default search action
Mohammad Abdollahi Azgomi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j63]Rojin Naseri, Mohammad Abdollahi Azgomi, Ali Naghash Asadi:
Task offloading in an optimized power-performance manner. Int. J. Commun. Syst. 37(5) (2024) - [j62]Mihan Hosseinnezhad, Mohammad Abdollahi Azgomi, Mohammad Reza Ebrahimi Dishabi:
A probabilistic trust model for cloud services using Bayesian networks. Soft Comput. 28(1): 509-526 (2024) - 2023
- [j61]Arman Sanahmadi, Mohammad Abdollahi Azgomi, Shidrokh Goudarzi:
An SRN-based model for quantitative evaluation of IoT quality attributes. Internet Things 23: 100894 (2023) - 2022
- [j60]Shidrokh Goudarzi, Seyed Ahmad Soleymani, Mohammad Hossein Anisi, Mohammad Abdollahi Azgomi, Zeinab Movahedi, Nazri Kama, Hazlifah Mohd Rusli, Muhammad Khurram Khan:
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET. Ad Hoc Networks 128: 102782 (2022) - [j59]Hamidreza Ahmadi, Mehrdad Ashtiani, Mohammad Abdollahi Azgomi, Raana Saheb Nasagh:
A DQN-based agent for automatic software refactoring. Inf. Softw. Technol. 147: 106893 (2022) - [j58]Amir Shimi, Mohammad Reza Ebrahimi Dishabi, Mohammad Abdollahi Azgomi:
An intelligent parking management system using RFID technology based on user preferences. Soft Comput. 26(24): 13869-13884 (2022) - 2021
- [j57]Ali Naghash Asadi, Mohammad Abdollahi Azgomi, Reza Entezari-Maleki:
Model-based evaluation of the power versus performance of network routing algorithms. Computing 103(8): 1723-1746 (2021) - [j56]Mahrad Hanaforoosh, Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
An approach based on multiplex networks for modeling cascading trust failures in social networks. J. Comput. Sci. 54: 101430 (2021) - [j55]Alireza Allahverdi Mamaghani, Mohammad Reza Ebrahimi Dishabi, Shayesteh Tabatabaei, Mohammad Abdollahi Azgomi:
A Novel Clustering Protocol Based on Willow Butterfly Algorithm for Diffusing Data in Wireless Sensor Networks. Wirel. Pers. Commun. 121(4): 3425-3450 (2021) - 2020
- [j54]Nastaran Hakimi Aghdam, Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks. Inf. Sci. 513: 465-503 (2020) - [j53]Ali Naghash Asadi, Mohammad Abdollahi Azgomi, Reza Entezari-Maleki:
Analytical evaluation of resource allocation algorithms and process migration methods in virtualized systems. Sustain. Comput. Informatics Syst. 25: 100370 (2020) - 2019
- [j52]Ali Naghash Asadi, Mohammad Abdollahi Azgomi, Reza Entezari-Maleki:
Unified power and performance analysis of cloud computing infrastructure using stochastic reward nets. Comput. Commun. 138: 67-80 (2019) - [j51]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A novel trust evolution algorithm based on a quantum-like model of computational trust. Cogn. Technol. Work. 21(2): 201-224 (2019) - [j50]Hamed Orojloo, Mohammad Abdollahi Azgomi:
Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets. IET Cyper-Phys. Syst.: Theory & Appl. 4(1): 50-57 (2019) - [j49]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
SQME: a framework for modeling and evaluation of software architecture quality attributes. Softw. Syst. Model. 18(4): 2609-2632 (2019) - [j48]Ali Naghash Asadi, Mohammad Abdollahi Azgomi, Reza Entezari-Maleki:
Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds. J. Supercomput. 75(5): 2837-2861 (2019) - 2018
- [j47]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
A method for dependability evaluation of software architectures. Computing 100(2): 119-150 (2018) - [j46]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
Reliability evaluation of UML/DAM software architectures under parameter uncertainty. IET Softw. 12(3): 236-244 (2018) - [j45]Mehrdad Ashtiani, Shima Hakimi-Rad, Mohammad Abdollahi Azgomi:
A Model of Trust Based on Uncertainty Theory. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 26(2): 269-298 (2018) - [j44]Hamed Orojloo, Mohammad Abdollahi Azgomi:
A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems. J. Netw. Syst. Manag. 26(4): 929-965 (2018) - [j43]Kimia Karimian, Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
An approach based on the transferrable belief model for trust evaluation in web services. Soft Comput. 22(21): 7293-7311 (2018) - [j42]Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A probabilistic model for anonymity analysis of anonymous communication networks. Telecommun. Syst. 69(2): 171-186 (2018) - 2017
- [j41]Hamed Orojloo, Mohammad Abdollahi Azgomi:
A game-theoretic approach to model and quantify the security of cyber-physical systems. Comput. Ind. 88: 44-57 (2017) - [j40]Hamed Orojloo, Mohammad Abdollahi Azgomi:
A method for evaluating the consequence propagation of security attacks in cyber-physical systems. Future Gener. Comput. Syst. 67: 57-71 (2017) - 2016
- [j39]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty. Appl. Soft Comput. 42: 18-37 (2016) - [j38]Soodeh Hosseini, Mohammad Abdollahi Azgomi:
A model for malware propagation in scale-free networks based on rumor spreading process. Comput. Networks 108: 97-107 (2016) - [j37]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory. ISC Int. J. Inf. Secur. 8(2): 141-153 (2016) - [j36]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A formulation of computational trust based on quantum decision theory. Inf. Syst. Frontiers 18(4): 735-764 (2016) - [j35]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Malware propagation modeling considering software diversity and immunization. J. Comput. Sci. 13: 49-67 (2016) - [j34]Hamed Orojloo, Mohammad Abdollahi Azgomi:
Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems. Secur. Commun. Networks 9(18): 6111-6136 (2016) - [j33]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Agent-based simulation of the dynamics of malware propagation in scale-free networks. Simul. 92(7): 709-722 (2016) - [j32]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft Comput. 20(1): 399-421 (2016) - 2015
- [j31]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process. Cogn. Technol. Work. 17(4): 465-488 (2015) - [j30]Maryam Dabaghchian, Mohammad Abdollahi Azgomi:
Model checking the observational determinism security property using PROMELA and SPIN. Formal Aspects Comput. 27(5-6): 789-804 (2015) - [j29]Hassan Motallebi, Mohammad Abdollahi Azgomi:
Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques. Inf. Comput. 241: 321-348 (2015) - [j28]Mohammad Reza Ebrahimi Dishabi, Mohammad Abdollahi Azgomi:
Differential privacy preserving clustering in distributed datasets using Haar wavelet transform. Intell. Data Anal. 19(6): 1323-1353 (2015) - [j27]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks. Int. J. Commun. Syst. 28(18): 2255-2274 (2015) - [j26]Mohammad Reza Ebrahimi Dishabi, Mohammad Abdollahi Azgomi:
Differential privacy preserving clustering using Daubechies-2 wavelet transform. Int. J. Wavelets Multiresolution Inf. Process. 13(4): 1550028:1-1550028:35 (2015) - [j25]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A survey of quantum-like approaches to decision making and cognition. Math. Soc. Sci. 75: 49-80 (2015) - [j24]Elnaz Mojahedi, Mohammad Abdollahi Azgomi:
Modeling the propagation of topology-aware P2P worms considering temporal parameters. Peer-to-Peer Netw. Appl. 8(1): 171-180 (2015) - [j23]Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. Peer-to-Peer Netw. Appl. 8(6): 1008-1022 (2015) - [j22]Raha Sadeghi, Mohammad Abdollahi Azgomi:
A method for fair propagation of user perceptions for trust management in composite services. Serv. Oriented Comput. Appl. 9(2): 157-176 (2015) - 2014
- [j21]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
Contextuality, Incompatibility and Biased Inference in a Quantum-like formulation of Computational Trust. Adv. Complex Syst. 17(5) (2014) - [j20]Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
Mean privacy: A metric for security of computer systems. Comput. Commun. 52: 47-59 (2014) - [j19]Hassan Motallebi, Mohammad Abdollahi Azgomi:
Translation from Multisingular Hybrid Petri Nets to Multisingular Hybrid Automata. Fundam. Informaticae 130(3): 275-315 (2014) - [j18]Mohammad Reza Ebrahimi Dishabi, Mohammad Abdollahi Azgomi:
Differential privacy preserving clustering based on Haar wavelet transform. Intell. Data Anal. 18(4): 583-608 (2014) - [j17]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
Attack modelling and security evaluation based on stochastic activity networks. Secur. Commun. Networks 7(4): 714-737 (2014) - [j16]Mehrdad Ashtiani, Mohammad Abdollahi Azgomi:
A distributed simulation framework for modeling cyber attacks and the evaluation of security measures. Simul. 90(9): 1071-1102 (2014) - 2013
- [j15]Tahereh Boroomandnezhad, Mohammad Abdollahi Azgomi:
An efficient control-flow checking technique for the detection of soft-errors in embedded software. Comput. Electr. Eng. 39(4): 1320-1332 (2013) - [j14]Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A stochastic model of attack process for the evaluation of security metrics. Comput. Networks 57(10): 2159-2180 (2013) - [j13]Mohammad Reza Ebrahimi Dishabi, Mohammad Abdollahi Azgomi, Amir Masoud Rahmani:
An Improved Technique for Privacy Preserving Clustering Based on Daubechies-2 Wavelet Transform. Int. J. Wavelets Multiresolution Inf. Process. 11(5) (2013) - [j12]Ali Khalili, Mohammad Abdollahi Azgomi, Amir Jalaly Bidgoly:
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description. Simul. 89(4): 539-555 (2013) - 2012
- [j11]Behzad Zare Moayedi, Mohammad Abdollahi Azgomi:
A game theoretic framework for evaluation of the impacts of hackers diversity on security measures. Reliab. Eng. Syst. Saf. 99: 45-54 (2012) - [j10]Alireza Khalilian, Mohammad Abdollahi Azgomi, Yalda Fazlalizadeh:
An improved method for test case prioritization by incorporating historical test case data. Sci. Comput. Program. 78(1): 93-116 (2012) - [j9]Hassan Motallebi, Mohammad Abdollahi Azgomi:
Modeling and verification of hybrid dynamic systems using multisingular hybrid Petri nets. Theor. Comput. Sci. 446: 48-74 (2012) - [j8]Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi:
A high-performance and scalable multi-core aware software solution for network monitoring. J. Supercomput. 59(2): 720-743 (2012) - 2011
- [j7]Sara Hajian, Mohammad Abdollahi Azgomi:
A privacy preserving clustering technique for horizontally and vertically distributed datasets. Intell. Data Anal. 15(4): 503-532 (2011) - [j6]Sara Hajian, Mohammad Abdollahi Azgomi:
On the Use of Haar Wavelet Transform and Scaling Data perturbation for Privacy Preserving Clustering of Large Datasets. Int. J. Wavelets Multiresolution Inf. Process. 9(6): 867-904 (2011) - 2010
- [j5]Mohammad Abdollahi Azgomi, Reza Entezari-Maleki:
Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets. Future Gener. Comput. Syst. 26(8): 1141-1150 (2010) - [j4]Naeimeh Laleh, Mohammad Abdollahi Azgomi:
A hybrid fraud scoring and spike detection technique in streaming data. Intell. Data Anal. 14(6): 773-800 (2010) - 2009
- [j3]Hamed Ghasemzadeh, Ehsan Behrangi, Mohammad Abdollahi Azgomi:
Conflict-free scheduling and routing of automated guided vehicles in mesh topologies. Robotics Auton. Syst. 57(6-7): 738-748 (2009) - [j2]Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior. Trans. Comput. Sci. 4: 200-214 (2009) - 2005
- [j1]Mohammad Abdollahi Azgomi, Ali Movaghar:
A modelling tool for hierarchical stochastic activity networks. Simul. Model. Pract. Theory 13(6): 505-524 (2005)
Conference and Workshop Papers
- 2015
- [c37]Paria Shirani, Mohammad Abdollahi Azgomi, Saed Alrabaee:
A method for intrusion detection in web services based on time series. CCECE 2015: 836-841 - [c36]Ali Sedaghatbaf, Mohammad Abdollahi Azgomi:
Software Architecture Modeling and Evaluation Based on Stochastic Activity Networks. FSEN 2015: 46-53 - 2014
- [c35]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
A malware propagation model considering software diversity and topology dynamics. ISCISC 2014: 73-78 - [c34]Hamed Orojloo, Mohammad Abdollahi Azgomi:
A method for modeling and evaluation of the security of cyber-physical systems. ISCISC 2014: 131-136 - 2011
- [c33]Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts. IAS 2011: 204-209 - [c32]Ahmad Jafarabadi, Mohammad Abdollahi Azgomi:
On the impacts of join and leave on the propagation ratio of topology-aware active worms. SIN 2011: 209-214 - 2010
- [c31]Meisam S. A. Najjar, Mohammad Abdollahi Azgomi:
A distributed multi-approach intrusion detection system for web services. SIN 2010: 238-244 - 2009
- [c30]Faezeh Karamzadeh, Mohammad Abdollahi Azgomi:
An automated system for search and retrieval of trademarks. ICEC 2009: 374-377 - [c29]Jaafar Almasizadeh, Mohammad Abdollahi Azgomi:
Intrusion Process Modeling for Security Quantification. ARES 2009: 114-121 - [c28]Golriz Khazan, Mohammad Abdollahi Azgomi:
A distributed attack simulation for quantitative security evaluation using SimEvents. AICCSA 2009: 382-385 - [c27]Hamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi:
An object-oriented modeling framework for petri nets and related models. AICCSA 2009: 546-549 - [c26]Mohammad Ghalambor Dezfuli, Ali-Asghar Safaei, Mohammad Abdollahi Azgomi:
DSMS scheduling regarding complex QoS metrics. AICCSA 2009: 587-594 - [c25]Ali Khalili, Amir Jalaly Bidgoly, Mohammad Abdollahi Azgomi:
PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description. Petri Nets 2009: 343-352 - [c24]Amir Jalaly Bidgoly, Ali Khalili, Mohammad Abdollahi Azgomi:
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework. Asia International Conference on Modelling and Simulation 2009: 710-715 - [c23]Behzad Zare Moayedi, Mohammad Abdollahi Azgomi:
A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors. DASC 2009: 508-513 - [c22]Mehrnoosh Divsalar, Mohammad Abdollahi Azgomi:
A Computational Trust Model for E-Commerce Systems. DigiBiz 2009: 9-18 - [c21]Behzad Zare Moayedi, Mohammad Abdollahi Azgomi:
A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations. EMS 2009: 552-557 - [c20]Omid Abedi, Reza Berangi, Mohammad Abdollahi Azgomi:
Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET. ICDCS Workshops 2009: 464-467 - [c19]Fatemeh Javadi Mottaghi, Mohammad Abdollahi Azgomi:
Workflow Modeling Using Stochastic Activity Networks. ICISTM 2009: 220-231 - [c18]Naeimeh Laleh, Mohammad Abdollahi Azgomi:
A Taxonomy of Frauds and Fraud Detection Techniques. ICISTM 2009: 256-267 - [c17]Naeimeh Laleh, Mohammad Abdollahi Azgomi:
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data. ICISTM 2009: 356-357 - [c16]Hamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi:
An Overview of a New Multi-formalism Modeling Framework. ICISTM 2009: 360-361 - [c15]Zahra Aghajani, Mohammad Abdollahi Azgomi:
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks. ISA 2009: 260-269 - [c14]Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi:
A scalable multi-core aware software architecture for high-performance network monitoring. SIN 2009: 117-122 - [c13]Yalda Fazlalizadeh, Alireza Khalilian, Mohammad Abdollahi Azgomi, Saeed Parsa:
Incorporating Historical Test Case Performance Data and Resource Constraints into Test Case Prioritization. TAP@TOOLS 2009: 43-57 - 2008
- [c12]Zobeideh Aliannezhadi, Mohammad Abdollahi Azgomi:
Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets. APSCC 2008: 548-553 - [c11]Mitra Nasri, Saeed Shariati, Mohammad Abdollahi Azgomi:
Performance Modeling of a Distributed Web Crawler Using Stochastic Activity Networks. CSICC 2008: 535-542 - [c10]Mahdi Khalesi, Mohammad Abdollahi Azgomi:
Towards a Trust-Based Model for Administration of Mailing Lists. GLOBECOM 2008: 5558-5563 - [c9]Seyedeh Leili Mirtaheri, Ehsan Mousavi Khaneghah, Mohsen Sharifi, Mohammad Abdollahi Azgomi:
The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing. ISPA 2008: 663-668 - [c8]Soodeh Hosseini, Mohammad Abdollahi Azgomi:
UML Model Refactoring with Emphasis on Behavior Preservation. TASE 2008: 125-128 - [c7]Mohammad Abdollahi Azgomi, Ali Khalili:
Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets. FMWS@CONCUR 2008: 31-42 - 2007
- [c6]Maryam Fanaeepour, Leila Naghavian, Mohammad Abdollahi Azgomi:
Modeling and Evaluation of Call Centers with GSPN Models. AICCSA 2007: 619-622 - 2006
- [c5]Mohammad Abdollahi Azgomi, Ali Movaghar:
Efficient Evaluation of CSAN Models by State Space Analysis Methods. ICSEA 2006: 57 - [c4]Mohammad Abdollahi Azgomi, Ali Movaghar:
Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks. ICSEA 2006: 58 - 2005
- [c3]Ali Kamandi, Mohammad Abdollahi Azgomi, Ali Movaghar:
Transformation of UML Models into Analyzable OSAN Models. FSEN 2005: 3-22 - 2004
- [c2]Mohammad Abdollahi Azgomi, Ali Movaghar-Rahimabadi:
Modeling and Evaluation with Object Stochastic Activity Networks. QEST 2004: 326-327 - 2002
- [c1]Mohammad Abdollahi Azgomi, Ali Movaghar:
An Introduction to New Extensions for Stochastic Activity Networks. IASTED PDCS 2002: 405-410
Informal and Other Publications
- 2016
- [i5]Elaheh Ghassabani, Mohammad Abdollahi Azgomi:
Stateless Code Model Checking of Information Flow Security. CoRR abs/1603.03533 (2016) - [i4]Elaheh Ghassabani, Mohammad Abdollahi Azgomi:
A New Approach to Stateless Model Checking of LTL Properties. CoRR abs/1603.03535 (2016) - [i3]Elaheh Ghassabani, Mohammad Abdollahi Azgomi:
DSCMC: Distributed Stateless Code Model Checker. CoRR abs/1603.03536 (2016) - [i2]Reyhaneh Ghassem Esfahani, Mohammad Abdollahi Azgomi, Reza Fathi:
Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining. CoRR abs/1605.06466 (2016) - 2010
- [i1]Ali Hosseini, Mohammad Abdollahi Azgomi:
An Extension for Combination of Duty Constraints in Role-Based Access Control. CoRR abs/1001.2268 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint