default search action
Suleman Khan 0001
Person information
- affiliation: Northumbria University, Department of Computer and Information Sciences, Newcastle upon Tyne, UK
- affiliation: Monash University, School of Information Technology, Bandar Sunway, Malaysia
- affiliation (PhD 2017): University of Malaya, Department of Computer Science and Technology, Malaysia
- affiliation: University of Peshawar, Pakistan
- affiliation: COMSATS, Institute of Information Technology, Department of Computer Science, Abbottabad, Pakistan
Other persons with the same name
- Suleman Khan — disambiguation page
- Suleman Khan 0002 — Chung-Ang University, Department of Civil and Environmental Engineering, Seoul, Korea
- Suleman Khan 0003 — Air University Islamabad, Department of Computer Science, Islamabad, Pakistan (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j61]Waqar Khalid, Naveed Ahmad, Suleman Khan, Najam U. Saquib, Muhammad Arshad, Duri Shahwar:
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks. IEEE Access 11: 4549-4573 (2023) - [j60]Waqar Khalid, Naveed Ahmad, Suleman Khan, Zahid Ullah, Yasir Javed:
Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks. IEEE Access 11: 75628-75656 (2023) - [j59]Suleman Khan, Muhammad Khurram Khan, Rizwan Khan:
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges. Computing 105(4): 811-830 (2023) - [j58]Siraj Munir, Rauf Ahmed Shams Malick, Syed Imran Jami, Ghufran Ahmed, Suleman Khan, Joel J. P. C. Rodrigues:
An integrated approach: using knowledge graph and network analysis for harnessing digital advertisement. Multim. Tools Appl. 82(6): 8883-8898 (2023) - 2022
- [j57]Hasina Attaullah, Tehsin Kanwal, Adeel Anjum, Ghufran Ahmed, Suleman Khan, Danda B. Rawat, Rizwan Khan:
Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data. IEEE Internet Things J. 9(6): 4411-4420 (2022) - [j56]Sulaiman Khan, Suleman Khan, Yasir Ali, Muhammad Khalid, Zahid Ullah, Shahid Mumtaz:
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. J. Netw. Syst. Manag. 30(2): 29 (2022) - [j55]Syed Yasser Arafat, Nabeel Ashraf, Muhammad Javed Iqbal, Iftikhar Ahmad, Suleman Khan, Joel J. P. C. Rodrigues:
Urdu signboard detection and recognition using deep learning. Multim. Tools Appl. 81(9): 11965-11987 (2022) - [j54]Hashim Albasheer, Maheyzah Md Siraj, Azath Mubarakali, Omer Elsier Tayfour, Sayeed Haider Salih, Mosab Hamdan, Suleman Khan, Anazida Zainal, Sameer Kamarudeen:
Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Sensors 22(4): 1494 (2022) - [j53]Mohamed Khalafalla Hassan, Sharifah Hafizah Syed Ariffin, Nurzal Effiyana Ghazali, Mutaz Hamad, Mosab Hamdan, Monia Hamdi, Habib Hamam, Suleman Khan:
Dynamic Learning Framework for Smooth-Aided Machine-Learning-Based Backbone Traffic Forecasts. Sensors 22(9): 3592 (2022) - [j52]Fahad Taha AL-Dhief, Ravie Chandren Muniyandi, Naseer Sabri Salim, Mosab Hamdan, Nurul Muazzah Abdul Latiff, Musatafa Abbas Abbood Albadr, Mutaz Hamed Hussien Khairi, Muzaffar Hamzah, Suleman Khan:
Forest Fire Detection Using New Routing Protocol. Sensors 22(20): 7745 (2022) - [j51]M. A. Manazir Ahsan, Ihsan Ali, Muhammad Imran, Mohd Yamani Idna Bin Idris, Suleman Khan, Anwar Khan:
A Fog-Centric Secure Cloud Storage Scheme. IEEE Trans. Sustain. Comput. 7(2): 250-262 (2022) - [c8]Arwa Mohamed, Mosab Hamdan, Suleman Khan, Muzaffar Hamzah, Muhammad N. Marsono:
Traffic Classification based on Incremental Learning Algorithms for the Software-Defined Networks. FIT 2022: 338-343 - 2021
- [j50]Mutaz Hamed Hussien Khairi, Sharifah Hafizah Syed Ariffin, Nurul Muazzah Abdul Latiff, Kamaludin Mohamad Yusof, Mohamed Khalafalla Hassan, Fahad Taha AL-Dhief, Mosab Hamdan, Suleman Khan, Muzaffar Hamzah:
Detection and Classification of Conflict Flows in SDN Using Machine Learning Algorithms. IEEE Access 9: 76024-76037 (2021) - [j49]Zeshan Mubeen, Mehtab Afzal, Zulfiqar Ali, Suleman Khan, Muhammad Imran:
Detection of impostor and tampered segments in audio by using an intelligent system. Comput. Electr. Eng. 91: 107122 (2021) - [j48]Arwa Mohamed, Mosab Hamdan, Suleman Khan, Ahmed Abdelaziz, Sharief F. Babiker, Muhammad Imran, Muhammad Nadzir Marsono:
Software-defined networks for resource allocation in cloud computing: A survey. Comput. Networks 195: 108151 (2021) - [j47]Mosab Hamdan, Suleman Khan, Ahmed Abdelaziz, Shahidatul Sadiah, Nasir Shaikh-Husin, Sattam Al Otaibi, Carsten Maple, Muhammad N. Marsono:
DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks. Comput. Commun. 180: 315-327 (2021) - [j46]Muhammad Shahid Iqbal, Iftikhar Ahmad, Luo Bin, Suleman Khan, Joel J. P. C. Rodrigues:
Deep learning recognition of diseased and normal cell representation. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j45]Muhammad Khalid, Muhammad Awais, Nishant Singh, Suleman Khan, Mohsin Raza, Qasim Badar Malik, Muhammad Imran:
Autonomous Transportation in Emergency Healthcare Services: Framework, Challenges, and Future Work. IEEE Internet Things Mag. 4(1): 28-33 (2021) - [j44]Mohsin Raza, Nishant Singh, Muhammad Khalid, Suleman Khan, Muhammad Awais, Muhammad Usman Hadi, Muhammad Imran, Saif ul Islam, Joel J. P. C. Rodrigues:
Challenges and Limitations of Internet of Things Enabled Healthcare in COVID-19. IEEE Internet Things Mag. 4(3): 60-65 (2021) - [j43]Mosab Hamdan, Entisar Hassan, Ahmed Abdelaziz, Abdallah Elhigazi Abdallah, Bushra Mohammed, Suleman Khan, Athanasios V. Vasilakos, Muhammad Nadzir Marsono:
A comprehensive survey of load balancing techniques in software-defined network. J. Netw. Comput. Appl. 174: 102856 (2021) - [j42]Saira Beg, Adeel Anjum, Mansoor Ahmad, Shahid Hussain, Ghufran Ahmad, Suleman Khan, Kim-Kwang Raymond Choo:
A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS). J. Netw. Comput. Appl. 174: 102874 (2021) - [j41]Mohammed Kamal Nsaif, Bilal Adil Mahdi, Yusor Rafid Bahar Al-Mayouf, Omar Adil Mahdi, Ahmed J. Aljaaf, Suleman Khan:
An online COVID-19 self-assessment framework supported by IoMT technology. J. Intell. Syst. 30(1): 966-975 (2021) - [j40]Danish Mahmood, Nadeem Javaid, Ghufran Ahmed, Suleman Khan, Valdemar Monteiro:
A review on optimization strategies integrating renewable energy sources focusing uncertainty factor - Paving path to eco-friendly smart cities. Sustain. Comput. Informatics Syst. 30: 100559 (2021) - [j39]M. A. Manazir Ahsan, Ainuddin Wahid Bin Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Eric Bachura, Kim-Kwang Raymond Choo:
CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics. IEEE Trans. Sustain. Comput. 6(2): 184-196 (2021) - [p3]Samreen, Muhammad Javed Iqbal, Iftikhar Ahmad, Suleman Khan, Rizwan Khan:
Language Modeling and Text Generation Using Hybrid Recurrent Neural Network. Deep Learning for Unmanned Systems 2021: 669-687 - [p2]Sikandar Zaheer, Muhammad Javed Iqbal, Iftikhar Ahmad, Suleman Khan, Rizwan Khan:
Detection and Recognition of Vehicle's Headlights Types for Surveillance Using Deep Neural Networks. Deep Learning for Unmanned Systems 2021: 689-707 - [p1]Muhammad Shahid Iqbal, Iftikhar Ahmad, Tamoor Khan, Suleman Khan, Muneer Ahmad, Lulu Wang:
Recent Advances of Deep Learning in Biology. Deep Learning for Unmanned Systems 2021: 709-732 - [i1]Sulaiman Khan, Suleman Khan, Yasir Ali, Muhammad Khalid, Zahid Ullah, Shahid Mumtaz:
Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach. CoRR abs/2111.09416 (2021) - 2020
- [j38]Mosab Hamdan, Bushra Mohammed, Usman Humayun, Ahmed Abdelaziz, Suleman Khan, M. Akhtar Ali, Muhammad Imran, Muhammad Nadzir Marsono:
Flow-Aware Elephant Flow Detection for Software-Defined Networks. IEEE Access 8: 72585-72597 (2020) - [j37]Muktar Yahuza, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Bin Abdul Wahab, Anthony T. S. Ho, Suleman Khan, Siti Nurmaya Binti Musa, Azni Zarina Binti Taha:
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities. IEEE Access 8: 76541-76567 (2020) - [j36]Bushra Mohammed, Mosab Hamdan, Joseph Stephen Bassi, Haitham A. Jamil, Suleman Khan, Abdallah Elhigazi Abdallah, Danda B. Rawat, Ismahani Binti Ismail, Muhammad Nadzir Marsono:
Edge Computing Intelligence Using Robust Feature Selection for Network Traffic Classification in Internet-of-Things. IEEE Access 8: 224059-224070 (2020) - [j35]Waleed Shahjehan, Asad Riaz, Imran Khan, Ali Safaa Sadiq, Suleman Khan, Muhammad Khurram Khan:
Bat algorithm-based beamforming for mmWave massive MIMO systems. Int. J. Commun. Syst. 33(2) (2020) - [j34]Mohammad Alauthman, Nauman Aslam, Mouhammd Al-Kasassbeh, Suleman Khan, Ahmad Al-Qerem, Kim-Kwang Raymond Choo:
An efficient reinforcement learning-based Botnet detection approach. J. Netw. Comput. Appl. 150 (2020) - [j33]Abdul Waheed, Munam Ali Shah, Abid Khan, Saif ul Islam, Suleman Khan, Carsten Maple, Muhammad Khurram Khan:
Volunteer Computing in Connected Vehicles: Opportunities and Challenges. IEEE Netw. 34(5): 212-218 (2020) - [j32]Jiachen Yang, Shuai Xiao, Bin Jiang, Houbing Song, Suleman Khan, Saif ul Islam:
Cache-Enabled Unmanned Aerial Vehicles for Cooperative Cognitive Radio Networks. IEEE Wirel. Commun. 27(2): 155-161 (2020) - [c7]Suleman Khan, Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Ahmed Abdelaziz:
Understanding Link Fabrication Attack in Software Defined Network using Formal Methods. ICIoT 2020: 555-562
2010 – 2019
- 2019
- [j31]Anita Latsmi Manohar, Kok-Lim Alvin Yau, Mee Hong Ling, Suleman Khan:
A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks. IEEE Access 7: 117-130 (2019) - [j30]Bilal Khalid Dar, Munam Ali Shah, Saif ul Islam, Castren Maple, Shafaq Mussadiq, Suleman Khan:
Delay-Aware Accident Detection and Response System Using Fog Computing. IEEE Access 7: 70975-70985 (2019) - [j29]Hina Rafique, Munam Ali Shah, Saif ul Islam, Tahir Maqsood, Suleman Khan, Carsten Maple:
A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing. IEEE Access 7: 115760-115773 (2019) - [j28]Muhammad Usman Younus, Saif ul Islam, Ihsan Ali, Suleman Khan, Muhammad Khurram Khan:
A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases. J. Netw. Comput. Appl. 137: 62-77 (2019) - [j27]Abdelmuttlib Ibrahim Abdallaahmed, Siti Hafizah Ab Hamid, Abdullah Gani, Suleman Khan, Muhammad Khurram Khan:
Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. J. Netw. Comput. Appl. 145 (2019) - [j26]Safar Maghdid Asaad, Halgurd S. Maghdid, Sherko R. HmaSalah, Kayhan Zrar Ghafoor, Ali Safaa Sadiq, Suleman Khan:
Indoor human tracking mechanism using integrated onboard smartphones Wi-Fi device and inertial sensors. Telecommun. Syst. 71(3): 447-458 (2019) - 2018
- [j25]Ali Safa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, Ahmad Noraziah, Suleman Khan, Ihsan Ali, Al-Sakib Khan Pathan, Kayhan Zrar Ghafoor:
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs. IEEE Access 6: 29041-29053 (2018) - [j24]Qaisar Shaheen, Muhammad Shiraz, Suleman Khan, Rabia Majeed, Mohsen Guizani, Nawsher Khan, Ali M. Aseere:
Towards Energy Saving in Computational Clouds: Taxonomy, Review, and Open Challenges. IEEE Access 6: 29407-29418 (2018) - [j23]Ihsan Ali, Abdullah Gani, Ismail Ahmedy, Ibrar Yaqoob, Suleman Khan, Mohammad Hossein Anisi:
Data Collection in Smart Communities Using Sensor Cloud: Recent Advances, Taxonomy, and Future Research Directions. IEEE Commun. Mag. 56(7): 192-197 (2018) - [j22]Ali Safa Sadiq, Suleman Khan, Kayhan Zrar Ghafoor, Mohsen Guizani, Seyedali Mirjalili:
Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information. Comput. Networks 137: 147-159 (2018) - [j21]Yusor Rafid Bahar Al-Mayouf, Nor Fadzilah Abdullah, Omar Adil Mahdi, Suleman Khan, Mahamod Ismail, Mohsen Guizani, Syed Hassan Ahmed:
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 19(7): 2125-2141 (2018) - [j20]Muhammad Kamran Khan, Muhammad Shiraz, Kayhan Zrar Ghafoor, Suleman Khan, Ali Safa Sadiq, Ghufran Ahmed:
EE-MRP: Energy-Efficient Multistage Routing Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c6]Abdelmuttlib Ibrahim Abdallaahmed, Suleman Khan, Abdullah Gani, Siti Hafizah Ab Hamid, Mohsen Guizani:
Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things. LCN 2018: 606-613 - 2017
- [j19]Shahid Anwar, Jasni Mohamad Zain, Mohamed Fadli Bin Zolkipli, Zakira Inayat, Suleman Khan, Bokolo Anthony Jr., Victor Chang:
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions. Algorithms 10(2): 39 (2017) - [j18]Ahmed Abdelaziz, Tan Fong Ang, Abdullah Gani, Suleman Khan, Faiz Alotaibi, Muhammad Khurram Khan:
On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues. Comput. J. 60(10): 1510-1519 (2017) - [j17]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mohsen Guizani, Muhammad Khurram Khan:
Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art. IEEE Commun. Surv. Tutorials 19(1): 303-324 (2017) - [j16]Suleman Khan, Muhammad Shiraz, Laleh Boroumand, Abdullah Gani, Muhammad Khurram Khan:
Towards port-knocking authentication methods for mobile cloud computing. J. Netw. Comput. Appl. 97: 66-78 (2017) - [c5]Abdelmuttlib Ibrahim Abdallaahmed, Abdullah Gani, Siti Hafizah Ab Hamid, Suleman Khan, Nadra Guizani, Kwangman Ko:
Intersection-based Distance and Traffic-Aware Routing (IDTAR) protocol for smart vehicular communication. IWCMC 2017: 489-493 - 2016
- [j15]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan, Victor Chang:
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis. IEEE Access 4: 9800-9820 (2016) - [j14]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya:
Cloud Log Forensics: Foundations, State of the Art, and Future Directions. ACM Comput. Surv. 49(1): 7:1-7:42 (2016) - [j13]Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Suleman Khan, Kim-Kwang Raymond Choo:
Chroma key background detection for digital video using statistical correlation of blurring artifact. Digit. Investig. 19: 29-43 (2016) - [j12]Yusor Rafid Bahar Al-Mayouf, Nor Fadzilah Abdullah, Mahamod Ismail, Salih M. Al-Qaraawi, Omar Adil Mahdi, Suleman Khan:
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm. EURASIP J. Wirel. Commun. Netw. 2016: 265 (2016) - [j11]Andrew Thomas Bimba, Norisma Idris, Ahmed Al-Hunaiyyan, Rohana Mahmud, Ahmed Abdelaziz, Suleman Khan, Victor Chang:
Towards knowledge modeling and manipulation technologies: A survey. Int. J. Inf. Manag. 36(6): 857-871 (2016) - [j10]Ahmed Abdelaziz, Tan Fong Ang, Mehdi Sookhak, Suleman Khan, Athanasios V. Vasilakos, Chee Sun Liew, Adnan Akhunzada:
Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues. KSII Trans. Internet Inf. Syst. 10(10): 4902-4932 (2016) - [j9]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, Iftikhar Ahmad:
Network forensics: Review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66: 214-235 (2016) - [j8]Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74: 98-120 (2016) - [j7]Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Ammar M. A. Abu znaid, Yusor Rafid Bahar Al-Mayouf, Suleman Khan:
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs. J. Sensors 2016: 3428730:1-3428730:12 (2016) - [j6]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed Abdelaziz, Kwangman Ko, Muhammad Khurram Khan, Mohsen Guizani:
Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges. IEEE Netw. 30(6): 6-13 (2016) - [j5]Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab, Suleman Khan:
Service delivery models of cloud computing: security issues and open challenges. Secur. Commun. Networks 9(17): 4726-4750 (2016) - [j4]Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Ammar M. A. Abu znaid, Suleman Khan, Yusor Rafid Bahar Al-Mayouf, Nadra Guizani:
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation. Wirel. Commun. Mob. Comput. 16(16): 2663-2676 (2016) - 2015
- [j3]Muhammad Shiraz, Abdullah Gani, Azra Shamim, Suleman Khan, Raja Wasim Ahmad:
Energy Efficient Computational Offloading Framework for Mobile Cloud Computing. J. Grid Comput. 13(1): 1-18 (2015) - [c4]Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa:
SIDNFF: Source identification network forensics framework for cloud computing. ICCE-TW 2015: 418-419 - 2014
- [j2]Abdullah Gani, Golam Mokatder Nayeem, Muhammad Shiraz, Mehdi Sookhak, Md Whaiduzzaman, Suleman Khan:
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Netw. Comput. Appl. 43: 84-102 (2014) - [j1]Han Qi, Muhammad Shiraz, Abdullah Gani, Md Whaiduzzaman, Suleman Khan:
Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69(2): 887-907 (2014) - [c3]Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Bin Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin:
Passive video forgery detection techniques: A survey. IAS 2014: 29-34 - 2012
- [c2]Suleman Khan, Khizar Hayat, Sajjad Ahmad Madani, Samee Ullah Khan, Joanna Kolodziej:
The Median Resource Failure Checkpointing. ECMS 2012: 483-489
2000 – 2009
- 2009
- [c1]Suleman Khan, Qazi Mudassar Ilyas, Waqas Anwar:
Contextual advertising using keyword extraction through collocation. FIT 2009: 69:1-69:5
Coauthor Index
aka: Ainuddin Wahid Bin Abdul Wahab
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint