default search action
Nahid Shahmehri
Person information
- affiliation: Linköping University, Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Ulf Kargén, Noah Mauthe, Nahid Shahmehri:
Android decompiler performance on benign and malicious apps: an empirical study. Empir. Softw. Eng. 28(2): 48 (2023) - [j19]Ulf Kargén, Ivar Härnqvist, Johannes Wilson, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri:
desync-cc: A research tool for automatically applying disassembly desynchronization during compilation. Sci. Comput. Program. 228: 102954 (2023) - [c87]Ulf Kargén, Noah Mauthe, Nahid Shahmehri:
Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps. ARES 2023: 27:1-27:12 - 2022
- [c86]Ulf Kargén, Ivar Härnqvist, Johannes Wilson, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri:
desync-cc: An Automatic Disassembly-Desynchronization Obfuscator. SANER 2022: 464-468 - 2021
- [c85]Noah Mauthe, Ulf Kargén, Nahid Shahmehri:
A Large-Scale Empirical Study of Android App Decompilation. SANER 2021: 400-410
2010 – 2019
- 2019
- [c84]Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri:
Robust Detection of Obfuscated Strings in Android Apps. AISec@CCS 2019: 25-35 - [i1]Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri:
Comment on "AndrODet: An adaptive Android obfuscation detector". CoRR abs/1910.06192 (2019) - 2018
- [c83]Ulf Kargén, Nahid Shahmehri:
Speeding Up Bug Finding using Focused Fuzzing. ARES 2018: 7:1-7:10 - 2017
- [j18]Rahul Hiran, Niklas Carlsson, Nahid Shahmehri:
Collaborative framework for protection against attacks targeting BGP and edge networks. Comput. Networks 122: 120-137 (2017) - [c82]Ulf Kargén, Nahid Shahmehri:
Towards robust instruction-level trace alignment of binary code. ASE 2017: 342-352 - 2016
- [j17]Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
A Look at the Third-Party Identity Management Landscape. IEEE Internet Comput. 20(2): 18-25 (2016) - [c81]Ulf Kargén, Nahid Shahmehri:
Towards Accurate Binary Correspondence Using Runtime-Observed Values. ICSME 2016: 438-442 - [c80]Rahul Hiran, Niklas Carlsson, Nahid Shahmehri:
Does scale, size, and locality matter? Evaluation of collaborative BGP security mechanisms. Networking 2016: 261-269 - 2015
- [c79]Rahul Hiran, Niklas Carlsson, Nahid Shahmehri:
Crowd-based detection of routing anomalies on the internet. CNS 2015: 388-396 - [c78]Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Information Sharing and User Privacy in the Third-party Identity Management Landscape. CODASPY 2015: 151-153 - [c77]Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek L. Eager, Anirban Mahanti, Nahid Shahmehri:
Bandwidth-aware Prefetching for Proactive Multi-video Preloading and Improved HAS Performance. ACM Multimedia 2015: 551-560 - [c76]Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Information Sharing and User Privacy in the Third-Party Identity Management Landscape. SEC 2015: 174-188 - [c75]Ulf Kargén, Nahid Shahmehri:
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. ESEC/SIGSOFT FSE 2015: 782-792 - 2014
- [c74]Rahul Hiran, Niklas Carlsson, Nahid Shahmehri:
PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security. WISCS@CCS 2014: 3-12 - [c73]Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek L. Eager, Anirban Mahanti, Nahid Shahmehri:
Quality-adaptive Prefetching for Interactive Branched Video using HTTP-based Adaptive Streaming. ACM Multimedia 2014: 317-326 - [c72]Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Third-Party Identity Management Usage on the Web. PAM 2014: 151-162 - [c71]Ulf Kargén, Nahid Shahmehri:
Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing. SCAM 2014: 155-164 - 2013
- [j16]Vengatanathan Krishnamoorthi, Patrik Bergström, Niklas Carlsson, Derek L. Eager, Anirban Mahanti, Nahid Shahmehri:
Empowering the creative user: personalized HTTP-based adaptive streaming of multi-path nonlinear video. Comput. Commun. Rev. 43(4): 53-58 (2013) - [c70]Vengatanathan Krishnamoorthi, Niklas Carlsson, Derek L. Eager, Anirban Mahanti, Nahid Shahmehri:
Helping Hand or Hidden Hurdle: Proxy-Assisted HTTP-Based Adaptive Streaming Performance. MASCOTS 2013: 182-191 - [c69]Vengatanathan Krishnamoorthi, Patrik Bergström, Niklas Carlsson, Derek L. Eager, Anirban Mahanti, Nahid Shahmehri:
Empowering the creative user: personalized HTTP-based adaptive streaming of multi-path nonlinear video. FhMN@SIGCOMM 2013: 53-58 - 2012
- [j15]Nahid Shahmehri, Amel Mammar, Edgardo Montes de Oca, David Byers, Ana R. Cavalli, Shanai Ardi, Willy Jimenez:
An advanced approach for modeling and detecting software vulnerabilities. Inf. Softw. Technol. 54(9): 997-1013 (2012) - [c68]Ulf Kargén, Nahid Shahmehri:
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. SCAM 2012: 138-143 - [c67]Leonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib, Thomas Johansson, Nahid Shahmehri:
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry. UIC/ATC 2012: 627-632 - 2011
- [j14]Anna Vapen, Nahid Shahmehri:
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets. Int. J. Mob. Comput. Multim. Commun. 3(2): 1-18 (2011) - [c66]Nahid Shahmehri, David Byers, Rahul Hiran:
TRAP: Open Decentralized Distributed Spam Filtering. TrustBus 2011: 86-97 - 2010
- [c65]Anna Vapen, David Byers, Nahid Shahmehri:
2-clickAuth. ARES 2010: 79-86 - [c64]David Byers, Nahid Shahmehri:
Unified modeling of attacks, vulnerabilities and security activities. SESS@ICSE 2010: 36-42 - [c63]Anna Vapen, Nahid Shahmehri:
Security Levels for Web Authentication Using Mobile Phones. PrimeLife 2010: 130-143
2000 – 2009
- 2009
- [j13]David Byers, Nahid Shahmehri:
A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1. Digit. Investig. 6(1-2): 61-70 (2009) - [c62]David Byers, Nahid Shahmehri:
Prioritisation and Selection of Software Security Activities. ARES 2009: 201-207 - [c61]Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel:
An Architectural Foundation for Security Model Sharing and Reuse. ARES 2009: 823-828 - [c60]Shanai Ardi, Nahid Shahmehri:
A Post-Mortem Incident Modeling Method. ARES 2009: 1018-1023 - [c59]Shanai Ardi, Nahid Shahmehri:
Introducing Vulnerability Awareness to Common Criteria's Security Targets. ICSEA 2009: 419-424 - 2008
- [j12]David Byers, Nahid Shahmehri:
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. Digit. Investig. 5(1-2): 29-33 (2008) - [c58]David Byers, Nahid Shahmehri:
A Cause-Based Approach to Preventing Software Vulnerabilities. ARES 2008: 276-283 - [c57]Shanai Ardi, Nahid Shahmehri:
Integrating a Security Plug-in with the OpenUP/Basic Development Process. ARES 2008: 284-291 - 2007
- [j11]Almut Herzog, Nahid Shahmehri, Claudiu Duma:
An Ontology of Information Security. Int. J. Inf. Secur. Priv. 1(4): 1-23 (2007) - [j10]Almut Herzog, Nahid Shahmehri:
Usable set-up of runtime security policies. Inf. Manag. Comput. Secur. 15(5): 394-407 (2007) - [j9]Ioan Chisalita, Nahid Shahmehri:
On the Design of Safety Communication Systems for Vehicles. IEEE Trans. Syst. Man Cybern. Part A 37(6): 933-945 (2007) - [c56]David Byers, Nahid Shahmehri:
Design of a Process for Software Security. ARES 2007: 301-309 - [c55]Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling? ARES 2007: 1017-1025 - [c54]Almut Herzog, Nahid Shahmehri:
User help techniques for usable security. CHIMIT 2007: 11 - [c53]Claudiu Duma, Almut Herzog, Nahid Shahmehri:
Privacy in the Semantic Web: What Policy Languages Have to Offer. POLICY 2007: 109-118 - [c52]Almut Herzog, Nahid Shahmehri:
Usability and Security of Personal Firewalls. SEC 2007: 37-48 - [e7]Manfred Hauswirth, Adam Wierzbicki, Klaus Wehrle, Alberto Montresor, Nahid Shahmehri:
Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), September 2-5, 2007, Galway, Ireland. IEEE Computer Society 2007, ISBN 0-7695-2986-0 [contents] - 2006
- [c51]Cécile Aberg, Johan Aberg, Patrick Lambrix, Nahid Shahmehri:
A Platform to Evaluate the Technology for Service Discovery in the Semantic Web. AAAI 2006: 1253-1258 - [c50]Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni:
A Trust-Aware, P2P-Based Overlay for Intrusion Detection. DEXA Workshops 2006: 692-697 - [c49]Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri:
Semantic Web Policies - A Discussion of Requirements and Research Issues. ESWC 2006: 712-724 - [c48]Shanai Ardi, David Byers, Nahid Shahmehri:
Towards a structured unified process for software security. SESS@ICSE 2006: 3-10 - [c47]David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma:
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. ICSM 2006: 411-422 - [c46]Ioan Chisalita, Nahid Shahmehri:
Performance Evaluation of Safety Communication for Vehicles. ISWCS 2006: 302-306 - [c45]He Tan, Vaida Jakoniene, Patrick Lambrix, Johan Aberg, Nahid Shahmehri:
Alignment of Biomedical Ontologies Using Life Science Literature. KDLL 2006: 1-17 - [c44]Ioan Chisalita, Nahid Shahmehri:
Adaptive Dissemination of Safety Data Among Vehicles. PIMRC 2006: 1-5 - [c43]Almut Herzog, Nahid Shahmehri:
A Usability Study of Security Policy Management. SEC 2006: 296-306 - [c42]Martin Karresand, Nahid Shahmehri:
Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. SEC 2006: 413-424 - [c41]Ioan Chisalita, Nahid Shahmehri:
Emergency Information Dissemination in Mobile Networks for Vehicles. WINSYS 2006: 284-289 - [e6]Alberto Montresor, Adam Wierzbicki, Nahid Shahmehri:
Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2-4 October 2006, Cambridge, United Kingdom. IEEE Computer Society 2006, ISBN 0-7695-2679-9 [contents] - 2005
- [j8]Almut Herzog, Nahid Shahmehri:
Performance of the Java security manager. Comput. Secur. 24(3): 192-207 (2005) - [c40]Dennis Maciuszek, Johan Aberg, Nahid Shahmehri:
What help do older people need?: constructing a functional design space of electronic assistive technology applications. ASSETS 2005: 4-11 - [c39]Claudiu Duma, Nahid Shahmehri, Germano Caronni:
Dynamic Trust Metrics for Peer-to-Peer Systems. DEXA Workshops 2005: 776-781 - [c38]Cécile Aberg, Patrick Lambrix, Nahid Shahmehri:
An Agent-based Framework for Integrating Workflows and Web Services. WETICE 2005: 27-32 - [c37]Almut Herzog, Nahid Shahmehri:
An Evaluation of Java Application Containers according to Security Requirements. WETICE 2005: 178-186 - [e5]Germano Caronni, Nathalie Weiler, Marcel Waldvogel, Nahid Shahmehri:
Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August - 2 September 2005, Konstanz, Germany. IEEE Computer Society 2005, ISBN 0-7695-2376-5 [contents] - 2004
- [j7]Paul Cuddihy, Roderick T. Hinman, Al-Thaddeus Avestruz, Elmer C. Lupton, Gary Livshin, John I. Rodriguez, Steven B. Leeb, Corinne M. Clark, Kathy J. Horvath, Ladislav Volicer, Björn Landfeldt, Judy Kay, Robert Kummerfeld, Aaron J. Quigley, David West, Trent Apted, Gavin Sinclair, David J. Haniff, Roy Kalawsky, David Atkins, Martin Lewin, Steve J. Brown, Nahid Shahmehri, Johan Aberg, Dennis Maciuszek, Ioan Chisalita:
Successful Aging. IEEE Pervasive Comput. 3(2): 48-50 (2004) - [c36]Ioan Chisalita, Nahid Shahmehri:
A context-based vehicular communication protocol. PIMRC 2004: 2820-2824 - [c35]Ioan Chisalita, Nahid Shahmehri:
Vehicular communication - a candidate technology for traffic safety. SMC (4) 2004: 3903-3908 - [e4]Germano Caronni, Nathalie Weiler, Nahid Shahmehri:
4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland. IEEE Computer Society 2004, ISBN 0-7695-2156-8 [contents] - 2003
- [c34]Claudiu Duma, Nahid Shahmehri, Patrick Lambrix:
A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. SEC 2003: 133-144 - [c33]Claudiu Duma, Nahid Shahmehri, Patrick Lambrix:
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. WETICE 2003: 208-213 - [c32]Nahid Shahmehri, Juha Takkinen, Cécile Aberg:
Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University. WWW (Posters) 2003 - [e3]Nahid Shahmehri, Ross Lee Graham, Germano Caronni:
3rd International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September 2003, Linköping, Sweden. IEEE Computer Society 2003, ISBN 0-7695-2023-5 [contents] - 2002
- [c31]Cécile Aberg, Nahid Shahmehri:
A Framework for Generating Task Specific Information Extraction Systems. ISMIS 2002: 491-502 - [c30]Eduard Turcan, Nahid Shahmehri, Ross Lee Graham:
Intelligent Software Delivery Using P2P. Peer-to-Peer Computing 2002: 136-143 - [c29]Ioan Chisalita, Nahid Shahmehri:
An in-vehicle approach for improving traffic safety through GIS utilization. SMC (2) 2002: 6 - [e2]Ross Lee Graham, Nahid Shahmehri:
2nd International Conference on Peer-to-Peer Computing (P2P 2002), 5-7 September 2002, Linköping, Sweden. IEEE Computer Society 2002, ISBN 0-7695-1810-9 [contents] - 2001
- [c28]Johan Aberg, Nahid Shahmehri:
An empirical study of human Web assistants: implications for user support in Web information systems. CHI 2001: 404-411 - [c27]Johan Aberg, Nahid Shahmehri:
Collection and Exploitation of Expert Knowledge in Web Assistant Systems. HICSS 2001 - [c26]Johan Aberg, Nahid Shahmehri, Dennis Maciuszek:
User modelling for live help systems: initial results. EC 2001: 194-197 - [c25]Johan Aberg, Nahid Shahmehri:
User Modelling as an Aid for Human Web Assistants. User Modeling 2001: 201-203 - [c24]Johan Aberg, Nahid Shahmehri, Dennis Maciuszek:
User Modelling for Live Help Systems. WELCOM 2001: 164-179 - [c23]Ioan Chisalita, Nahid Shahmehri:
Issues in Image Utilization within Mobile E-Services. WETICE 2001: 62-67 - [e1]Ross Lee Graham, Nahid Shahmehri:
1st International Conference on Peer-to-Peer Computing (P2P 2001), 27-29 August 2001, Linköping, Sweden. IEEE Computer Society 2001, ISBN 0-7695-1503-7 [contents] - 2000
- [j6]Johan Åberg, Nahid Shahmehri:
The role of human Web assistants in e-commerce: an analysis and a usability study. Internet Res. 10(2): 114-125 (2000) - [j5]Patrick Lambrix, Nahid Shahmehri:
Querying Documents using Content, Structure and Properties. J. Intell. Inf. Syst. 15(3): 287-307 (2000) - [c22]Cécile Boisson, Nahid Shahmehri:
Template Generation for Identifying Text Patterns. ISMIS 2000: 463-473 - [c21]Lin Han, Nahid Shahmehri:
Secure Multicast Software Delivery. WETICE 2000: 207-212 - [c20]Claudiu Duma, Almut Herzog, Nahid Shahmehri:
Towards Secure e-Services. WETICE 2000: 221-224
1990 – 1999
- 1999
- [c19]Juha Takkinen, Nahid Shahmehri:
Task-Oriented Restructuring of an Application Domain: A Multi-Agent Architecture for Doing Things in Internet E-Mail. HICSS 1999 - [c18]Patrick Lambrix, Nahid Shahmehri, Svend Jacobsen:
Querying Document Bases by Content, Structure and Properties. ISMIS 1999: 123-132 - [c17]Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi:
Final Summary Report on Enterprise Security. WETICE 1999: 134 - [c16]Lin Han, Nahid Shahmehri:
Establishing a Secure Multicast Group for Remote Software Delivery. WETICE 1999: 194-198 - 1998
- [c15]Juha Takkinen, Nahid Shahmehri:
Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks. DEXA Workshop 1998: 566-571 - [c14]Patrick Lambrix, Nahid Shahmehri, Niclas Wahllöf:
A Default Extension to Description Logics for Use in an Intelligent Search Engine. HICSS (5) 1998: 28-35 - [c13]Juha Takkinen, Nahid Shahmehri:
CAFE: A Conceptual Model for Managing Information in Electronic Mail. HICSS (5) 1998: 44-53 - [c12]Patrick Lambrix, Nahid Shahmehri:
TRIFU: The Right Information For yoU. HICSS (4) 1998: 505-512 - 1997
- [c11]Patrick Lambrix, Nahid Shahmehri, Niclas Wahllöf:
Dwebic: An Intelligent Search Engine based on Default Description Logics. Description Logics 1997 - [c10]Mats Gustafsson, Benoit Deligny, Nahid Shahmehri:
Using NFS to Implement Role-Based Access Control. WETICE 1997: 299-304 - 1996
- [c9]T. Hall, Nahid Shahmehri:
An Intelligent Multi-Agent Architecture for Support of Process Reuse in a Workflow Management System. PAAM 1996: 331-344 - 1995
- [j4]Nahid Shahmehri, Mariam Kamkar, Peter Fritzson:
Usability criteria for automated debugging systems. J. Syst. Softw. 31(1): 55-70 (1995) - 1994
- [j3]Peter Fritzson, Mikhail Auguston, Nahid Shahmehri:
Using assertions in declarative and operational models for automated debugging. J. Syst. Softw. 25(3): 223-239 (1994) - 1993
- [j2]Mariam Kamkar, Peter Fritzson, Nahid Shahmehri:
Three approaches to interprocedural dynamic slicing. Microprocess. Microprogramming 38(1-5): 625-636 (1993) - [c8]Nahid Shahmehri, Mariam Kamkar, Peter Fritzson:
Usability Criteria for Automated Debugging Systems. AADEBUG 1993: 16-39 - [c7]Mariam Kamkar, Peter Fritzson, Nahid Shahmehri:
Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing. ICSM 1993: 386-395 - 1992
- [j1]Peter Fritzson, Nahid Shahmehri, Mariam Kamkar, Tibor Gyimóthy:
Generalized Algorithmic Debugging and Testing. LOPLAS 1(4): 303-322 (1992) - [c6]Mariam Kamkar, Nahid Shahmehri, Peter Fritzson:
Interprocedural Dynamic Slicing. PLILP 1992: 370-384 - 1991
- [c5]Peter Fritzson, Tibor Gyimóthy, Mariam Kamkar, Nahid Shahmehri:
Generalized Algorithmic Debugging and Testing. PLDI 1991: 317-326 - 1990
- [c4]Nahid Shahmehri, Peter Fritzson:
Algorithmic Debugging for Imperative Languages with Side-Effects (Abstract). CC 1990: 226-227 - [c3]Nahid Shahmehri, Mariam Kamkar, Peter Fritzson:
Semi-automatic bug localization in software maintenance. ICSM 1990: 30-36 - [c2]Mariam Kamkar, Nahid Shahmehri, Peter Fritzson:
Bug Localization by Algorithmic Debugging and Program Slicing. PLILP 1990: 60-74
1980 – 1989
- 1988
- [c1]Mariam Kamkar, Nahid Shahmehri, Peter Fritzson:
Affect-Chaining and Dependency Oriented Flow Analysis Applied to Queries of Programs. SIGSMALL/PC 1988: 36-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint