default search action
Pavel Celeda
Person information
- affiliation: Masaryk University, Brno, Czech Republic
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Ján Dovjak:
Automated feedback for participants of hands-on cybersecurity training. Educ. Inf. Technol. 29(9): 11555-11584 (2024) - [c67]Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda:
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. ARES 2024: 33:1-33:11 - [c66]Valdemar Svábenský, Jan Vykopal, Martin Horák, Martin Hofbauer, Pavel Celeda:
From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. ITiCSE (1) 2024 - [c65]Jan Vykopal, Pavel Celeda, Valdemar Svábenský, Martin Hofbauer, Martin Horák:
Research and Practice of Delivering Tabletop Exercises. ITiCSE (1) 2024 - [c64]Lukás Sadlek, Martin Husák, Pavel Celeda:
Identification of Device Dependencies Using Link Prediction. NOMS 2024: 1-10 - [i20]Jan Vykopal, Pavel Celeda, Valdemar Svábenský, Martin Hofbauer, Martin Horák:
Research and Practice of Delivering Tabletop Exercises. CoRR abs/2404.10206 (2024) - [i19]Valdemar Svábenský, Jan Vykopal, Martin Horák, Martin Hofbauer, Pavel Celeda:
From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. CoRR abs/2404.10988 (2024) - [i18]Lukás Sadlek, Martin Husák, Pavel Celeda:
Identification of Device Dependencies Using Link Prediction. CoRR abs/2407.03019 (2024) - [i17]Valdemar Svábenský, Kristián Tkácik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Celeda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay:
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments. CoRR abs/2408.08531 (2024) - 2023
- [j16]Martin Lastovicka, Martin Husák, Petr Velan, Tomás Jirsík, Pavel Celeda:
Passive operating system fingerprinting revisited: Evaluation and current challenges. Comput. Networks 229: 109782 (2023) - [j15]Razvan Beuran, Jan Vykopal, Daniela Belajová, Pavel Celeda, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Comput. Secur. 128: 103120 (2023) - [j14]Jan Vykopal, Pavel Seda, Valdemar Svábenský, Pavel Celeda:
Smart Environment for Adaptive Learning of Cybersecurity Skills. IEEE Trans. Learn. Technol. 16(3): 443-456 (2023) - [c63]Martin Drasar, Ádám Ruman, Pavel Celeda, Shanchieh Jay Yang:
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. ESORICS Workshops (2) 2023: 738-749 - [c62]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. ITiCSE (1) 2023: 236-242 - [c61]Lukás Sadlek, Pavel Celeda:
Cyber Key Terrain Identification Using Adjusted PageRank Centrality. SEC 2023: 293-306 - [i16]Lukás Sadlek, Pavel Celeda:
Cyber Key Terrain Identification Using Adjusted PageRank Centrality. CoRR abs/2306.11018 (2023) - [i15]Jan Vykopal, Pavel Seda, Valdemar Svábenský, Pavel Celeda:
Smart Environment for Adaptive Learning of Cybersecurity Skills. CoRR abs/2307.05281 (2023) - [i14]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. CoRR abs/2307.07608 (2023) - [i13]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. CoRR abs/2307.08582 (2023) - [i12]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Kristián Tkácik, Daniel Popovic:
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. CoRR abs/2307.10260 (2023) - 2022
- [j13]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Kristián Tkácik, Daniel Popovic:
Student assessment in cybersecurity training automated by pattern mining and clustering. Educ. Inf. Technol. 27(7): 9231-9262 (2022) - [j12]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of educational data mining and learning analytics on data from cybersecurity training. Educ. Inf. Technol. 27(9): 12179-12212 (2022) - [c60]Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. ARES 2022: 91:1-91:8 - [c59]Pavel Seda, Jan Vykopal, Pavel Celeda, Igor Ignác:
Designing Adaptive Cybersecurity Hands-on Training. FIE 2022: 1-8 - [c58]Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. NOMS 2022: 1-6 - [c57]Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. NOMS 2022: 1-7 - [c56]Jan Vykopal, Valdemar Svábenský, Pavel Seda, Pavel Celeda:
Preventing Cheating in Hands-on Lab Assignments. SIGCSE (1) 2022: 78-84 - [c55]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. SIGCSE (1) 2022: 787-793 - [i11]Jan Vykopal, Valdemar Svábenský, Pavel Seda, Pavel Celeda:
Preventing Cheating in Hands-on Lab Assignments. CoRR abs/2201.01154 (2022) - [i10]Pavel Seda, Jan Vykopal, Valdemar Svábenský, Pavel Celeda:
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. CoRR abs/2201.01574 (2022) - [i9]Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. CoRR abs/2206.10272 (2022) - [i8]Stanislav Spacek, Petr Velan, Pavel Celeda, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. CoRR abs/2206.11175 (2022) - [i7]Lukás Sadlek, Pavel Celeda, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. CoRR abs/2206.14539 (2022) - 2021
- [j11]Valdemar Svábenský, Pavel Celeda, Jan Vykopal, Silvia Brisáková:
Cybersecurity knowledge and skills taught in capture the flag challenges. Comput. Secur. 102: 102154 (2021) - [c54]Pavel Seda, Jan Vykopal, Valdemar Svábenský, Pavel Celeda:
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. FIE 2021: 1-9 - [c53]Valdemar Svábenský, Jan Vykopal, Daniel Tovarnák, Pavel Celeda:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. FIE 2021: 1-9 - [c52]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. FIE 2021: 1-9 - [c51]Milan Cermák, Pavel Celeda:
Stream-Based IP Flow Analysis. IM 2021: 736-741 - [c50]Daniel Tovarnák, Lukás Sadlek, Pavel Celeda:
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. IM 2021: 986-991 - [c49]Stanislav Spacek, Daniel Tovarnák, Pavel Celeda:
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. SEC 2021: 302-316 - [i6]Valdemar Svábenský, Pavel Celeda, Jan Vykopal, Silvia Brisáková:
Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. CoRR abs/2101.01421 (2021) - [i5]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. CoRR abs/2110.10004 (2021) - [i4]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. CoRR abs/2112.02053 (2021) - [i3]Valdemar Svábenský, Jan Vykopal, Daniel Tovarnák, Pavel Celeda:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. CoRR abs/2112.11118 (2021) - 2020
- [j10]Martin Husák, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Trans. Manag. Inf. Syst. 11(4): 19:1-19:16 (2020) - [c48]Martin Husák, Pavel Celeda:
Predictions of Network Attacks in Collaborative Environment. NOMS 2020: 1-6 - [c47]Tomás Jirsík, Pavel Celeda:
Cyber Situation Awareness via IP Flow Monitoring. NOMS 2020: 1-6 - [c46]Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda:
Using TLS Fingerprints for OS Identification in Encrypted Traffic. NOMS 2020: 1-6 - [c45]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
What Are Cybersecurity Education Papers About?: A Systematic Literature Review of SIGCSE and ITiCSE Conferences. SIGCSE 2020: 2-8 - [c44]Pavel Celeda, Jan Vykopal, Valdemar Svábenský, Karel Slávicek:
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. SIGCSE 2020: 1026-1032 - [i2]Pavel Celeda, Jan Vykopal, Valdemar Svábenský, Karel Slávicek:
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. CoRR abs/2004.11575 (2020)
2010 – 2019
- 2019
- [j9]Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda:
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Commun. Surv. Tutorials 21(1): 640-660 (2019) - [c43]Tomás Jirsík, Stepan Trcka, Pavel Celeda:
Quality of Service Forecasting with LSTM Neural Networks. IM 2019: 251-260 - [c42]Pavel Celeda, Petr Velan, Benjamin Kral, Ondrej Kozak:
Enabling SSH Protocol Visibility in Flow Monitoring. IM 2019: 569-574 - [c41]Petr Velan, Pavel Celeda:
Application-Aware Flow Monitoring. IM 2019: 701-706 - [c40]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
Towards Learning Analytics in Cybersecurity Capture the Flag Games. SIGCSE 2019: 1255 - [i1]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. CoRR abs/1911.11675 (2019) - 2018
- [c39]Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda:
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. ARES 2018: 29:1-29:6 - [c38]Stanislav Spacek, Pavel Celeda:
Threat Detection Through Correlation ofNetwork Flows and Logs. AIMS 2018: 6-10 - [c37]Nataliia Neshenko, Martin Husák, Elias Bou-Harb, Pavel Celeda, Sameera Al-Mulla, Claude Fachkha:
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations. GLOBECOM Workshops 2018: 1-7 - [c36]Tomás Jirsík, Pavel Celeda:
Toward real-time network-wide cyber situational awareness. NOMS 2018: 1-7 - [c35]Martin Lastovicka, Tomás Jirsík, Pavel Celeda, Stanislav Spacek, Daniel Filakovsky:
Passive os fingerprinting methods in the jungle of wireless networks. NOMS 2018: 1-9 - 2017
- [j8]Tomás Jirsík, Milan Cermák, Daniel Tovarnák, Pavel Celeda:
Toward Stream-Based IP Flow Analysis. IEEE Commun. Mag. 55(7): 70-76 (2017) - [c34]Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. ARES 2017: 22:1-22:10 - [c33]Martin Lastovicka, Pavel Celeda:
Situational Awareness: Detecting Critical Dependencies and Devices in a Network. AIMS 2017: 173-178 - [c32]Jan Vykopal, Martin Vizváry, Radek Oslejsek, Pavel Celeda, Daniel Tovarnák:
Lessons learned from complex hands-on defence exercises in a cyber range. FIE 2017: 1-8 - [c31]Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizváry, Daniel Tovarnák:
KYPO Cyber Range: Design and Use Cases. ICSOFT 2017: 310-321 - [c30]Jana Medková, Martin Husák, Martin Vizváry, Pavel Celeda:
Honeypot testbed for network defence strategy evaluation. IM 2017: 887-888 - 2016
- [j7]Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting. EURASIP J. Inf. Secur. 2016: 6 (2016) - [c29]Jana Medková, Pavel Celeda:
Network Defence Using Attacker-Defender Interaction Modelling. AIMS 2016: 127-131 - [c28]Milan Cermák, Pavel Celeda:
Detecting Advanced Network Threats Using a Similarity Search. AIMS 2016: 137-141 - [c27]Abdesselem Kortebi, Olivier Bouchet, Anil Mengi, Helmut Lucht, Marcin Brzozowski, Oliver Maye, Pavel Celeda, Jan Pazdera:
Convergent and reliable hybrid home networks. DRCN 2016: 112-114 - [c26]Tomás Jirsík, Milan Cermák, Pavel Celeda:
On Information Value of Top N Statistics. ICITCS 2016: 1-5 - [c25]Petr Velan, Jana Medková, Tomás Jirsík, Pavel Celeda:
Network traffic characterisation using flow-based statistics. NOMS 2016: 907-912 - [c24]Milan Cermák, Daniel Tovarnák, Martin Lastovicka, Pavel Celeda:
A performance benchmark for NetFlow data analysis on distributed stream processing systems. NOMS 2016: 919-924 - 2015
- [j6]Petr Velan, Milan Cermák, Pavel Celeda, Martin Drasar:
A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5): 355-374 (2015) - [j5]Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Jeroen Famaey, Petr Velan, Pavel Celeda:
Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services. J. Netw. Syst. Manag. 23(3): 794-802 (2015) - [c23]Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. ARES 2015: 389-396 - 2014
- [j4]Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras:
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX. IEEE Commun. Surv. Tutorials 16(4): 2037-2064 (2014) - [j3]Guillaume Doyen, Martin Waldburger, Anna Sperotto, Pavel Celeda, Juan-Luis Gorricho, Thomas Schaaf, Joan Serrat:
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. J. Netw. Syst. Manag. 22(2): 289-296 (2014) - [c22]Tomás Jirsík, Pavel Celeda:
Enhancing Network Security: Host Trustworthiness Estimation. AIMS 2014: 63-68 - [c21]Petr Velan, Pavel Celeda:
Next Generation Application-Aware Flow Monitoring. AIMS 2014: 173-178 - [c20]Tomás Jirsík, Pavel Celeda:
Identifying Operating System Using Flow-Based Traffic Fingerprinting. EUNICE 2014: 70-73 - [c19]Milan Cermák, Pavel Celeda, Jan Vykopal:
Detection of DNS Traffic Anomalies in Large Networks. EUNICE 2014: 215-226 - [c18]Olivier Bouchet, Jean-Philippe Javaudin, Abdesselem Kortebi, Hanane El Adbellaouy, Marcin Brzozowski, Dimitris Katsianis, Cédric Mayer, Hongyu Guan, Maryline Lebouc, Fabrice Fontaine, Franck Cochet, Pierre Jaffré, Anil Mengi, Pavel Celeda, Hurcak Gundogdu Aytekin, Fatih Kurt:
ACEMIND: The Smart Integrated Home Network. Intelligent Environments 2014: 1-8 - [c17]Tomás Jirsík, Martin Husák, Pavel Celeda, Zdenek Eichler:
Cloud-based security research testbed: A DDoS use case. NOMS 2014: 1-2 - 2013
- [c16]Petr Velan, Tomás Jirsík, Pavel Celeda:
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. EUNICE 2013: 136-147 - [c15]Pavel Celeda, Petr Velan, Martin Rabek, Rick Hofstede, Aiko Pras:
Large-scale geolocation for NetFlow. IM 2013: 1015-1020 - [c14]Martin Elich, Petr Velan, Tomás Jirsík, Pavel Celeda:
An investigation into teredo and 6to4 transition mechanisms: Traffic analysis. LCN Workshops 2013: 1018-1024 - [e2]Guillaume Doyen, Martin Waldburger, Pavel Celeda, Anna Sperotto, Burkhard Stiller:
Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7943, Springer 2013, ISBN 978-3-642-38997-9 [contents] - 2012
- [c13]Radek Krejcí, Pavel Celeda, Jakub Dobrovolný:
Traffic Measurement and Analysis of Building Automation and Control Networks. AIMS 2012: 62-73 - [c12]Pavel Celeda, Radek Krejcí, Vojtech Krmicek:
Revealing and analysing modem malware. ICC 2012: 971-975 - [c11]Pavel Celeda, Radek Krejcí, Vojtech Krmicek:
Flow-Based Security Issue Detection in Building Automation and Control Networks. EUNICE 2012: 64-75 - [e1]Ramin Sadre, Jiri Novotný, Pavel Celeda, Martin Waldburger, Burkhard Stiller:
Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings. Lecture Notes in Computer Science 7279, Springer 2012, ISBN 978-3-642-30632-7 [contents] - 2011
- [c10]Martin Elich, Matej Grégr, Pavel Celeda:
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX (Short Paper). TMA 2011: 64-71 - 2010
- [c9]Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda:
Aspect-Based Attack Detection in Large-Scale Networks. RAID 2010: 488-489
2000 – 2009
- 2009
- [j2]Martin Rehák, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Pavel Celeda:
Adaptive Multiagent System for Network Traffic Monitoring. IEEE Intell. Syst. 24(3): 16-25 (2009) - [j1]Martin Rehák, Michal Pechoucek, Martin Grill, Karel Bartos, Vojtech Krmicek, Pavel Celeda:
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes. Int. J. Electron. Secur. Digit. Forensics 2(1): 35-48 (2009) - 2008
- [c8]Martin Rehák, Michal Pechoucek, Pavel Celeda, Jiri Novotný, Pavel Minarík:
CAMNEP: agent-based network intrusion detection system. AAMAS (Industry Track) 2008: 133-136 - [c7]Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Martin Grill, Karel Bartos:
Multi-agent approach to network intrusion detection. AAMAS (Demos) 2008: 1695-1696 - [c6]Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek:
Improving Anomaly Detection Error Rate by Collective Trust Modeling. RAID 2008: 398-399 - 2007
- [c5]Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Pavel Minarík, David Medvigy:
Collaborative Attack Detection in High-Speed Networks. CEEMAS 2007: 73-82 - [c4]Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Jirí Moninec, Tomás Dymácek, David Medvigy:
High-Performance Agent System for Intrusion Detection in Backbone Networks. CIA 2007: 134-148 - [c3]Pavel Celeda, Vojtech Krmicek, Martin Rehák, David Medvigy:
High-Speed Network Traffic Acquisition for Agent Systems. IAT 2007: 477-480 - [c2]Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda:
Network Intrusion Detection by Means of Community of Trusting Agents. IAT 2007: 498-504 - [c1]Vojtech Krmicek, Pavel Celeda, Martin Rehák, Michal Pechoucek:
Agent-Based Network Intrusion Detection System. IAT 2007: 528-531
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-25 00:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint