default search action
Martín Ochoa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2012
- [b1]Martín Ochoa Ronderos:
Model based security guarantees and change. Dortmund University of Technology, 2012
Journal Articles
- 2023
- [j18]Ann Yi Wong, Eyasu Getahun Chekole, Martín Ochoa, Jianying Zhou:
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. Comput. Secur. 128: 103140 (2023) - [j17]Christian Lopez, Jesús Solano, Esteban Rivera, Lizzy Tengana, Johana Florez-Lozano, Alejandra Castelblanco, Martín Ochoa:
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques. Int. J. Inf. Sec. 22(6): 1665-1685 (2023) - [j16]Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano:
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training. IEEE Trans. Dependable Secur. Comput. 20(3): 1895-1908 (2023) - 2022
- [j15]Alejandra Castelblanco, Esteban Rivera, Jesus Solano, Lizzy Tengana, Christian Lopez, Martín Ochoa:
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms. Comput. Secur. 115: 102629 (2022) - [j14]Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa:
Constrained Proximity Attacks on Mobile Targets. ACM Trans. Priv. Secur. 25(2): 10:1-10:29 (2022) - 2021
- [j13]Eyasu Getahun Chekole, Martín Ochoa, Sudipta Chattopadhyay:
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. Int. J. Crit. Infrastructure Prot. 33: 100431 (2021) - [j12]Jesus Solano, Luis David Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, Martín Ochoa:
Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications. Int. J. Inf. Sec. 20(2): 181-197 (2021) - 2020
- [j11]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo, Unnikrishnan Cheramangalath:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. Comput. Secur. 94: 101832 (2020) - [j10]Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. ACM Trans. Priv. Secur. 24(1): 2:1-2:35 (2020) - 2019
- [j9]Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Comput. Surv. 52(2): 30:1-30:40 (2019) - [j8]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Trans. Security Safety 5(17): e4 (2019) - [j7]Flavio Toffalini, Jun Sun, Martín Ochoa:
Practical static analysis of context leaks in Android applications. Softw. Pract. Exp. 49(2): 233-251 (2019) - [j6]Tobias Wüchner, Aleksander Cislak, Martín Ochoa, Alexander Pretschner:
Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection. IEEE Trans. Dependable Secur. Comput. 16(1): 99-112 (2019) - 2018
- [j5]Per A. Hallgren, Ravi Kishore, Martín Ochoa, Andrei Sabelfeld:
Assuring BetterTimes. J. Comput. Secur. 26(4): 557-587 (2018) - [j4]Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Henry Castellanos, Juan Guarnizo, Soumik Mondal, Martín Ochoa:
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 54-85 (2018) - 2017
- [j3]Lina M. Jimenez, Martín Ochoa, Sandra Julieta Rueda:
Jif-Based Verification of Information Flow Policies for Android Apps. Int. J. Secur. Softw. Eng. 8(1): 28-42 (2017) - 2014
- [j2]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Specifying model changes with UMLchange to support security verification of potential evolution. Comput. Stand. Interfaces 36(4): 776-791 (2014) - [j1]Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. Int. J. Secur. Softw. Eng. 5(4): 48-98 (2014)
Conference and Workshop Papers
- 2023
- [c56]Martín Ochoa, Hernán Vanegas, Jorge Toro-Pozo, David A. Basin:
SealClub: Computer-aided Paper Document Authentication. ACSAC 2023: 163-177 - [c55]David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen Phuoc Bao, Martín Ochoa:
Is Modeling Access Control Worth It? CCS 2023: 2830-2844 - 2022
- [c54]Jesus Solano, Esteban Rivera, Lizzy Tengana, Christian Lopez, Johana Flórez, Martín Ochoa:
A Siamese Neural Network for Scalable Behavioral Biometrics Authentication. ACNS Workshops 2022: 515-535 - [c53]Esteban Rivera, Lizzy Tengana, Jesus Solano, Christian Lopez, Johana Flórez, Martín Ochoa:
Scalable and Secure HTML5 Canvas-Based User Authentication. ACNS Workshops 2022: 554-574 - [c52]Yan Lin Aung, Martín Ochoa, Jianying Zhou:
ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence. ISC 2022: 319-338 - 2021
- [c51]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. AsiaCCS 2021: 886-900 - [c50]Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, Martín Ochoa:
Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes. DIMVA 2021: 371-390 - [c49]John Henry Castellanos, Martín Ochoa, Alvaro A. Cárdenas, Owen Arden, Jianying Zhou:
AttkFinder: Discovering Attack Vectors in PLC Programs using Information Flow Analysis. RAID 2021: 235-250 - 2020
- [c48]Jesus Solano, Christian Lopez, Esteban Rivera, Alejandra Castelblanco, Lizzy Tengana, Martín Ochoa:
SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric Authentication. AISec@CCS 2020: 37-47 - [c47]Esteban Rivera, Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Christian Lopez, Martín Ochoa:
Risk-based Authentication Based on Network Latency Profiling. AISec@CCS 2020: 105-115 - [c46]Alejandra Castelblanco, Jesus Solano, Christian Lopez, Esteban Rivera, Lizzy Tengana, Martín Ochoa:
Machine Learning Techniques for Identity Document Verification in Uncontrolled Environments: A Case Study. MCPR 2020: 271-281 - 2019
- [c45]Jesus Solano, Luis David Camacho, Alejandro Correa, Claudio Deiro, Javier Vargas, Martín Ochoa:
Risk-Based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics. ACNS Workshops 2019: 3-23 - [c44]Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - [c43]Flavio Toffalini, Martín Ochoa, Jun Sun, Jianying Zhou:
Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. CODASPY 2019: 231-242 - 2018
- [c42]John Henry Castellanos, Martín Ochoa, Jianying Zhou:
Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. ACSAC 2018: 582-594 - [c41]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. AsiaCCS 2018: 483-497 - [c40]Xueou Wang, Xiaolu Hou, Ruben Rios, Per A. Hallgren, Nils Ole Tippenhauer, Martín Ochoa:
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies. ESORICS (2) 2018: 373-392 - [c39]Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems. ESSoS 2018: 9-26 - [c38]Flavio Toffalini, Jun Sun, Martín Ochoa:
Static analysis of context leaks in android applications. ICSE (SEIP) 2018: 215-224 - [c37]Flavio Toffalini, Ivan Homoliak, Athul Harilal, Alexander Binder, Martín Ochoa:
Detection of Masqueraders Based on Graph Partitioning of File System Access Events. IEEE Symposium on Security and Privacy Workshops 2018: 217-227 - 2017
- [c36]John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa:
Legacy-Compliant Data Authentication for Industrial Control System Traffic. ACNS 2017: 665-685 - [c35]Athul Harilal, Flavio Toffalini, John Henry Castellanos, Juan Guarnizo, Ivan Homoliak, Martín Ochoa:
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. MIST@CCS 2017: 45-56 - [c34]Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CPSS@AsiaCCS 2017: 57-68 - [c33]Eric Rothstein Morris, Carlos G. Murguia, Martín Ochoa:
Design-time Quantification of Integrity in Cyber-physical Systems. PLAS@CCS 2017: 63-74 - [c32]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3. CPS-SPC@CCS 2017: 93-102 - [c31]Eyasu Getahun Chekole, John Henry Castellanos, Martín Ochoa, David K. Y. Yau:
Enforcing Memory Safety in Cyber-Physical Systems. CyberICPS/SECPRE@ESORICS 2017: 127-144 - [c30]Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh:
Reasoning about Probabilistic Defense Mechanisms against Remote Attacks. EuroS&P 2017: 499-513 - [c29]Yair Meidan, Michael Bohadana, Asaf Shabtai, Juan David Guarnizo, Martín Ochoa, Nils Ole Tippenhauer, Yuval Elovici:
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. SAC 2017: 506-509 - 2016
- [c28]Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld:
MaxPace: Speed-constrained location queries. CNS 2016: 136-144 - [c27]Enrico Lovat, Martín Ochoa, Alexander Pretschner:
Sound and Precise Cross-Layer Data Flow Tracking. ESSoS 2016: 38-55 - [c26]Saahil Ognawala, Martín Ochoa, Alexander Pretschner, Tobias Limmer:
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution. ASE 2016: 780-785 - [c25]Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner:
Generating behavior-based malware detection models with genetic programming. PST 2016: 506-511 - [c24]Tobias Wüchner, Martín Ochoa, Mojdeh Golagha, Gaurav Srivastava, Thomas Schreck, Alexander Pretschner:
MalFlow: identification of C&C servers through host-based data flow profiling. SAC 2016: 2087-2094 - [c23]Sven Wenzel, Daniel Poggenpohl, Jan Jürjens, Martín Ochoa:
Umlchange - specifying model changes to support security verification of potential evolution. Software Engineering 2016: 91-92 - [c22]Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner:
Enhancing Operation Security using Secret Sharing. SECRYPT 2016: 446-451 - [c21]John Henry Castellanos, Tobias Wüchner, Martín Ochoa, Sandra Julieta Rueda:
Q-Floid: Android Malware detection with Quantitative Data Flow Graphs. SG-CRC 2016: 13-25 - 2015
- [c20]Tobias Wüchner, Martín Ochoa, Alexander Pretschner:
Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics. DIMVA 2015: 98-118 - [c19]Vijay Ganesh, Sebastian Banescu, Martín Ochoa:
Short Paper: The Meaning of Attack-Resistant Systems. PLAS@ECOOP 2015: 49-55 - [c18]Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren:
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. ESSoS 2015: 34-42 - [c17]Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner:
Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. ESSoS 2015: 149-156 - [c16]Sebastian Banescu, Martín Ochoa, Alexander Pretschner:
A Framework for Measuring Software Obfuscation Resilience against Automated Attacks. SPRO@ICSE 2015: 45-51 - [c15]Sebastian Banescu, Tobias Wüchner, Aleieldin Salem, Marius Guggenmos, Martín Ochoa, Alexander Pretschner:
A framework for empirical evaluation of malware detection resilience against behavior obfuscation. MALWARE 2015: 40-47 - [c14]Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld:
BetterTimes - Privacy-Assured Outsourced Multiplications for Additively Homomorphic Encryption on Finite Fields. ProvSec 2015: 291-309 - [c13]Per A. Hallgren, Martín Ochoa, Andrei Sabelfeld:
InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. PST 2015: 1-6 - 2014
- [c12]Tobias Wüchner, Martín Ochoa, Alexander Pretschner:
Malware detection with quantitative data flow graphs. AsiaCCS 2014: 271-282 - [c11]Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa:
Leakage Resilience against Concurrent Cache Attacks. POST 2014: 140-158 - [c10]Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti:
Model-Based Detection of CSRF. SEC 2014: 30-43 - [c9]Tobias Wüchner, Alexander Pretschner, Martín Ochoa:
DAVAST: data-centric system level activity visualization. VizSEC 2014: 25-32 - 2013
- [c8]Abian Blome, Martín Ochoa, Keqin Li, Michele Peroli, Mohammad Torabi Dashti:
VERA: A Flexible Model-Based Vulnerability Testing Tool. ICST 2013: 471-478 - 2012
- [c7]Boris Köpf, Laurent Mauborgne, Martín Ochoa:
Automatic Quantification of Cache Side-Channels. CAV 2012: 564-580 - [c6]Martín Ochoa, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. ESSoS 2012: 97-105 - [c5]Jorge Cuéllar, Martín Ochoa, Ruben Rios:
Indistinguishable regions in geographic privacy. SAC 2012: 1463-1469 - [c4]Martín Ochoa, Jan Jürjens, Jorge Cuéllar:
Non-interference on UML State-Charts. TOOLS (50) 2012: 219-235 - 2011
- [c3]Elizabeta Fourneret, Martín Ochoa, Fabrice Bouquet, Julien Botella, Jan Jürjens, Parvaneh Yousefi:
Model-Based Security Verification and Testing for Smart-cards. ARES 2011: 272-279 - [c2]Jan Jürjens, Loïc Marchal, Martín Ochoa, Holger Schmidt:
Incremental Security Verification for Evolving UMLsec models. ECMFA 2011: 52-68 - [c1]Jan Jürjens, Martín Ochoa, Holger Schmidt, Loïc Marchal, Siv Hilde Houmb, Shareeful Islam:
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. SFM 2011: 504-526
Editorship
- 2020
- [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - 2019
- [e1]Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung:
Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings. Lecture Notes in Computer Science 11464, Springer 2019, ISBN 978-3-030-21567-5 [contents]
Informal and Other Publications
- 2022
- [i18]Martín Ochoa, Jorge Toro-Pozo, David A. Basin:
SealClub: Computer-aided Paper Document Authentication. CoRR abs/2210.07884 (2022) - 2021
- [i17]Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. CoRR abs/2102.08985 (2021) - [i16]Jakub Breier, Xiaolu Hou, Martín Ochoa, Jesus Solano:
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training. CoRR abs/2109.11249 (2021) - [i15]Ann Yi Wong, Eyasu Getahun Chekole, Martín Ochoa, Jianying Zhou:
Threat Modeling and Security Analysis of Containers: A Survey. CoRR abs/2111.11475 (2021) - 2020
- [i14]Eyasu Getahun Chekole, Martín Ochoa, Sudipta Chattopadhyay:
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems. CoRR abs/2012.12529 (2020) - 2018
- [i13]Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. CoRR abs/1805.01612 (2018) - [i12]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. CoRR abs/1805.02684 (2018) - [i11]Eyasu Getahun Chekole, Unnikrishnan Cheramangalath, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo:
Taming the War in Memory: A Resilient Mitigation Strategy Against Memory Safety Attacks in CPS. CoRR abs/1809.07477 (2018) - 2017
- [i10]Juan Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
SIPHON: Towards Scalable High-Interaction Physical Honeypots. CoRR abs/1701.02446 (2017) - [i9]Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh:
Reasoning about Probabilistic Defense Mechanisms against Remote Attacks. CoRR abs/1701.06743 (2017) - [i8]Daniele Antonioli, Hamid Reza Ghaeini, Sridhar Adepu, Martín Ochoa, Nils Ole Tippenhauer:
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3. CoRR abs/1702.03067 (2017) - [i7]Eric Rothstein Morris, Carlos G. Murguia, Martín Ochoa:
Design-Time Quantification of Integrity in Cyber-Physical-Systems. CoRR abs/1708.04798 (2017) - [i6]Yair Meidan, Michael Bohadana, Asaf Shabtai, Martín Ochoa, Nils Ole Tippenhauer, Juan David Guarnizo, Yuval Elovici:
Detection of Unauthorized IoT Devices Using Machine Learning Techniques. CoRR abs/1709.04647 (2017) - [i5]Chuadhry Mujeeb Ahmed, Aditya Mathur, Martín Ochoa:
NoiSense: Detecting Data Integrity Attacks on Sensor Measurements using Hardware based Fingerprints. CoRR abs/1712.01598 (2017) - 2015
- [i4]Tobias Wüchner, Martín Ochoa, Alexander Pretschner:
Robust and Effective Malware Detection through Quantitative Data Flow Graph Metrics. CoRR abs/1502.01609 (2015) - [i3]Sebastian Banescu, Tobias Wüchner, Marius Guggenmos, Martín Ochoa, Alexander Pretschner:
FEEBO: An Empirical Evaluation Framework for Malware Behavior Obfuscation. CoRR abs/1502.03245 (2015) - [i2]Vijay Ganesh, Sebastian Banescu, Martín Ochoa:
The Meaning of Attack-Resistant Programs. CoRR abs/1502.04023 (2015) - 2012
- [i1]Boris Köpf, Laurent Mauborgne, Martín Ochoa:
Automatic Quantification of Cache Side-Channels. IACR Cryptol. ePrint Arch. 2012: 34 (2012)
Coauthor Index
aka: Jesús Solano
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint