default search action
Anca Jurcut
Person information
- affiliation: University College Dublin, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Rahman Shafique, Furqan Rustam, Sheriff Murtala, Anca Delia Jurcut, Gyu Sang Choi:
Advancing Autonomous Vehicle Safety: Machine Learning to Predict Sensor-Related Accident Severity. IEEE Access 12: 25933-25948 (2024) - [j49]Furqan Rustam, Ali Raza, Muhammad Qasim, Sarath Kumar Posa, Anca Delia Jurcut:
A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning. IEEE Access 12: 39614-39627 (2024) - [j48]Muhammad Adeel Abid, Madiha Amjad, Kashif Munir, Hafeez Ur Rehman Siddiqui, Anca Delia Jurcut:
IoT-Based Smart Biofloc Monitoring System for Fish Farming Using Machine Learning. IEEE Access 12: 86333-86345 (2024) - [j47]Ahmed M. Eltahlawy, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Detection of sequence number attacks using enhanced AODV protocol in MANETs. Comput. Electr. Eng. 118: 109395 (2024) - [j46]Furqan Rustam, Wajdi Aljedaani, Mahmoud Said Elsayed, Anca Delia Jurcut:
FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks. Comput. Networks 251: 110603 (2024) - [j45]Furqan Rustam, Anca Delia Jurcut:
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches. Comput. Secur. 136: 103564 (2024) - [j44]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-sensitive data identification model in online social networks. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j43]Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki, Marianne A. Azer:
A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization. Inf. 15(1): 46 (2024) - [j42]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks. IEEE Trans. Comput. Soc. Syst. 11(3): 4367-4384 (2024) - [j41]Pasika Ranaweera, Awaneesh Kumar Yadav, Madhusanka Liyanage, Anca Delia Jurcut:
A Novel Authentication Protocol for 5G gNodeBs in Service Migration Scenarios of MEC. IEEE Trans. Dependable Secur. Comput. 21(4): 2930-2948 (2024) - [c27]John William O'Meara, Mohit Taneja, Jack Nicholls, Nitish Kothale, Steve Flinter, Anca Delia Jurcut:
JoinDetect: A Data-Led Machine Learning Approach to Detection of Coinjoin Transactions. GoodIT 2024: 5-13 - [c26]Furqan Rustam, Pasika Ranaweera, Anca Delia Jurcut:
AI on the Defensive and Offensive: Securing Multi-Environment Networks from AI Agents. ICC 2024: 4287-4292 - [c25]Rahman Shafique, Furqan Rustam, Gyu Sang Choi, Anca Delia Jurcut:
Enhancing In-Vehicle Network Security Against AI-Generated Cyberattacks Using Machine Learning. WCNC 2024: 1-6 - 2023
- [j40]Ayman M. El-Zoghby, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack. IEEE Access 11: 48169-48191 (2023) - [j39]Lubna Riaz, Hafiz Muhammad Qadir, Ghulam Ali, Mubashir Ali, Muhammad Ahsan Raza, Anca D. Jurcut, Jehad Ali:
A Comprehensive Joint Learning System to Detect Skin Cancer. IEEE Access 11: 79434-79444 (2023) - [j38]Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Intrusion Detection for Electric Vehicle Charging Systems (EVCS). Algorithms 16(2): 75 (2023) - [j37]Ahmed Refaat Mousa, Mahmoud Said Elsayed, Anca Jurcut, Marianne A. Azer:
A lightweight-X-authentication protocol over automotive gateway. Comput. Electr. Eng. 110: 108887 (2023) - [j36]Muhammad Arslan Akram, Hira Ahmad, Adnan Noor Mian, Anca Delia Jurcut, Saru Kumari:
Blockchain-based privacy-preserving authentication protocol for UAV networks. Comput. Networks 224: 109638 (2023) - [j35]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Xiangjun Ma, Yehong Luo:
A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Comput. Commun. 200: 149-160 (2023) - [j34]Premkumar Chithaluru, Aman Singh, Jagjit Singh Dhatterwal, Ali Hassan Sodhro, Marwan Ali Albahar, Anca Jurcut, Ahmed Alkhayyat:
An Optimized Privacy Information Exchange Schema for Explainable AI Empowered WiMAX-based IoT networks. Future Gener. Comput. Syst. 148: 225-239 (2023) - [j33]Mohamed Mesbah, Mahmoud Said Elsayed, Anca Delia Jurcut, Marianne Azer:
Analysis of ICS and SCADA Systems Attacks Using Honeypots. Future Internet 15(7): 241 (2023) - [j32]Eric Gyamfi, Anca Delia Jurcut:
Novel Online Network Intrusion Detection System for Industrial IoT Based on OI-SVDD and AS-ELM. IEEE Internet Things J. 10(5): 3827-3839 (2023) - [j31]Furqan Rustam, Imran Ashraf, Anca Delia Jurcut, Ali Kashif Bashir, Yousaf Bin Zikria:
Malware detection using image representation of malware data and transfer learning. J. Parallel Distributed Comput. 172: 32-50 (2023) - [j30]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. Mob. Networks Appl. 28(1): 231-242 (2023) - [j29]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Correction to: Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. Mob. Networks Appl. 28(1): 243 (2023) - [j28]Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
IoT Vulnerabilities and Attacks: SILEX Malware Case Study. Symmetry 15(11): 1978 (2023) - [j27]Eric Gyamfi, James Adu Ansere, Mohsin Kamal, Muhammad Tariq, Anca Jurcut:
An Adaptive Network Security System for IoT-Enabled Maritime Transportation. IEEE Trans. Intell. Transp. Syst. 24(2): 2538-2547 (2023) - [c24]Shahrin Chowdhury, Anca Delia Jurcut:
Design Requirements for Secured and Cost-Efficient Blockchain-Based Data Exchange Frameworks in Healthcare. BCCA 2023: 474-486 - [c23]Faithful Chiagoziem Onwuegbuche, Anca Delia Jurcut, Liliana Pasquale:
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction. CSCML 2023: 285-295 - [c22]Furqan Rustam, Ali Raza, Imran Ashraf, Anca Delia Jurcut:
Deep Ensemble-based Efficient Framework for Network Attack Detection. MedComNet 2023: 1-10 - [c21]Furqan Rustam, Anca Delia Jurcut, Wajdi Aljedaani, Imran Ashraf:
Securing Multi-Environment Networks using Versatile Synthetic Data Augmentation Technique and Machine Learning Algorithms. PST 2023: 1-10 - 2022
- [j26]Belal Ibrahim Hairab, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer:
Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks. IEEE Access 10: 98427-98440 (2022) - [j25]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
A comparative study on online machine learning techniques for network traffic streams analysis. Comput. Networks 207: 108836 (2022) - [j24]Yuzi Yi, Nafei Zhu, Jingsha He, Anca Delia Jurcut, Bin Zhao:
Toward pragmatic modeling of privacy information propagation in online social networks. Comput. Networks 219: 109429 (2022) - [j23]Pasika Ranaweera, Anca Jurcut, Madhusanka Liyanage:
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. ACM Comput. Surv. 54(9): 186:1-186:37 (2022) - [j22]Iraj Lohrasbinasab, Amin Shahraki, Amir Taherkordi, Anca Delia Jurcut:
From statistical- to machine learning-based network traffic prediction. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j21]Pasika Ranaweera, Chamitha de Alwis, Anca D. Jurcut, Madhusanka Liyanage:
Realizing contact-less applications with Multi-Access Edge Computing. ICT Express 8(4): 575-587 (2022) - [j20]Aitizaz Ali, Muhammad Fermi Pasha, Jehad Ali, Ong Huey Fang, Mehedi Masud, Anca Delia Jurcut, Mohammed A. Alzain:
Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography. Sensors 22(2): 528 (2022) - [j19]Eric Gyamfi, Anca Jurcut:
Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets. Sensors 22(10): 3744 (2022) - [j18]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
Active Learning for Network Traffic Classification: A Technical Study. IEEE Trans. Cogn. Commun. Netw. 8(1): 422-439 (2022) - [j17]Mahmoud Said Elsayed, Nhien-An Le-Khac, Marianne A. Azer, Anca D. Jurcut:
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 8(4): 1862-1880 (2022) - [c20]Eranda Harshanath Jayatunga, Avishek Nag, Anca Delia Jurcut:
Security Requirements for Vehicle-to-Everything (V2X) Communications Integrated with Blockchain. BCCA 2022: 208-213 - [c19]Eric Gyamfi, Anca Jurcut:
M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT. CAMAD 2022: 166-172 - [c18]Pasika Ranaweera, Awaneesh Kumar Yadav, Madhusanka Liyanage, Anca Delia Jurcut:
Service Migration Authentication Protocol for MEC. GLOBECOM 2022: 5493-5498 - [c17]John William O'Meara, Mahmoud Said Elsayed, Takfarinas Saber, Anca Delia Jurcut:
SDN Intrusion Detection: An Ensemble Approach to Reducing False Negative Rate for Novel Attacks. ITNAC 2022: 1-8 - 2021
- [j16]Sidra Zafar, Mohsin Nazir, Aneeqa Sabah, Anca Delia Jurcut:
Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling. Comput. Biol. Medicine 136: 104707 (2021) - [j15]Pasika Ranaweera, Madhusanka Liyanage, Anca Delia Jurcut:
Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic. IEEE Consumer Electron. Mag. 10(2): 80-91 (2021) - [j14]Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage:
Survey on Multi-Access Edge Computing Security and Privacy. IEEE Commun. Surv. Tutorials 23(2): 1078-1124 (2021) - [j13]Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca Delia Jurcut:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. IEEE Secur. Priv. 19(1): 90-94 (2021) - [j12]Mahmoud Said Elsayed, Nhien-An Le-Khac, Marwan Ali Albahar, Anca Jurcut:
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191: 103160 (2021) - [j11]Hayat Khaloufi, Karim Abouelmehdi, Abderrahim Beni Hssane, Furqan Rustam, Anca Delia Jurcut, Ernesto Lee, Imran Ashraf:
Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors. Sensors 21(20): 6853 (2021) - [j10]Mohsin Nazir, Aneeqa Sabah, Sana Sarwar, Azeema Yaseen, Anca Jurcut:
Power and Resource Allocation in Wireless Communication Network. Wirel. Pers. Commun. 119(4): 3529-3552 (2021) - [j9]Mohsin Nazir, Aneeqa Sabah, Sana Sarwar, Azeema Yaseen, Anca Jurcut:
Correction to: Power and Resource Allocation in Wireless Communication Network. Wirel. Pers. Commun. 119(4): 3553 (2021) - [c16]Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. ARES 2021: 34:1-34:7 - [c15]Iqra Iqbal, Anca D. Jurcut, Muhammad Mohsin Nazir:
A Design of Energy Efficient Nanorouting Protocol Using Greedy Algorithm. FABULOUS 2021: 37-47 - [c14]Mahmoud Said Elsayed, Hamed Z. Jahromi, Muhammad Mohsin Nazir, Anca Delia Jurcut:
The Role of CNN for Intrusion Detection Systems: An Improved CNN Learning Approach for SDNs. FABULOUS 2021: 91-104 - [i11]Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. CoRR abs/2101.12604 (2021) - [i10]Guerrino Mazzarolo, Juan Carlos Fernandez Casas, Anca Delia Jurcut, Nhien-An Le-Khac:
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site. CoRR abs/2103.04744 (2021) - [i9]Promise Ricardo Agbedanu, Anca Delia Jurcut:
BLOFF: A Blockchain based Forensic Model in IoT. CoRR abs/2103.08442 (2021) - [i8]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic. CoRR abs/2104.11041 (2021) - [i7]Ivan Cvitic, Dragan Perakovic, Marko Perisa, Anca D. Jurcut:
Methodology proposal for proactive detection of network anomalies in e-learning system during the COVID-19 scenario. CoRR abs/2104.11234 (2021) - [i6]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
Active Learning for Network Traffic Classification: A Technical Survey. CoRR abs/2106.06933 (2021) - 2020
- [j8]Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca D. Jurcut:
InSDN: A Novel SDN Intrusion Dataset. IEEE Access 8: 165263-165284 (2020) - [j7]Tanesh Kumar, An Braeken, Anca Delia Jurcut, Madhusanka Liyanage, Mika Ylianttila:
AGE: authentication in gadget-free healthcare environments. Inf. Technol. Manag. 21(2): 95-114 (2020) - [j6]Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac:
Security Considerations for Internet of Things: A Survey. SN Comput. Sci. 1(4): 193 (2020) - [c13]Pasika Ranaweera, Vashish N. Imrith, Madhusanka Liyanage, Anca Delia Jurcut:
Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions. ICC 2020: 1-6 - [c12]Jinyong Chen, Reiner Dojen, Anca Jurcut:
Detection and Prevention of New Attacks for ID-based Authentication Protocols. ICNCC 2020: 78-86 - [c11]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. ISNCC 2020: 1-7 - [c10]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Network Anomaly Detection Using LSTM Based Autoencoder. Q2SWinet 2020: 37-45 - [c9]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. WoWMoM 2020: 391-396 - [p2]Christopher Boyton, Nhien-An Le-Khac, Kim-Kwang Raymond Choo, Anca Jurcut:
Forensic Investigation of Ransomware Activities - Part 2. Cyber and Digital Forensic Investigations 2020: 79-108 - [p1]Mohammad Borhani, Madhusanka Liyanage, Ali Hassan Sodhro, Pardeep Kumar, Anca Delia Jurcut, Andrei V. Gurtov:
Secure and Resilient Communications in the Industrial Internet. Guide to Disaster-Resilient Communication Networks 2020: 219-242 - [i5]Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac:
Security Considerations for Internet of Things: A Survey. CoRR abs/2006.10591 (2020) - [i4]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. CoRR abs/2006.13981 (2020) - [i3]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. CoRR abs/2008.05791 (2020)
2010 – 2019
- 2019
- [j5]Anca Jurcut, Tom Coffey, Reiner Dojen:
A Novel Security Protocol Attack Detection Logic with Unique Fault Discovery Capability for Freshness Attacks and Interleaving Session Attacks. IEEE Trans. Dependable Secur. Comput. 16(6): 969-983 (2019) - [j4]An Braeken, Madhusanka Liyanage, Anca Delia Jurcut:
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA). Wirel. Pers. Commun. 106(2): 345-364 (2019) - [c8]Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage:
Realizing Multi-Access Edge Computing Feasibility: Security Perspective. CSCN 2019: 1-7 - [c7]Anca Delia Jurcut, Jinyong Chen, Anshuman Kalla, Madhusanka Liyanage, John Murphy:
A Novel Authentication Mechanism for Mobile Satellite Communication Systems. WCNC Workshops 2019: 1-7 - [i2]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Machine-Learning Techniques for Detecting Attacks in SDN. CoRR abs/1910.00817 (2019) - [i1]Guerrino Mazzarolo, Anca Delia Jurcut:
Insider threats in Cyber Security: The enemy within the gates. CoRR abs/1911.09575 (2019) - 2018
- [c6]Anca Delia Jurcut, Madhusanka Liyanage, Jinyong Chen, Cornelia Györödi, Jingsha He:
On the security verification of a short message service protocol. WCNC 2018: 1-6 - 2017
- [j3]Madhusanka Liyanage, An Braeken, Anca Delia Jurcut, Mika Ylianttila, Andrei V. Gurtov:
Secure communication channel architecture for Software Defined Mobile Networks. Comput. Networks 114: 32-50 (2017) - 2014
- [j2]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design guidelines for security protocols to prevent replay & parallel session attacks. Comput. Secur. 45: 255-273 (2014) - [c5]Anca Jurcut, Tom Coffey, Reiner Dojen:
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool. CN 2014: 128-137 - [c4]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design requirements to counter parallel session attacks in security protocols. PST 2014: 298-305 - 2013
- [j1]Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool. J. Commun. 8(11): 795-805 (2013) - 2012
- [c3]Anca Jurcut, Tom Coffey, Reiner Dojen:
Symmetry in Security Protocol Cryptographic Messages - A Serious Weakness Exploitable by Parallel Session Attacks. ARES 2012: 410-416
2000 – 2009
- 2008
- [c2]Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi:
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. IDC 2008: 239-244 - [c1]Vladimir Pasca, Anca Jurcut, Reiner Dojen, Tom Coffey:
Determining a parallel session attack on a key distribution protocol using a model checker. MoMM 2008: 150-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint