default search action
Udaya Kiran Tupakula
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Avantika Gaur, Preeti Mishra, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024) - [j28]Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta:
Anti-phishing: A comprehensive perspective. Expert Syst. Appl. 238(Part F): 122199 (2024) - [j27]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Enhancing Security in Industrial Control Systems. ACM Trans. Cyber Phys. Syst. 8(1): 6:1-6:36 (2024) - [j26]Cody Lewis, Vijay Varadharajan, Nasimul Noman, Udaya Kiran Tupakula:
Ensuring Fairness and Gradient Privacy in Personalized Heterogeneous Federated Learning. ACM Trans. Intell. Syst. Technol. 15(3): 56:1-56:30 (2024) - [c65]Cody Lewis, Vijay Varadharajan, Nasimul Noman, Udaya Kiran Tupakula, Nan Li:
Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization. ICDCS 2024: 833-845 - [c64]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Lin, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Ian Steneker, David Campbell, Brad Jokubaitis, Steven Basart, Stephen Fitz, Ponnurangam Kumaraguru, Kallol Krishna Karmakar, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use with Unlearning. ICML 2024 - [i5]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Zhenqi Zhao, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Liu, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Russell Kaplan, Ian Steneker, David Campbell, Brad Jokubaitis, Alex Levinson, Jean Wang, William Qian, Kallol Krishna Karmakar, Steven Basart, Stephen Fitz, Mindy Levine, Ponnurangam Kumaraguru, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning. CoRR abs/2403.03218 (2024) - 2023
- [j25]Kallol Krishna Karmakar, Vijay Varadharajan, Michael Hitchens, Uday Kiran Tupakula, Prajna Sariputra:
A trust-aware openflow switching framework for software defined networks (SDN). Comput. Networks 237: 110109 (2023) - 2022
- [j24]Vijay Varadharajan, Kallol Krishna Karmakar, Uday Kiran Tupakula, Michael Hitchens:
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures. IEEE Trans. Netw. Serv. Manag. 19(2): 1065-1082 (2022) - [c63]Uday Kiran Tupakula, Kallol Krishna Karmakar, Vijay Varadharajan, Ben Collins:
Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN. NoF 2022: 1-5 - 2021
- [j23]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
SDN-Enabled Secure IoT Architecture. IEEE Internet Things J. 8(8): 6549-6564 (2021) - [c62]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services. NetSoft 2021: 273-277 - [c61]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Securing 5G Network Services from attacks. TrustCom 2021: 273-280 - [c60]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Techniques for Securing Control Systems from Attacks. TrustCom 2021: 281-288 - 2020
- [j22]Preeti Mishra, Vijay Varadharajan, Emmanuel S. Pilli, Udaya Kiran Tupakula:
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment. IEEE Trans. Cloud Comput. 8(3): 957-971 (2020) - [j21]Vijay Varadharajan, Udaya Kiran Tupakula:
Counteracting Attacks From Malicious End Hosts in Software Defined Networks. IEEE Trans. Netw. Serv. Manag. 17(1): 160-174 (2020) - [c59]Kallol Krishna Karmakar, Vijay Varadharajan, Uday Kiran Tupakula, Surya Nepal, Chandra Thapa:
Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). NetSoft 2020: 257-261 - [c58]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Attack Detection on the Software Defined Networking Switches. NetSoft 2020: 262-266 - [c57]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure. NOMS 2020: 1-9 - [i4]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures. CoRR abs/2006.03205 (2020) - [i3]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services. CoRR abs/2006.15270 (2020) - [i2]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Software Enabled Security Architecture for Counteracting Attacks in Control Systems. CoRR abs/2006.15272 (2020)
2010 – 2019
- 2019
- [j20]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
Mitigating attacks in software defined networks. Clust. Comput. 22(4): 1143-1157 (2019) - [j19]Preeti Mishra, Vijay Varadharajan, Udaya Kiran Tupakula, Emmanuel S. Pilli:
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. IEEE Commun. Surv. Tutorials 21(1): 686-728 (2019) - [j18]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Analysis of Policy-Based Security Management System in Software-Defined Networks. IEEE Commun. Lett. 23(4): 612-615 (2019) - [j17]Udaya Kiran Tupakula, Vijay Varadharajan, Preeti Mishra:
Securing SDN controller and switches from attacks. Int. J. High Perform. Comput. Netw. 14(1): 77-91 (2019) - [j16]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
A Policy-Based Security Architecture for Software-Defined Networks. IEEE Trans. Inf. Forensics Secur. 14(4): 897-912 (2019) - [c56]Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance. AINA 2019: 1303-1315 - [c55]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
SDN Enabled Secure IoT Architecture. IM 2019: 581-585 - 2018
- [j15]Vijay Varadharajan, Udaya Kiran Tupakula, Kallol Krishna Karmakar:
Secure Monitoring of Patients With Wandering Behavior in Hospital Environments. IEEE Access 6: 11523-11533 (2018) - [j14]Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Services in Networked Cloud Infrastructures. IEEE Trans. Cloud Comput. 6(4): 1149-1163 (2018) - [c54]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks. GLOBECOM 2018: 1-6 - [i1]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
A Policy based Security Architecture for Software Defined Networks. CoRR abs/1806.02053 (2018) - 2017
- [j13]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j12]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud. J. Intell. Fuzzy Syst. 32(4): 2909-2921 (2017) - [j11]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 77: 18-47 (2017) - [j10]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience. IEEE Trans. Cloud Comput. 5(3): 375-389 (2017) - [c53]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
A trust model based energy detection for cognitive radio networks. ACSW 2017: 68:1-68:8 - [c52]Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey, Udaya Kiran Tupakula:
Autoencoder-based feature learning for cyber security applications. IJCNN 2017: 3854-3861 - [c51]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula:
Securing communication in multiple Autonomous System domains with Software Defined Networking. IM 2017: 195-203 - [c50]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
Mitigating attacks in Software Defined Network (SDN). SDS 2017: 112-117 - [c49]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks. TrustCom/BigDataSE/ICESS 2017: 1096-1102 - [c48]Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud. WISE (2) 2017: 550-561 - 2016
- [c47]Udaya Kiran Tupakula, Vijay Varadharajan:
Securing Big Data Environments from Attacks. BigDataSecurity/HPSC/IDS 2016: 109-112 - [c46]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for Software Defined Networks. HPCC/SmartCity/DSS 2016: 671-678 - [c45]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment. HPCC/SmartCity/DSS 2016: 991-998 - [c44]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment. ICACCI 2016: 56-62 - [c43]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks. LCN 2016: 519-522 - [c42]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Policy based security architecture for software defined networks. SAC 2016: 658-663 - [c41]Dilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security for Services Hosted in Virtual Environments. Trustcom/BigDataSE/ISPA 2016: 82-89 - 2015
- [j9]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. Comput. J. 58(10): 2388-2403 (2015) - [j8]Vijay Varadharajan, Udaya Kiran Tupakula:
Securing wireless mobile nodes from distributed denial-of-service attacks. Concurr. Comput. Pract. Exp. 27(15): 3794-3815 (2015) - [c40]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
An Enhanced Model for Network Flow Based Botnet Detection. ACSC 2015: 101-110 - [c39]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture to Protect Web Applications. AISC 2015: 15-24 - [c38]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
Botnet detection using software defined networking. ICT 2015: 219-224 - [c37]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
Improved detection of primary user emulation attacks in cognitive radio networks. ITNAC 2015: 274-279 - 2014
- [j7]Vijay Varadharajan, Udaya Kiran Tupakula:
Counteracting security attacks in virtual machines in the cloud using property based attestation. J. Netw. Comput. Appl. 40: 31-45 (2014) - [j6]Byungho Min, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Antivirus security: naked during updates. Softw. Pract. Exp. 44(10): 1201-1222 (2014) - [j5]Vijay Varadharajan, Udaya Kiran Tupakula:
Security as a Service Model for Cloud Environment. IEEE Trans. Netw. Serv. Manag. 11(1): 60-75 (2014) - [c36]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture for Validating DNS Services (Poster). AISC 2014: 83-86 - [c35]Udaya Kiran Tupakula, Vijay Varadharajan:
Techniques for detecting attacks on critical infrastructure. ICNC 2014: 48-52 - [c34]Udaya Kiran Tupakula, Vijay Varadharajan:
Secure monitoring for dementia patients. SAC 2014: 14-19 - [c33]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Cloud Security for Healthcare Services. TrustCom 2014: 344-351 - 2013
- [c32]Alan Lee, Vijay Varadharajan, Udaya Kiran Tupakula:
On Malware Characterization and Attack Classification. AWC 2013: 43-48 - [c31]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Security of Tenant Transactions in the Cloud. CloudCom (1) 2013: 525-530 - [c30]Udaya Kiran Tupakula, Vijay Varadharajan:
Securing Mobile Devices from DoS Attacks. CSE 2013: 34-41 - [c29]Udaya Kiran Tupakula, Vijay Varadharajan:
Security Techniques for Counteracting Attacks in Mobile Healthcare Services. EUSPN/ICTH 2013: 374-381 - [c28]Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security Architecture for Virtual Machines. SecureComm 2013: 140-153 - [c27]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security Architecture for Detecting Insider Threats. TrustCom/ISPA/IUCC 2013: 552-559 - 2012
- [j4]Udaya Kiran Tupakula, Vijay Varadharajan:
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. Comput. J. 55(4): 397-409 (2012) - [c26]Udaya Kiran Tupakula, Vijay Varadharajan, Dipankar Dutta:
Intrusion detection techniques for virtual domains. HiPC 2012: 1-9 - [c25]Udaya Kiran Tupakula, Vijay Varadharajan:
Distributed service control technique for detecting security attacks. NOMS 2012: 574-577 - [c24]Vijay Varadharajan, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. TrustCom 2012: 145-152 - 2011
- [c23]Caglar Ulucenk, Vijay Varadharajan, Venkatesan Balakrishnan, Udaya Kiran Tupakula:
Techniques for Analysing PDF Malware. APSEC 2011: 41-48 - [c22]Udaya Kiran Tupakula, Vijay Varadharajan, Naveen Akku:
Intrusion Detection Techniques for Infrastructure as a Service Cloud. DASC 2011: 744-751 - [c21]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Security Techniques for Beyond 3G Wireless Mobile Networks. EUC 2011: 136-143 - [c20]Udaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat:
Security Architecture for Virtual Machines. ICA3PP (1) 2011: 218-229 - [c19]Udaya Kiran Tupakula, Vijay Varadharajan:
On the design of Virtual machine Intrusion detection system. Integrated Network Management 2011: 682-685 - [c18]Udaya Kiran Tupakula, Vijay Varadharajan:
Security techniques for zero day attacks. IWCMC 2011: 442-447 - [c17]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Counteracting DDoS attacks in WLAN. SIN 2011: 119-126 - [c16]Udaya Kiran Tupakula, Vijay Varadharajan:
TVLAN: Trusted and Virtualised Local Area Networks. TrustCom 2011: 606-612 - [c15]Udaya Kiran Tupakula, Vijay Varadharajan:
TVDSEC: Trusted Virtual Domain Security. UCC 2011: 57-64 - 2010
- [c14]Udaya Kiran Tupakula, Vijay Varadharajan:
Detecting Security Attacks in Trusted Virtual Domains. EUC 2010: 529-535
2000 – 2009
- 2009
- [c13]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
SBAC: Service Based Access Control. ICECCS 2009: 202-209 - [c12]Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni:
DoSTRACK: a system for defending against DoS attacks. SAC 2009: 47-53 - [p1]Venkat Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Trust Management in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 473-502 - [e1]Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5 [contents] - 2008
- [j3]Udaya Kiran Tupakula, Vijay Varadharajan:
A hybrid model against TCP. SYN and reflection DDoS attacks. Comput. Syst. Sci. Eng. 23(3) (2008) - [c11]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Subjective logic based trust model for mobile ad hoc networks. SecureComm 2008: 30 - 2007
- [j2]Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao:
DDoS: design, implementation and analysis of automated model. Int. J. Wirel. Mob. Comput. 2(1): 72-85 (2007) - [c10]Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula:
Trust Enhanced Secure Mobile Ad-Hoc Network Routing. AINA Workshops (2) 2007: 27-33 - [c9]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs:
Trust and Recommendations in Mobile Ad hoc Networks. ICNS 2007: 64 - [c8]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs:
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. ICON 2007: 182-187 - [c7]Venkat Balakrishnan, Vijay Varadharajan, Uday Kiran Tupakula, Phillip Lucs:
Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks. ISWCS 2007: 592-596 - 2006
- [c6]Udaya Kiran Tupakula, Vijay Varadharajan:
Analysis of traceback techniques. ACSW 2006: 115-124 - [c5]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. NOMS 2006 - 2004
- [j1]Udaya Kiran Tupakula, Vijay Varadharajan:
Tracing DoS Floods: An Automated Approach. J. Netw. Syst. Manag. 12(1): 111-135 (2004) - [c4]Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam:
Counteracting TCP SYN DDoS attacks using automated model. GLOBECOM 2004: 2240-2244 - 2003
- [c3]Udaya Kiran Tupakula, Vijay Varadharajan:
A Practical Method to Counteract Denial of Service Attacks. ACSC 2003: 275-284 - [c2]Udaya Kiran Tupakula, Vijay Varadharajan:
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. ICON 2003: 455-460 - [c1]Udaya Kiran Tupakula, Vijay Varadharajan:
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003: 113-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint