default search action
Lam-for Kwok
Person information
- affiliation: City University of Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Chen Yi, Wei Wang, Lam For Kwok:
Analysis of Cyber Range Scenario Design - -A Case Study. ICBL 2024: 322-332 - 2023
- [j36]Simon K. S. Cheung, Fu Lee Wang, Lam For Kwok:
Online learning and blended learning: new practices derived from the pandemic-driven disruption. J. Comput. High. Educ. 35(1): 1-5 (2023) - [e12]Chen Li, Simon K. S. Cheung, Fu Lee Wang, Angel Lu, Lam For Kwok:
Blended Learning : Lessons Learned and Ways Forward - 16th International Conference on Blended Learning, ICBL 2023, Hong Kong, China, July 17-20, 2023, Proceedings. Lecture Notes in Computer Science 13978, Springer 2023, ISBN 978-3-031-35730-5 [contents] - 2022
- [j35]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Surveying Trust-Based Collaborative Intrusion Detection: State-of-the-Art, Challenges and Future Directions. IEEE Commun. Surv. Tutorials 24(1): 280-305 (2022) - 2021
- [j34]Simon K. S. Cheung, Fu Lee Wang, Lam For Kwok, Petra Poulova:
In search of the good practices of personalized learning. Interact. Learn. Environ. 29(2): 179-181 (2021) - [j33]Yan Keung Hui, Lam For Kwok, Horace H. S. Ip:
CRESDA: towards a personalized student advisory for professional development. Interact. Learn. Environ. 29(2): 329-342 (2021) - [e11]Richard Chen Li, Simon K. S. Cheung, Chiaki Iwasaki, Lam For Kwok, Makoto Kageto:
Blended Learning: Re-thinking and Re-defining the Learning Process. - 14th International Conference, ICBL 2021, Nagoya, Japan, August 10-13, 2021, Proceedings. Lecture Notes in Computer Science 12830, Springer 2021, ISBN 978-3-030-80503-6 [contents] - 2020
- [c53]Yan Keung Hui, Lam-for Kwok, Horace Ho-Shing Ip:
Developing 21st-Century Competencies for Job Readiness. ICBL 2020: 199-209 - [e10]Simon K. S. Cheung, Richard Li, Kongkiti Phusavat, Naraphorn Paoprasert, Lam For Kwok:
Blended Learning. Education in a Smart Learning Environment - 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24-27, 2020, Proceedings. Lecture Notes in Computer Science 12218, Springer 2020, ISBN 978-3-030-51967-4 [contents]
2010 – 2019
- 2019
- [j32]Wenjuan Li, Lam For Kwok:
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis. J. Inf. Secur. Appl. 47: 1-7 (2019) - [j31]Yan Keung Hui, Chen Li, Sheng Qian, Lam For Kwok:
Learning engagement via promoting situational interest in a blended learning environment. J. Comput. High. Educ. 31(2): 408-425 (2019) - [c52]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection. ISPEC 2019: 453-463 - [e9]Simon K. S. Cheung, Lap-Kei Lee, Ivana Simonova, Tomas Kozel, Lam For Kwok:
Blended Learning: Educational Innovation for Personalized Learning - 12th International Conference, ICBL 2019, Hradec Kralove, Czech Republic, July 2-4, 2019, Proceedings. Lecture Notes in Computer Science 11546, Springer 2019, ISBN 978-3-030-21561-3 [contents] - 2018
- [j30]Wenjuan Li, Weizhi Meng, Chunhua Su, Lam For Kwok:
Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access 6: 6530-6539 (2018) - [j29]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace H. S. Ip:
Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks. Clust. Comput. 21(1): 299-310 (2018) - [j28]Wenjuan Li, Weizhi Meng, Lam For Kwok:
Investigating the Influence of Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Future Internet 10(1): 6 (2018) - [c51]Yan Keung Hui, Chen Li, Sheng Qian, Lam-for Kwok:
Cultivating Situational Interest in Blended Learning Environment. ICBL 2018: 81-92 - [c50]Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. TrustCom/BigDataSE 2018: 1208-1213 - [e8]Simon K. S. Cheung, Lam-for Kwok, Kenichi Kubota, Lap-Kei Lee, Jumpei Tokito:
Blended Learning. Enhancing Learning Success - 11th International Conference, ICBL 2018, Osaka, Japan, July 31 - August 2, 2018, Proceedings. Lecture Notes in Computer Science 10949, Springer 2018, ISBN 978-3-319-94504-0 [contents] - 2017
- [j27]Weizhi Meng, Wenjuan Li, Lam-for Kwok, Kim-Kwang Raymond Choo:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. Comput. Secur. 65: 213-229 (2017) - [j26]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip:
Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77: 135-145 (2017) - [j25]Weizhi Meng, Wenjuan Li, Lam For Kwok:
Towards Effective Trust-Based Packet Filtering in Collaborative Network Environments. IEEE Trans. Netw. Serv. Manag. 14(1): 233-245 (2017) - [c49]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
SOOA: Exploring Special On-Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks. GPC 2017: 402-415 - [c48]Yan Keung Hui, Bo Mai, Sheng Qian, Lam For Kwok:
A Review of Learning Behaviors in Using E-Schoolbag: Enhancing Academic Performance in Primary Chinese. ICBL 2017: 41-52 - [e7]Simon K. S. Cheung, Lam-for Kwok, Will W. K. Ma, Lap-Kei Lee, Harrison Hao Yang:
Blended Learning. New Challenges and Innovative Practices - 10th International Conference, ICBL 2017, Hong Kong, China, June 27-29, 2017, Proceedings. Lecture Notes in Computer Science 10309, Springer 2017, ISBN 978-3-319-59359-3 [contents] - 2016
- [j24]Wenjuan Li, Weizhi Meng, Xiapu Luo, Lam-for Kwok:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. Comput. Secur. 60: 177-192 (2016) - [j23]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. J. Netw. Comput. Appl. 68: 126-139 (2016) - [c47]Wei Li, Lam-for Kwok, Shaoqin Wu, Miaoshan Ni:
A Study of Scientific Inquiry Activities in Smart Classrooms of a Primary School. ICBL 2016: 24-36 - [c46]Wenjuan Li, Lijun Jiang, Weizhi Meng, Lam-for Kwok:
Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation. IFIPTM 2016: 146-153 - [c45]Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip:
PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. NSS 2016: 433-449 - [e6]Simon K. S. Cheung, Lam-for Kwok, Junjie Shang, Aihua Wang, Reggie Kwan:
Blended Learning: Aligning Theory with Practices - 9th International Conference, ICBL 2016, Beijing, China, July 19-21, 2016, Proceedings. Lecture Notes in Computer Science 9757, Springer 2016, ISBN 978-3-319-41164-4 [contents] - 2015
- [j22]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection. Secur. Commun. Networks 8(18): 3883-3895 (2015) - [j21]Lam-for Kwok:
A vision for the development of i-campus. Smart Learn. Environ. 2(1): 2 (2015) - [c44]YouRu Xie, Qinlei Wang, Yaowei Li, Lam-for Kwok, Yang Yang, Fengxi Guo:
Research on Problem-Oriented Instruction Mode Supported by Electronic Schoolbag. ICHL 2015: 231-242 - [c43]Miaoshan Ni, Lam-for Kwok, Lanzhen Zhen, Youru Xie, Haiping Long, Xing Zheng, Wei Li:
A Study of an E-schoolbag Supporting Flipped Classroom Model for Junior Mathematics Review Class. ICHL 2015: 243-254 - [e5]Simon K. S. Cheung, Lam For Kwok, Harrison Hao Yang, Joseph Fong, Reggie Kwan:
Hybrid Learning: Innovation in Educational Practices - 8th International Conference, ICHL 2015, Wuhan, China, July 27-29, 2015, Proceedings. Lecture Notes in Computer Science 9167, Springer 2015, ISBN 978-3-319-20620-2 [contents] - 2014
- [j20]Yuxin Meng, Lam-for Kwok:
Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection. Comput. Commun. 38: 50-59 (2014) - [j19]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput. Secur. 43: 189-204 (2014) - [j18]Weizhi Meng, Duncan S. Wong, Lam-for Kwok:
The effect of adaptive mechanism on behavioural biometric based mobile phone authentication. Inf. Manag. Comput. Secur. 22(2): 155-166 (2014) - [j17]Yuxin Meng, Lam-for Kwok:
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection. J. Netw. Comput. Appl. 39: 83-92 (2014) - [c42]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Enhancing email classification using data reduction and disagreement-based semi-supervised learning. ICC 2014: 622-627 - [c41]Wai-lap Chan, Lam-for Kwok:
Developing Knowledge Clusters in a Supportive Learning Environment. ICHL 2014: 208-219 - [c40]Wenjuan Li, Weizhi Meng, Lam-for Kwok:
Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection Networks. IFIPTM 2014: 61-76 - [c39]Weizhi Meng, Wenjuan Li, Lam-for Kwok:
An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments. ISC 2014: 465-476 - [c38]Yuxin Meng, Duncan S. Wong, Lam-for Kwok:
Design of touch dynamics based user authentication with an adaptive mechanism on mobile phones. SAC 2014: 1680-1687 - [e4]Simon K. S. Cheung, Joseph Fong, Jiping Zhang, Reggie Kwan, Lam For Kwok:
Hybrid Learning. Theory and Practice - 7th International Conference, ICHL 2014, Shanghai, China, August 8-10, 2014. Proceedings. Lecture Notes in Computer Science 8595, Springer 2014, ISBN 978-3-319-08960-7 [contents] - 2013
- [j16]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection. Comput. Networks 57(17): 3630-3640 (2013) - [j15]Yuxin Meng, Lam-for Kwok:
Enhancing False Alarm Reduction Using Voted Ensemble Selection in Intrusion Detection. Int. J. Comput. Intell. Syst. 6(4): 626-638 (2013) - [c37]Wenjuan Li, Yuxin Meng, Lam-for Kwok:
Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges. CIS 2013: 518-522 - [c36]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion Detection. HPCC/EUC 2013: 175-182 - [c35]Yuan Zhuang, Lam For Kwok, Simon K. S. Cheung:
A Case Review on the Implementation of Intelligent Tutoring Systems on Mobile Devices. ICHL 2013: 21-32 - [c34]Yuxin Meng, Wenjuan Li, Lam-for Kwok, Yang Xiang:
Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice. INCoS 2013: 181-188 - [c33]Yuxin Meng, Lam-for Kwok:
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. ISPEC 2013: 1-15 - [c32]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. NSS 2013: 40-53 - [c31]William J. Caelli, Lam-for Kwok, Dennis Longley:
Evolving a Secure Internet. SEC 2013: 42-54 - [c30]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. SEC 2013: 55-68 - [c29]Yuxin Meng, Lam-for Kwok:
Towards an Information-Theoretic Approach for Measuring Intelligent False Alarm Reduction in Intrusion Detection. TrustCom/ISPA/IUCC 2013: 241-248 - [e3]Simon K. S. Cheung, Joseph Fong, Wilfred Fong, Fu Lee Wang, Lam For Kwok:
Hybrid Learning and Continuing Education - 6th International Conference, ICHL 2013, Toronto, ON, Canada, August 12-14, 2013. Proceedings. Lecture Notes in Computer Science 8038, Springer 2013, ISBN 978-3-642-39749-3 [contents] - 2012
- [j14]Lam-for Kwok, Ka-Shing Chan:
Building an e-Portfolio with a learning plan centric approach. J. Zhejiang Univ. Sci. C 13(1): 37-47 (2012) - [c28]Yuxin Meng, Duncan S. Wong, Roman Schlegel, Lam-for Kwok:
Touch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones. Inscrypt 2012: 331-350 - [c27]Yuxin Meng, Lam-for Kwok:
Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction. CSS 2012: 483-497 - [c26]Yuxin Meng, Lam-for Kwok:
A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection. FSKD 2012: 505-509 - [c25]Yuxin Meng, Wenjuan Li, Lam-for Kwok:
Intelligent Alarm Filter Using Knowledge-Based Alert Verification in Network Intrusion Detection. ISMIS 2012: 115-124 - [c24]Yuxin Meng, Lam-for Kwok:
Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection. NSS 2012: 1-14 - [c23]Yuxin Meng, Lam-for Kwok, Wenjuan Li:
Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. SecureComm 2012: 203-221 - [e2]Simon K. S. Cheung, Joseph Fong, Lam For Kwok, Kedong Li, Reggie Kwan:
Hybrid Learning - 5th International Conference, ICHL 2012, Guangzhou, China, August 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7411, Springer 2012, ISBN 978-3-642-32017-0 [contents] - 2011
- [c22]Yuxin Meng, Lam-for Kwok:
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection. IAS 2011: 74-79 - [c21]Yuxin Meng, Lam-for Kwok:
A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection. CIS 2011: 978-982 - [c20]Joseph Fong, Lam For Kwok, Simon K. S. Cheung:
Data Modeling Technique Made Easy with Hybrid Learning Computer Aided Instruction. ICHL 2011: 345-356 - [e1]Reggie Kwan, Joseph Fong, Lam For Kwok, Jeanne Lam:
Hybrid Learning - 4th International Conference, ICHL 2011, Hong Kong, China, August 10-12, 2011. Proceedings. Lecture Notes in Computer Science 6837, Springer 2011, ISBN 978-3-642-22762-2 [contents] - 2010
- [c19]Ka-Shing Chan, Lam-for Kwok:
Assisting the Authoring Process of IMS-LD Using Web Parsing Technique. ICWL 2010: 21-30 - [c18]William J. Caelli, Lam-for Kwok, Dennis Longley:
A Business Continuity Management Simulator. SEC 2010: 9-18
2000 – 2009
- 2009
- [c17]Lam-for Kwok, Carter Yu:
Developing an ITS in Sudoku. AIED 2009: 584-586 - 2008
- [c16]Dennis Longley, Mark Branagan, William J. Caelli, Lam-for Kwok:
Feasibility of Automated Information Security Compliance Auditing. SEC 2008: 493-508 - 2006
- [j13]Jussipekka Leiwo, Lam-for Kwok, Douglas L. Maskell, Nenad Stankovic:
A technique for expressing IT security objectives. Inf. Softw. Technol. 48(7): 532-539 (2006) - [c15]Lam-for Kwok, Kwok-Wa Lam:
A Survey on Using IT in Administration and Management in Hong Kong Primary Schools. ICWL 2006: 300-312 - 2005
- [j12]Siu Cheung Kong, Lam For Kwok:
A cognitive tool for teaching the addition/subtraction of common fractions: a model of affordances. Comput. Educ. 45(2): 245-265 (2005) - [c14]Siu Cheung Kong, Sau Yin Lam, Lam For Kwok:
A cognitive tool in handheld devices for collaborative learning: comprehending procedural knowledge of the addition of common fractions. CSCL 2005: 341-345 - [c13]Wai Yuen Tang, Lam For Kwok:
Automatic Extraction of Learning Object Metadata (LOM) from HTML Web Pages. ICCE 2005: 460-467 - 2004
- [c12]Lam-for Kwok, Dennis Longley:
Security Modelling for Risk Analysis. SEC 2004: 29-46 - [c11]Kwok Ho Law, Lam For Kwok:
IDS False Alarm Filtering Using KNN Classifier. WISA 2004: 114-121 - 2003
- [j11]Siu Cheung Kong, Lam For Kwok:
A graphical partitioning model for learning common fraction: designing affordances on a web-supported learning environment. Comput. Educ. 40(2): 137-155 (2003) - [j10]Zhiqiang Yu, Horace Ho-Shing Ip, Lam For Kwok:
A robust watermarking scheme for 3D triangular mesh models. Pattern Recognit. 36(11): 2603-2614 (2003) - [c10]Peggy P. K. Fung, Lam-for Kwok, Dennis Longley:
Electronic Information Security Documentation. ACSW 2003: 25-31 - [c9]Yu Zhi-qiang, Horace Ho-Shing Ip, Lam For Kwok:
Robust Watermarking of 3D Polygonal Models Based on Vertice Scrambling. Computer Graphics International 2003: 254-257 - 2002
- [c8]Siu Cheung Kong, Lam For Kwok:
Modeling the Process of Learning Common Fraction Operation: Designing an Internet-Based Integrated Learning Environment for Knowledge Construction. ICCE 2002: 767-771 - 2001
- [j9]Mangtang Chan, Lam-for Kwok:
Integrating security design into the software development process for e-commerce systems. Inf. Manag. Comput. Secur. 9(3): 112-122 (2001) - [c7]Lam-for Kwok, Peggy P. K. Fung, Dennis Longley:
Security Documentation. Conference on Information Security Management & Small Systems Security 2001: 127-140
1990 – 1999
- 1999
- [j8]Siu Cheung Kong, Lam For Kwok:
An interactive teaching and learning environment for graph sketching. Comput. Educ. 32(1): 1-17 (1999) - [j7]Lam-for Kwok, Chi-kuen Lau, Sun-wai Fung:
Evaluating SAMS in Hong Kong schools. Comput. Educ. 32(3): 249-267 (1999) - [j6]Lam-for Kwok, Dennis Longley:
Information security management and modelling. Inf. Manag. Comput. Secur. 7(1): 30-40 (1999) - [j5]Siu Cheung Kong, Lam For Kwok:
A conceptual model of knowledge-based time-tabling system. Knowl. Based Syst. 12(3): 81-93 (1999) - 1997
- [j4]Lam For Kwok, Siu Cheung Kong, Ying-Yu Kam:
Timetabling in Hong Kong secondary schools. Comput. Educ. 28(3): 173-183 (1997) - [j3]Lam-for Kwok:
Hypertext information security model for organizations. Inf. Manag. Comput. Secur. 5(4): 138-148 (1997) - [c6]Lam-for Kwok, Dennis Longley:
Code of Practice: A Standard for Information Security Management. SEC 1997: 78-90 - 1996
- [j2]Lam-for Kwok, Dennis Longley:
A security officer's workbench. Comput. Secur. 15(8): 695-705 (1996) - [c5]Lam For Kwok, W. T. Lau, Siu Cheung Kong:
An intelligent decision support system for teaching duty assignments. ANZIIS 1996: 97-100 - 1995
- [j1]Lam-for Kwok, Sheung-lun Hung, Chun-Chung Joshua Pun:
Knowledge-based cabin crew pattern generator. Knowl. Based Syst. 8(1): 55-63 (1995) - 1994
- [c4]Alison Anderson, Dennis Longley, Lam-for Kwok:
Security Modelling for Organisations. CCS 1994: 241-250 - [c3]Sheung-lun Hung, Lam-for Kwok, Ken Chee-keung Law:
Automated Testing Tool for Natural®. Software Quality and Productivity 1994: 284-289 - 1993
- [c2]Sheung-lun Hung, Lam-for Kwok, Arthur Chung:
New Metrics for Automated Programming Assessment. Software Engineering Education 1993: 233-243 - 1992
- [c1]Sheung-lun Hung, Lam-for Kwok:
Upgrading IT Professionals in Hong Kong. Professional Development of Information Technology Professionals 1992: 89-94
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint