun Naser Mahmood:
Cyber Security of Smart Grid Infrastructure. CoRR abs/1401.3936 (2014) - [i5]Maumita Bhattacharya, Md. Rafiqul Islam, Abdun Naser Mahmood:
Uncertainty And Evolutionary Optimization: A Novel Approach. CoRR abs/1407.4000 (2014) - [i4]Adnan Anwar, Abdun Naser Mahmood:
Enhanced Estimation of Autoregressive Wind Power Prediction Model Using Constriction Factor Particle Swarm Optimization. CoRR abs/1408.4792 (2014) - [i3]Adnan Anwar, Abdun Naser Mahmood:
Swarm Intelligence Based Multi-phase OPF For Peak Power Loss Reduction In A Smart Grid. CoRR abs/1408.4849 (2014) - [i2]Adnan Anwar, Abdun Naser Mahmood:
Vulnerabilities of Smart Grid State Estimation against False Data Injection Attack. CoRR abs/1411.2671 (2014) - 2000
- [i1]Md. Enamul Karim, Abdun Naser Mahmood:
Random Shuffling to Reduce Disorder in Adaptive Sorting Scheme. CoRR cs.DS/0012002 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint