default search action
William K. Robertson
Person information
- affiliation: Northeastern University, Boston, MA, USA
- affiliation: University of California, Santa Barbara, USA
Other persons with the same name
- William Robertson 0001 (aka: Bill Robertson 0001) — Dalhousie University, Halifax, NS, Canada (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]William K. Robertson, Manuel Egele:
A Viewpoint: Safer Heaps With Practical Architectural Security Primitives. IEEE Secur. Priv. 22(4): 62-65 (2024) - 2023
- [c76]William Blair, William K. Robertson, Manuel Egele:
ThreadLock: Native Principal Isolation Through Memory Protection Keys. AsiaCCS 2023: 966-979 - [c75]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis. ICST 2023: 117-128 - [c74]Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William K. Robertson:
Black-box Attacks Against Neural Binary Function Detection. RAID 2023: 1-16 - 2022
- [j8]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ACM Trans. Priv. Secur. 25(4): 33:1-33:35 (2022) - [c73]William Blair, William K. Robertson, Manuel Egele:
MPKAlloc: Efficient Heap Meta-data Integrity Through Hardware Memory Protection Keys. DIMVA 2022: 136-155 - [i14]Ioannis Agadakos, Manuel Egele, William K. Robertson:
Polytope: Practical Memory Access Control for C++ Applications. CoRR abs/2201.08461 (2022) - [i13]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Evaluating Synthetic Bugs. CoRR abs/2208.11088 (2022) - [i12]Joshua Bundt, Michael Davinroy, Ioannis Agadakos, Alina Oprea, William Robertson:
Attacking Neural Binary Function Detection. CoRR abs/2208.11667 (2022) - [i11]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William K. Robertson, Tim Leek:
Homo in Machina: Improving Fuzz Testing Coverage via Compartment Analysis. CoRR abs/2212.11162 (2022) - 2021
- [c72]Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. AsiaCCS 2021: 687-701 - [c71]Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek:
Evaluating Synthetic Bugs. AsiaCCS 2021: 716-730 - [c70]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. EuroS&P 2021: 633-649 - 2020
- [c69]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. NDSS 2020 - [c68]Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson, Engin Kirda:
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. RAID 2020: 107-120 - [c67]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson:
Cached and Confused: Web Cache Deception in the Wild. USENIX Security Symposium 2020: 665-682 - [i10]William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William K. Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. CoRR abs/2002.03416 (2020) - [i9]Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William K. Robertson, Engin Kirda, Anil Kurmus:
Bypassing memory safety mechanisms through speculative control flow hijacks. CoRR abs/2003.05503 (2020) - [i8]Alejandro Mera, Bo Feng, Long Lu, Engin Kirda, William K. Robertson:
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis. CoRR abs/2007.01502 (2020)
2010 – 2019
- 2019
- [c66]Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. ACSAC 2019: 747-761 - [c65]Florian Quinkert, Tobias Lauinger, William K. Robertson, Engin Kirda, Thorsten Holz:
It's Not what It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains. CNS 2019: 259-267 - [c64]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
A Longitudinal Analysis of the ads.txt Standard. Internet Measurement Conference 2019: 294-307 - [c63]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists. ISC 2019: 255-276 - [c62]Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William K. Robertson, Engin Kirda:
Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. PAM 2019: 161-177 - [c61]Amin Kharraz, Brandon L. Daley, Graham Z. Baker, William Robertson, Engin Kirda:
USBESAFE: An End-Point Solution to Protect Against USB-Based Attacks. RAID 2019: 89-103 - [i7]Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William K. Robertson:
Cached and Confused: Web Cache Deception in the Wild. CoRR abs/1912.10190 (2019) - 2018
- [j7]Amin Kharraz, William K. Robertson, Engin Kirda:
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? IEEE Secur. Priv. 16(3): 103-107 (2018) - [c60]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. ACSAC 2018: 28-39 - [c59]Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. EuroS&P 2018: 153-166 - [c58]Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. Internet Measurement Conference 2018: 322-328 - [c57]Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. Internet Measurement Conference 2018: 471-477 - [c56]Amin Kharraz, William K. Robertson, Engin Kirda:
Surveylance: Automatically Detecting Online Survey Scams. IEEE Symposium on Security and Privacy 2018: 70-86 - [c55]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. WWW 2018: 237-246 - [i6]Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. CoRR abs/1810.10649 (2018) - [i5]Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William K. Robertson:
Large-Scale Analysis of Style Injection by Relative Path Overwrite. CoRR abs/1811.00917 (2018) - [i4]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William K. Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. CoRR abs/1811.00918 (2018) - [i3]Sajjad Arshad, Amin Kharraz, William K. Robertson:
Identifying Extension-based Ad Injection via Fine-grained Web Content Provenance. CoRR abs/1811.00919 (2018) - [i2]Muhammad Ahmad Bashir, Sajjad Arshad, William K. Robertson, Christo Wilson:
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. CoRR abs/1811.00920 (2018) - [i1]Sajjad Arshad, Amin Kharraz, William K. Robertson:
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. CoRR abs/1811.00926 (2018) - 2017
- [j6]Collin Mulliner, William K. Robertson, Engin Kirda:
On the misuse of graphical user interface elements to implement security controls. it Inf. Technol. 59(2): 59 (2017) - [c54]Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. ACSAC 2017: 590-602 - [c53]William Koch, Abdelberi Chaabane, Manuel Egele, William K. Robertson, Engin Kirda:
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications. ISSTA 2017: 147-157 - [c52]Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda:
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. NDSS 2017 - [c51]Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson:
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. RAID 2017: 73-97 - [c50]Tobias Lauinger, Abdelberi Chaabane, Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William Robertson:
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers. USENIX Security Symposium 2017: 865-880 - 2016
- [c49]Sevtap Duman, Kubra Kalkan-Cakmakci, Manuel Egele, William K. Robertson, Engin Kirda:
EmailProfiler: Spearphishing Filtering with Header and Stylometric Features of Emails. COMPSAC 2016: 408-416 - [c48]Kaan Onarlioglu, William Robertson, Engin Kirda:
Overhaul: Input-Driven Access Control for Better Privacy on Traditional Operating Systems. DSN 2016: 443-454 - [c47]Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - [c46]Sajjad Arshad, Amin Kharraz, William Robertson:
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. Financial Cryptography 2016: 441-459 - [c45]Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Internet Measurement Conference 2016: 247-253 - [c44]Ahmet Salih Buyukkayhan, Kaan Onarlioglu, William K. Robertson, Engin Kirda:
CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities. NDSS 2016 - [c43]Sajjad Arshad, Amin Kharraz, William Robertson:
Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance. RAID 2016: 415-436 - [c42]Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero:
Trellis: Privilege Separation for Multi-user Applications Made Easy. RAID 2016: 437-456 - [c41]Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, William K. Robertson, Frederick Ulrich, Ryan Whelan:
LAVA: Large-Scale Automated Vulnerability Addition. IEEE Symposium on Security and Privacy 2016: 110-121 - [c40]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
TriggerScope: Towards Detecting Logic Bombs in Android Applications. IEEE Symposium on Security and Privacy 2016: 377-396 - [c39]Matthias Neugschwandtner, Collin Mulliner, William K. Robertson, Engin Kirda:
Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices. TRUST 2016: 60-81 - [c38]Muhammad Ahmad Bashir, Sajjad Arshad, William K. Robertson, Christo Wilson:
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. USENIX Security Symposium 2016: 481-496 - [c37]Amin Kharraz, Sajjad Arshad, Collin Mulliner, William K. Robertson, Engin Kirda:
UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware. USENIX Security Symposium 2016: 757-772 - [e3]Stephen Schwab, William K. Robertson, Davide Balzarotti:
Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016. ACM 2016, ISBN 978-1-4503-4771-6 [contents] - 2015
- [j5]Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. Comput. Secur. 49: 147-161 (2015) - [c36]Amin Kharraz, William K. Robertson, Davide Balzarotti, Leyla Bilge, Engin Kirda:
Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. DIMVA 2015: 3-24 - [c35]Yanick Fratantonio, Antonio Bianchi, William K. Robertson, Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users. DIMVA 2015: 282-303 - [c34]Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. Financial Cryptography 2015: 355-369 - [c33]Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities. USENIX Security Symposium 2015: 737-752 - 2014
- [c32]Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda:
TrueClick: automatically distinguishing trick banners from genuine download links. ACSAC 2014: 456-465 - [c31]Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. AsiaCCS 2014: 459-470 - [c30]Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - [c29]Michael Weissbacher, Tobias Lauinger, William K. Robertson:
Why Is CSP Failing? Trends and Challenges in CSP Adoption. RAID 2014: 212-233 - [c28]Collin Mulliner, William K. Robertson, Engin Kirda:
Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces. IEEE Symposium on Security and Privacy 2014: 149-162 - 2013
- [c27]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c26]Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda:
PatchDroid: scalable third-party security patches for Android devices. ACSAC 2013: 259-268 - [c25]Kaan Onarlioglu, Mustafa Battal, William K. Robertson, Engin Kirda:
Securing Legacy Firefox Extensions with SENTINEL. DIMVA 2013: 122-138 - [c24]Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS 2013 - [c23]Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. RAID 2013: 369-389 - [c22]Kaan Onarlioglu, Collin Mulliner, William K. Robertson, Engin Kirda:
PrivExec: Private Execution as an Operating System Service. IEEE Symposium on Security and Privacy 2013: 206-220 - [e2]Ulrich Flegel, Evangelos P. Markatos, William K. Robertson:
Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7591, Springer 2013, ISBN 978-3-642-37299-5 [contents] - [e1]Jon Oberheide, William K. Robertson:
7th USENIX Workshop on Offensive Technologies, WOOT '13, Washington, D.C., USA, August 13, 2013. USENIX Association 2013 [contents] - 2012
- [c21]Erik-Oliver Blass, William Robertson:
TRESOR-HUNT: attacking CPU-bound encryption. ACSAC 2012: 71-78 - [c20]Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel:
Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. ACSAC 2012: 129-138 - [c19]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis. COMPSAC 2012: 233-243 - [c18]Theodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda:
An empirical analysis of input validation mechanisms in web applications and languages. SAC 2012: 1419-1426 - 2010
- [j4]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c17]William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
Effective Anomaly Detection with Scarce Training Data. NDSS 2010
2000 – 2009
- 2009
- [j3]Giovanni Vigna, Fredrik Valeur, Davide Balzarotti, William K. Robertson, Christopher Kruegel, Engin Kirda:
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries. J. Comput. Secur. 17(3): 305-329 (2009) - [c16]Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna:
Protecting a Moving Target: Addressing Web Application Concept Drift. RAID 2009: 21-40 - [c15]William K. Robertson, Giovanni Vigna:
Static Enforcement of Web Application Integrity Through Strong Typing. USENIX Security Symposium 2009: 283-298 - 2008
- [c14]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - 2007
- [c13]Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna:
Improving Signature Testing through Dynamic Data Flow Analysis. ACSAC 2007: 53-63 - [c12]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 - 2006
- [c11]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 - 2005
- [j2]Christopher Krügel, Giovanni Vigna, William K. Robertson:
A multi-model approach to the detection of web-based attacks. Comput. Networks 48(5): 717-738 (2005) - [c10]Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Polymorphic Worm Detection Using Structural Information of Executables. RAID 2005: 207-226 - [c9]Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. USENIX Security Symposium 2005 - 2004
- [j1]Christopher Kruegel, William K. Robertson, Giovanni Vigna:
Using Alert Verification to Identify Successful Intrusion Attempts. Prax. Inf.verarb. Kommun. 27(4): 219-227 (2004) - [c8]Christopher Krügel, William K. Robertson, Giovanni Vigna:
Detecting Kernel-Level Rootkits Through Binary Analysis. ACSAC 2004: 91-100 - [c7]Giovanni Vigna, William K. Robertson, Davide Balzarotti:
Testing network-based intrusion detection signatures using mutant exploits. CCS 2004: 21-30 - [c6]Christopher Krügel, William K. Robertson:
Alert Verification Determining the Success of Intrusion Attempts. DIMVA 2004: 25-38 - [c5]Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Static Disassembly of Obfuscated Binaries. USENIX Security Symposium 2004: 255-270 - 2003
- [c4]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:
Bayesian Event Classification for Intrusion Detection. ACSAC 2003: 14-23 - [c3]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43 - [c2]William K. Robertson, Christopher Krügel, Darren Mutz, Fredrik Valeur:
Run-time Detection of Heap-based Overflows. LISA 2003: 51-60 - [c1]Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur:
Topology-Based Detection of Anomalous BGP Messages. RAID 2003: 17-35
Coauthor Index
aka: Christopher Kruegel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint