default search action
Chamseddine Talhi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. J. Netw. Comput. Appl. 231: 103987 (2024) - [j41]Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
Proactive and Intelligent Monitoring and Orchestration of Cloud-Native IP Multimedia Subsystem. IEEE Open J. Commun. Soc. 5: 139-155 (2024) - [j40]Muhsen Alkhalidy, Mohammad Bany Taha, Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach. IEEE Open J. Commun. Soc. 5: 6535-6545 (2024) - [c45]Chengqi Li, Sarah Simionescu, Wenbo He, Sanzheng Qiao, Nadjia Kara, Chamseddine Talhi:
Utility-Preserving Face Anonymization via Differentially Private Feature Operations. INFOCOM 2024: 2279-2288 - [c44]Michael Duchesne, Kaiwen Zhang, Chamseddine Talhi:
Multi-Confederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning. SAC 2024: 1587-1595 - [i5]Michael Duchesne, Kaiwen Zhang, Chamseddine Talhi:
MultiConfederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning. CoRR abs/2404.13421 (2024) - [i4]Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok:
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication. CoRR abs/2405.07174 (2024) - 2023
- [j39]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging modularity in federated learning frameworks. Internet Things 22: 100694 (2023) - [j38]Sawsan Abdul Rahman, Hakima Ould-Slimane, Rasel Chowdhury, Azzam Mourad, Chamseddine Talhi, Mohsen Guizani:
Adaptive Upgrade of Client Resources for Improving the Quality of Federated Learning Model. IEEE Internet Things J. 10(5): 4677-4687 (2023) - [j37]Mohamad Arafeh, Hakima Ould-Slimane, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
Data independent warmup scheme for non-IID federated learning. Inf. Sci. 623: 342-360 (2023) - [j36]Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani:
Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning. IEEE Netw. 37(3): 224-230 (2023) - [j35]Azzam Mourad, Hadi Otrok, Ernesto Damiani, Mérouane Debbah, Nadra Guizani, Shiqiang Wang, Guangjie Han, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi:
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources. IEEE Trans. Netw. Serv. Manag. 20(2): 1441-1445 (2023) - [j34]Aida Meftah, Tri Nhu Do, Georges Kaddoum, Chamseddine Talhi, Satinder Singh:
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks. IEEE Trans. Netw. Serv. Manag. 20(4): 5053-5072 (2023) - [j33]Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee, Kim-Kwang Raymond Choo:
A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs. IEEE Trans. Veh. Technol. 72(3): 3035-3050 (2023) - [c43]Aida Meftah, Georges Kaddoum, Tri Nhu Do, Chamseddine Talhi:
Federated Learning-Based Jamming Detection for Tactical Terrestrial and Non-Terrestrial Networks. GLOBECOM 2023: 2154-2159 - [i3]Hani Sami, Ahmad Hammoud, Mohamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani:
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions. CoRR abs/2304.09240 (2023) - 2022
- [j32]Zakeya Namrud, Sègla Kpodjedo, Ahmed Bali, Chamseddine Talhi:
Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories. IEEE Access 10: 24240-24254 (2022) - [j31]Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee:
TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j30]Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi:
Toward Quantifying Decentralization of Blockchain Networks With Relay Nodes. Frontiers Blockchain 5 (2022) - [j29]Ahmad A. Al-Daraiseh, Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi, Mohammad Bany Taha:
Lightweight Scheme for Smart Home Environments using Offloading Technique. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - [j28]Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Alvine Boaye Belle:
Probing AndroVul dataset for studies on Android malware classification. J. King Saud Univ. Comput. Inf. Sci. 34(9): 6883-6894 (2022) - [j27]Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi:
A Theoretical Model for Block Propagation Analysis in Bitcoin Network. IEEE Trans. Engineering Management 69(4): 1459-1476 (2022) - [j26]Mohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
Multi-Tenant Intrusion Detection Framework as a Service for SaaS. IEEE Trans. Serv. Comput. 15(5): 2925-2938 (2022) - [c42]Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi:
Performance Modeling and Analysis of Hotstuff for Blockchain Consensus. BCCA 2022: 135-142 - [c41]Omar Tahmi, Chamseddine Talhi, Yacine Challal:
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic. FPS 2022: 423-440 - [c40]Mohamad Arafeh, Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Chamseddine Talhi, Zbigniew Dziong:
Independent and Identically Distributed (IID) Data Assessment in Federated Learning. GLOBECOM 2022: 293-298 - [c39]Ashraf A. Tahat, Azmi Al-Zaben, Lubna Saad El-Deen, Sara Abbad, Chamseddine Talhi:
An Evaluation of Machine Learning Algorithms in an Experimental Structural Health Monitoring System Incorporating LoRa IoT Connectivity. I2MTC 2022: 1-6 - [c38]Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi:
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption. MILCOM 2022: 49-54 - [c37]Aida Meftah, Georges Kaddoum, Tri Nhu Do, Chamseddine Talhi:
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks. MILCOM 2022: 629-634 - [i2]Mohamad Wazzeh, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Mohsen Guizani:
Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication. CoRR abs/2211.05662 (2022) - [i1]Mohamad Arafeh, Hadi Otrok, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Ernesto Damiani:
ModularFed: Leveraging Modularity in Federated Learning Frameworks. CoRR abs/2212.10427 (2022) - 2021
- [j25]Sawsan Abdul Rahman, Hanine Tout, Azzam Mourad, Chamseddine Talhi:
FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning. IEEE Internet Things J. 8(6): 4723-4735 (2021) - [j24]Sawsan Abdul Rahman, Hanine Tout, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Mohsen Guizani:
A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond. IEEE Internet Things J. 8(7): 5476-5497 (2021) - [j23]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment. J. Hardw. Syst. Secur. 5(3): 208-222 (2021) - [j22]Hanine Tout, Azzam Mourad, Nadjia Kara, Chamseddine Talhi:
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading. IEEE/ACM Trans. Netw. 29(3): 1408-1421 (2021) - [c36]Mohamed Ali Ayed, Chamseddine Talhi:
Federated Learning for Anomaly-Based Intrusion Detection. ISNCC 2021: 1-8 - 2020
- [j21]Sawsan Abdul Rahman, Hanine Tout, Chamseddine Talhi, Azzam Mourad:
Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning? IEEE Netw. 34(6): 310-317 (2020) - [c35]Wiem Badreddine, Kaiwen Zhang, Chamseddine Talhi:
Monetization using Blockchains for IoT Data Marketplace. IEEE ICBC 2020: 1-9 - [c34]Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad:
A Framework for Automated Monitoring and Orchestration of Cloud-Native applications. ISNCC 2020: 1-6 - [c33]Simon Huneault-LeBlanc, Chamseddine Talhi:
P-Code Based Classification to Detect Malicious VBA Macro. ISNCC 2020: 1-6 - [c32]Saad Inshi, Rasel Chowdhury, Mahdi Elarbi, Hakima Ould-Slimane, Chamseddine Talhi:
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j20]Hanine Tout, Nadjia Kara, Chamseddine Talhi, Azzam Mourad:
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing. Comput. Electr. Eng. 80 (2019) - [j19]Mohamed Yassin, Chamseddine Talhi, Hanifa Boucheneb:
ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS. J. Inf. Secur. Appl. 49 (2019) - [j18]Hossein Abbasi, Naser Ezzati-Jivan, Martine Bellaïche, Chamseddine Talhi, Michel R. Dagenais:
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis. J. Hardw. Syst. Secur. 3(2): 164-176 (2019) - [j17]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability. IEEE Trans. Cloud Comput. 7(2): 314-328 (2019) - [j16]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Hanine Tout, Chamseddine Talhi:
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading. IEEE Trans. Netw. Serv. Manag. 16(4): 1665-1680 (2019) - [c31]Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi:
A Theoretical Model for Fork Analysis in the Bitcoin Network. Blockchain 2019: 237-244 - [c30]Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi:
AndroVul: a repository for Android security vulnerabilities. CASCON 2019: 64-71 - [c29]Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi:
Performance Modeling and Analysis of the Bitcoin Inventory Protocol. DAPPCON 2019: 79-88 - 2018
- [j15]Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Chamseddine Talhi:
Combining heterogeneous anomaly detectors for improved software security. J. Syst. Softw. 137: 415-429 (2018) - [j14]Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb:
Multi-tenant intrusion detection system for public cloud (MTIDS). J. Supercomput. 74(10): 5199-5230 (2018) - [c28]Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb:
Security as a Service for Public Cloud Tenants(SaaS). ANT/SEIT 2018: 1025-1030 - 2017
- [j13]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Smart mobile computation offloading: Centralized selective and multi-objective approach. Expert Syst. Appl. 80: 1-13 (2017) - [j12]Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj, Chamseddine Talhi:
An anomaly detection system based on variable N-gram features and one-class SVM. Inf. Softw. Technol. 91: 186-197 (2017) - [c27]Mohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb:
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers. CSCloud 2017: 163-170 - [c26]Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi, Mohamed Cheriet:
Attribute-Based Encryption for Preserving Smart Home Data Privacy. ICOST 2017: 185-197 - [c25]Abderrahmane Ledjiar, Emmanuel Sampin, Chamseddine Talhi, Mohamed Cheriet:
Network Function Virtualization as a Service for multi-tenant software defined networks. SDS 2017: 168-173 - 2016
- [j11]Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui:
From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52: 65-79 (2016) - [j10]Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi:
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process. Secur. Commun. Networks 9(16): 3483-3495 (2016) - [c24]Toufic Dbouk, Azzam Mourad, Hadi Otrok, Chamseddine Talhi:
Towards ad-hoc cloud based approach for mobile intrusion detection. WiMob 2016: 1-8 - 2015
- [b1]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j9]Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok:
AOMD approach for context-adaptable and conflict-free Web services composition. Comput. Electr. Eng. 44: 200-217 (2015) - [j8]Abdelfattah Amamra, Jean-Marc Robert, Chamseddine Talhi:
Enhancing malware detection for Android systems using a system call filtering and abstraction process. Secur. Commun. Networks 8(7): 1179-1192 (2015) - [c23]Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad:
Towards an offloading approach that augments multi-persona performance and viability. CCNC 2015: 455-460 - [c22]Mohamed Fekih Ahmed, Chamseddine Talhi, Mohamed Cheriet:
Towards flexible, scalable and autonomic virtual tenant slices. IM 2015: 720-726 - [c21]Alireza Shameli-Sendi, Yosr Jarraya, Mohamed Fekih Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet:
Optimal placement of sequentially ordered virtual security appliances in the cloud. IM 2015: 818-821 - [c20]Maroua Ben Attia, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, Mario Couture:
On-device anomaly detection for resource-limited systems. SAC 2015: 548-554 - [c19]Manel Abdellatif, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Michel R. Dagenais:
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis. SRDS Workshop 2015: 42-46 - [c18]Mohamed Ali El-Serngawy, Chamseddine Talhi:
CaptureMe: Attacking the User Credential in Mobile Banking Applications. TrustCom/BigDataSE/ISPA (1) 2015: 924-933 - 2014
- [c17]Mohamed Fekih Ahmed, Chamseddine Talhi, Makan Pourzandi, Mohamed Cheriet:
A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy. IC2E 2014: 568-573 - [c16]Mohamed Ali El-Serngawy, Chamseddine Talhi:
Securing Business Data on Android Smartphones. MobiWIS 2014: 218-232 - 2013
- [c15]Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:
Impact of Dataset Representation on Smartphone Malware Detection Performance. IFIPTM 2013: 166-176 - 2012
- [c14]Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:
Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone. BWCCA 2012: 329-334 - [c13]Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert:
Smartphone malware detection: From a survey towards taxonomy. MALWARE 2012: 79-86 - [c12]Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok:
Towards a BPEL model-driven approach for Web services security. PST 2012: 120-127 - 2010
- [c11]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
- [j7]Seyed Mahmood Hejazi, Chamseddine Talhi, Mourad Debbabi:
Extraction of forensically sensitive information from windows physical memory. Digit. Investig. 6(Supplement): S121-S131 (2009) - [j6]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [c10]Djedjiga Mouheb, Chamseddine Talhi, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Weaving security aspects into UML 2.0 design models. AOM@AOSD 2009: 7-12 - [c9]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - [c8]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. SSV 2009: 143-160 - 2008
- [j5]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement under memory-limitation constraints. Inf. Comput. 206(2-4): 158-184 (2008) - [j4]Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi:
Automated Windows Memory File Extraction for Cyber Forensics Investigation. J. Digit. Forensic Pract. 2(3): 117-131 (2008) - 2006
- [j3]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Evaluation of J2ME CLDC Embedded Java Platform. J. Object Technol. 5(2): 125-154 (2006) - [c7]Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi:
Execution monitoring enforcement for limited-memory systems. PST 2006: 38 - [c6]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Common Criteria Approach to J2ME CLDC Security Requirements. SoMeT 2006: 177-194 - 2005
- [j2]Mourad Debbabi, Azzam Mourad, Chamseddine Talhi, Hamdi Yahyaoui:
Accelerating embedded Java for mobile devices. IEEE Commun. Mag. 43(9): 80-85 (2005) - [j1]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi:
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. J. Object Technol. 4(1): 83-108 (2005) - [c5]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Java for Mobile Devices: A Security Study. ACSAC 2005: 235-244 - [c4]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Mobile Java. DEXA Workshops 2005: 231-235 - [c3]Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Security Analysis of Wireless Java. PST 2005 - 2004
- [c2]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua:
A dynamic compiler for embedded Java virtual machines. PPPJ 2004: 100-106 - [c1]Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua:
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. PPPJ 2004: 107-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint