default search action
Eugene H. Spafford
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j84]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Niklaus Wirth. Commun. ACM 67(3): 20 (2024) - [j83]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Gordon Bell. Commun. ACM 67(7): 17 (2024) - 2023
- [j82]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Frederick P. Brooks, Jr. 1931-2022. Commun. ACM 66(1): 21-22 (2023) - [j81]Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: William A. Wulf. Commun. ACM 66(6): 20-23 (2023) - 2022
- [j80]Simson L. Garfinkel, Eugene H. Spafford:
In memoriam: Juris Hartmanis 1928-2022. Commun. ACM 65(10): 14-15 (2022) - 2021
- [j79]Simson L. Garfinkel, Eugene H. Spafford:
Edmund M. Clarke (1945 - 2020). Commun. ACM 64(3): 23-24 (2021) - [j78]Simson L. Garfinkel, Eugene H. Spafford:
Jack Minker (1927 - 2021). Commun. ACM 64(6): 17 (2021) - [j77]Simson L. Garfinkel, Eugene H. Spafford:
Charles M. Geschke (1939-2021). Commun. ACM 64(7): 22 (2021) - [c41]Ida Ngambeki, Eugene H. Spafford, Subia Ansari, Isslam Alhasan, Marlo Basil-Camino, Douglas Rapp:
Creating a Concept Map for ICS Security - A Delphi Study. FIE 2021: 1-7 - 2020
- [j76]Simson L. Garfinkel, Eugene H. Spafford:
Fran Allen: 1932-2020. Commun. ACM 63(10): 18-19 (2020)
2010 – 2019
- 2019
- [j75]Eugene H. Spafford:
Editorial. Comput. Secur. 81: 182-183 (2019) - 2018
- [j74]Josiah Dykstra, Eugene H. Spafford:
The case for disappearing cyber security. Commun. ACM 61(7): 40-42 (2018) - [j73]Christopher N. Gutierrez, Eugene H. Spafford, Saurabh Bagchi, Thomas Yurek:
Reactive redundancy for data destruction protection (R2D2). Comput. Secur. 74: 184-201 (2018) - [c40]Christopher N. Gutierrez, Mohammed H. Almeshekah, Saurabh Bagchi, Eugene H. Spafford:
A Hypergame Analysis for ErsatzPasswords. SEC 2018: 47-61 - 2017
- [c39]Jeffrey Avery, Eugene H. Spafford:
Ghost Patches: Fake Patches for Fake Vulnerabilities. SEC 2017: 399-412 - 2016
- [j72]Eugene H. Spafford:
The strength of encryption. Commun. ACM 59(3): 5 (2016) - [j71]Christopher N. Gutierrez, Mohammed H. Almeshekah, Eugene H. Spafford, Mikhail J. Atallah, Jeffrey Avery:
Inhibiting and Detecting Offline Password Cracking Using ErsatzPasswords. ACM Trans. Priv. Secur. 19(3): 9:1-9:30 (2016) - [p2]Mohammed H. Almeshekah, Eugene H. Spafford:
Cyber Security Deception. Cyber Deception 2016: 25-52 - 2015
- [c38]Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford:
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. ACSAC 2015: 311-320 - [c37]Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Enhancing Passwords Security Using Deceptive Covert Communication. SEC 2015: 159-173 - 2014
- [j70]Eugene H. Spafford:
Editorial. Comput. Secur. 43: iv (2014) - [j69]Mohammed H. Almeshekah, Eugene H. Spafford:
Using Deceptive Information in Computer Security Defenses. Int. J. Cyber Warf. Terror. 4(3): 63-80 (2014) - [j68]Diana L. Burley, Eugene H. Spafford:
An interview with Gene Spafford on balancing breadth and depth in cybersecurity education. Inroads 5(1): 42-46 (2014) - [j67]Gene Spafford:
We are out of balance. SIGCAS Comput. Soc. 44(4): 9-12 (2014) - [c36]Mohammed H. Almeshekah, Eugene H. Spafford:
Planning and Integrating Deception into Computer Security Defenses. NSPW 2014: 127-138 - 2013
- [j66]Eugene H. Spafford:
Editorial. Comput. Secur. 34: iv (2013) - [j65]Fariborz Farahmand, Eugene H. Spafford:
Understanding insiders: An analysis of risk-taking behavior. Inf. Syst. Frontiers 15(1): 5-15 (2013) - [j64]Fariborz Farahmand, Aman Yadav, Eugene H. Spafford:
Risks and uncertainties in virtual worlds: an educators' perspective. J. Comput. High. Educ. 25(2): 49-67 (2013) - [j63]Fariborz Farahmand, Mikhail J. Atallah, Eugene H. Spafford:
Incentive Alignment and Risk Perception: An Information Security Application. IEEE Trans. Engineering Management 60(2): 238-246 (2013) - [c35]Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford:
Improved kernel security through memory layout randomization. IPCCC 2013: 1-10 - [c34]Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Back Channels Can Be Useful! - Layering Authentication Channels to Provide Covert Communication. Security Protocols Workshop 2013: 189-195 - 2012
- [j62]Eugene H. Spafford:
USACM and U.S. legislation. Commun. ACM 55(6): 5 (2012) - [j61]Eugene H. Spafford:
Editorial. Comput. Secur. 31(1): 1-2 (2012) - [j60]Eugene H. Spafford:
Editorial. Comput. Secur. 31(2): 149-150 (2012) - [j59]Eugene H. Spafford:
Editorial. Comput. Secur. 31(5): 641-642 (2012) - [j58]Eugene H. Spafford:
Editorial. Comput. Secur. 31(6): 739-740 (2012) - [j57]Gene Spafford:
Editorial. Comput. Secur. 31(8): 857-858 (2012) - [j56]Kyungroul Lee, Kangbin Yim, Eugene H. Spafford:
Reverse-safe authentication protocol for secure USB memories. Secur. Commun. Networks 5(8): 834-845 (2012) - 2011
- [j55]Eugene H. Spafford:
Editorial. Comput. Secur. 30(1): 1 (2011) - [j54]Eugene H. Spafford:
Security, technology, publishing, and ethics (part II). Comput. Secur. 30(1): 2-3 (2011) - [j53]Eugene H. Spafford:
Editorial. Comput. Secur. 30(4): 171 (2011) - [j52]Eugene H. Spafford:
Editorial. Comput. Secur. 30(6-7): 351-352 (2011) - [j51]Eugene H. Spafford:
Editorial for 30/8. Comput. Secur. 30(8): 553-554 (2011) - [c33]Brent G. Roth, Eugene H. Spafford:
Implicit Buffer Overflow Protection Using Memory Segregation. ARES 2011: 175-182 - [r1]E. Eugene Schultz, Eugene H. Spafford:
Intrusion Detection Systems (IDSs): Implementation. Encyclopedia of Information Assurance 2011 - 2010
- [j50]Eugene H. Spafford:
Remembrances of things pest. Commun. ACM 53(8): 35-37 (2010) - [j49]Eugene H. Spafford:
Editorial. Comput. Secur. 29(6): 641-642 (2010) - [j48]Eugene H. Spafford:
Editorial. Comput. Secur. 29(7): 729-730 (2010) - [j47]Eugene H. Spafford:
Security, technology, publishing, and ethics (Part I). Comput. Secur. 29(8): 813-814 (2010) - [j46]Benjamin A. Kuperman, Eugene H. Spafford:
Audlib: a configurable, high-fidelity application audit mechanism. Softw. Pract. Exp. 40(11): 989-1005 (2010)
2000 – 2009
- 2009
- [j45]Eugene H. Spafford:
USACM's policy role. Commun. ACM 52(2): 5 (2009) - [j44]Eugene H. Spafford:
Privacy and security - Answering the wrong questions is no answer. Commun. ACM 52(6): 22-24 (2009) - [j43]Travis D. Breaux, Annie I. Antón, Eugene H. Spafford:
A distributed requirements management framework for legal compliance and accountability. Comput. Secur. 28(1-2): 8-17 (2009) - [c32]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - 2008
- [j42]Eugene H. Spafford:
Inspiration and trust. Commun. ACM 51(1): 61-62 (2008) - [j41]Eugene H. Spafford:
James P. Anderson: An Information Security Pioneer. IEEE Secur. Priv. 6(1): 9 (2008) - [j40]Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford:
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. IEEE Trans. Parallel Distributed Syst. 19(7): 890-902 (2008) - [c31]Eugene H. Spafford:
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. ISIPS 2008: 20-33 - 2007
- [j39]Paul D. Williams, Eugene H. Spafford:
CuPIDS: An exploration of highly focused, co-processor-based information system protection. Comput. Networks 51(5): 1284-1298 (2007) - [j38]Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
Automated adaptive intrusion containment in systems of interacting services. Comput. Networks 51(5): 1334-1360 (2007) - [j37]Florian P. Buchholz, Eugene H. Spafford:
Run-time label propagation for forensic audit data. Comput. Secur. 26(7-8): 496-513 (2007) - 2006
- [j36]Brian D. Carrier, Eugene H. Spafford:
Categories of digital investigation analysis techniques based on the computer history model. Digit. Investig. 3(Supplement): 121-130 (2006) - [j35]Eugene H. Spafford:
Desert Island Books. IEEE Secur. Priv. 4(6): 5 (2006) - [c30]Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang:
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. ICDCS 2006: 38 - [c29]Eugene H. Spafford:
Some Challenges in Digital Forensics. IFIP Int. Conf. Digital Forensics 2006: 1-9 - 2005
- [c28]Brian D. Carrier, Eugene H. Spafford:
Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence. DFRWS 2005 - [c27]Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. DSN 2005: 508-517 - [c26]Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford:
Virtual Playgrounds for Worm Behavior Investigation. RAID 2005: 1-21 - [c25]Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek:
Efficient Intrusion Detection using Automaton Inlining. S&P 2005: 18-31 - 2004
- [j34]Florian P. Buchholz, Eugene H. Spafford:
On the role of file system metadata in digital forensics. Digit. Investig. 1(4): 298-309 (2004) - [j33]Sean W. Smith, Eugene H. Spafford:
Grand Challenges in Information Security: Process and Output. IEEE Secur. Priv. 2(1): 69-71 (2004) - [c24]Eugene H. Spafford:
What starisstar information security? SIGCSE 2004: 342 - 2003
- [b3]Simson L. Garfinkel, Gene Spafford, Alan Schwartz:
Practical Unix and internet security - securing Solaris, Mac OS X, Linux and FreeBSD: extensivley revised (3. ed.). O'Reilly 2003, ISBN 978-0-596-00323-4, pp. I-XXIX, 1-954 - [j32]Barbara Simons, Eugene H. Spafford:
Risks of total surveillance. Commun. ACM 46(3): 120 (2003) - [j31]Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford:
PFIRES: a policy framework for information security. Commun. ACM 46(7): 101-106 (2003) - [j30]Brian D. Carrier, Eugene H. Spafford:
Getting Physical with the Digital Investigation Process. Int. J. Digit. EVid. 2(2) (2003) - [c23]Eugene H. Spafford:
A Failure to Learn from the Past. ACSAC 2003: 217-231 - [c22]Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost:
Poly2 Paradigm: A Secure Network Service Architecture. ACSAC 2003: 342-351 - 2002
- [j29]Florian Kerschbaum, Eugene H. Spafford, Diego Zamboni:
Using Internal Sensors and Embedded Detectors for Intrusion Detection. J. Comput. Secur. 10(1/2): 23-70 (2002) - [p1]James B. D. Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford:
Security and Privacy Challenges of a Digital Government. Advances in Digital Government 2002: 121-136 - 2001
- [j28]Mikhail J. Atallah, Konstantinos N. Pantazopoulos, John R. Rice, Eugene H. Spafford:
Secure outsourcing of scientific computations. Adv. Comput. 54: 215-272 (2001) - [j27]James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford:
Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001) - [j26]James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford:
Digital Government Security Infrastructure Design Challenges. Computer 34(2): 66-72 (2001) - [j25]Mahesh V. Tripunitara, Eugene H. Spafford:
Connectivity provisioning with security attributes. Softw. Focus 2(3): 112-116 (2001) - [c21]Eugene H. Spafford:
The Hidden Meta-Requirements of Security and Privacy. RE 2001: 10 - 2000
- [j24]Eugene H. Spafford, Diego Zamboni:
Intrusion detection using autonomous agents. Comput. Networks 34(4): 547-570 (2000) - [j23]Eugene H. Spafford:
IC Online: Infosecurity Summit at the White House. IEEE Internet Comput. 4(2): 108 (2000) - [c20]Thomas E. Daniels, Eugene H. Spafford:
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux. ACSAC 2000: 178-187 - [c19]Thomas E. Daniels, Eugene H. Spafford:
Network traffic tracking systems: folly in the large? NSPW 2000: 119-124
1990 – 1999
- 1999
- [j22]Thomas E. Daniels, Eugene H. Spafford:
Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities. J. Comput. Secur. 7(1): 3-35 (1999) - [c18]Eugene H. Spafford, Diego Zamboni:
New directions for the AAFID architecture. Recent Advances in Intrusion Detection 1999 - 1998
- [j21]Steve J. Chapin, Eugene H. Spafford:
Dissemination of state information in distributed autonomous systems. Comput. Commun. 21(11): 969-979 (1998) - [j20]Christoph L. Schuba, Eugene H. Spafford, Berry Kercheval:
Prototyping experiences with classical IP and ARP over signaled ATM connections. J. Syst. Softw. 44(1): 31-43 (1998) - [c17]J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
An Architecture for Intrusion Detection Using Autonomous Agents. ACSAC 1998: 13-24 - 1997
- [b2]Simson L. Garfinkel, Gene Spafford:
Web security and commerce - risks, technologies, and strategies. O'Reilly 1997, ISBN 978-1-56592-269-3, pp. I-XX, 1-483 - [j19]Ivan Krsul, Eugene H. Spafford:
Authorship analysis: identifying the author of a program. Comput. Secur. 16(3): 233-257 (1997) - [j18]James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford:
Firewalls: An Expert Roundtable. IEEE Softw. 14(5): 60-66 (1997) - [j17]Simson L. Garfinkel, Gene Spafford:
Cryptography and the Web. World Wide Web J. 2: 113-126 (1997) - [j16]Simson L. Garfinkel, Gene Spafford:
Secure CGI/API programming. World Wide Web J. 2: 187-200 (1997) - [c16]Christoph L. Schuba, Eugene H. Spafford:
A Reference Model for Firewall Technology. ACSAC 1997: 133- - [c15]Richard A. DeMillo, Hsin Pan, Eugene H. Spafford:
Failure and Fault Analysis for Software Debugging. COMPSAC 1997: 515-521 - [c14]Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr.:
Low-threat security patches and tools. ICSM 1997: 306-313 - [c13]Bryn Dole, Steven W. Lodin, Eugene H. Spafford:
Misplaced Trust: Kerberos 4 Session Keys. NDSS 1997: 60-71 - [c12]Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni:
Analysis of a Denial of Service Attack on TCP. S&P 1997: 208-223 - 1996
- [b1]Simson L. Garfinkel, Gene Spafford:
Practical UNIX and internet security (2. ed.). O'Reilly 1996, ISBN 978-1-56592-148-1, pp. I-XXIX, 1-971 - [c11]Richard A. DeMillo, Hsin Pan, Eugene H. Spafford:
Critical Slicing for Software Fault Localization. ISSTA 1996: 121-134 - 1995
- [j15]Eugene H. Spafford:
UNIX and Security: The Influences of History. Inf. Secur. J. A Glob. Perspect. 4(3): 52-60 (1995) - [c10]Becky Bace, Gary Christoph, Tsutomu Shimomura, Eugene H. Spafford:
Information Superhighway or Road to Ruin? SC 1995: 98 - 1994
- [j14]Eugene H. Spafford:
Computer Viruses as Artificial Life. Artif. Life 1(3): 249-265 (1994) - [j13]Steve J. Chapin, Eugene H. Spafford:
Support for Implementing Scheduling Algorithms Using MESSIAHS. Sci. Program. 3(4): 325-340 (1994) - [c9]Gene H. Kim, Eugene H. Spafford:
The Design and Implementation of Tripwire: A File System Integrity Checker. CCS 1994: 18-29 - [c8]Steve J. Chapin, Eugene H. Spafford:
Constructing Distributed Schedulers Using the MESSIAHS Interface Language. HICSS (2) 1994: 425-434 - [c7]Gene H. Kim, Eugene H. Spafford:
Experiences with Tripwire: The Evaluation and Writing of a Security Tool. USENIX Applications Development Symposium 1994 - 1993
- [j12]Eugene H. Spafford, Stephen A. Weeber:
Software forensics: Can we track code to its authors? Comput. Secur. 12(6): 585-595 (1993) - [j11]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
Debugging with Dynamic Slicing and Backtracking. Softw. Pract. Exp. 23(6): 589-616 (1993) - 1992
- [j10]Eugene H. Spafford:
OPUS: Preventing weak password choices. Comput. Secur. 11(3): 273-278 (1992) - [j9]Eugene H. Spafford:
Are computer hacker break-ins ethical? J. Syst. Softw. 17(1): 41-47 (1992) - [c6]Sandeep Kumar, Eugene H. Spafford:
A generic virus scanner for C++. ACSAC 1992: 210-219 - 1991
- [j8]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
An Execution-Backtracking Approach to Debugging. IEEE Softw. 8(3): 21-26 (1991) - [c5]Hiralal Agrawal, Richard A. DeMillo, Eugene H. Spafford:
Dynamic Slicing in the Presence of Unconstrained Pointers. Symposium on Testing, Analysis, and Verification 1991: 60-73 - 1990
- [j7]Chuck Koelbel, Gene Spafford, George Leach:
Workshop report: workshop on experiences with building distributed and multiprocessor systems. Comput. Commun. Rev. 20(2): 10-15 (1990) - [j6]Charles Koelbel, Eugene H. Spafford, George Leach:
Workshop on Experiences with Building Distributed and Multiprocessor Systems. ACM SIGOPS Oper. Syst. Rev. 24(2): 2-6 (1990) - [j5]Chuck Koelbel, Gene Spafford, George Leach:
Workshop report: experiences with building distributed and multiprocessor systems. ACM SIGSOFT Softw. Eng. Notes 15(2): 39-41 (1990) - [j4]Eugene H. Spafford:
Extending Mutation Testing to Find Environmental Bugs. Softw. Pract. Exp. 20(2): 181-189 (1990) - [c4]Brent Auernheimer, Vinton G. Cerf, Susan Estrada, Russ Hobby, Craig Partridge, Eugene H. Spafford, Steven S. Wolff:
Networking in the nineties (panel session). SIGCSE 1990: 252 - [c3]Donald Gotterbarn, Deborah G. Johnson, Keith W. Miller, Eugene H. Spafford:
Methods of integrating the study of ethics into the computer science curriculum (panel session). SIGCSE 1990: 268 - [c2]Daniel Farmer, Eugene H. Spafford:
The COPS Security Checker System. USENIX Summer 1990: 165-170
1980 – 1989
- 1989
- [j3]Eugene H. Spafford:
Crisis and Aftermath. Commun. ACM 32(6): 678-687 (1989) - [j2]Eugene H. Spafford:
The internet worm program: an analysis. Comput. Commun. Rev. 19(1): 17-57 (1989) - [j1]Hiralal Agrawal, Eugene H. Spafford:
Bibliography on debugging and backtracking. ACM SIGSOFT Softw. Eng. Notes 14(2): 49-56 (1989) - [c1]Eugene H. Spafford:
The Internet Worm Incident. ESEC 1989: 446-468
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-30 20:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint