default search action
Robert Lagerström
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Fredrik Heiding, Emre Süren, Johannes Olegård, Robert Lagerström:
Penetration testing of connected households. Comput. Secur. 126: 103067 (2023) - [j31]Wojciech Widel, Simon Hacks, Mathias Ekstedt, Pontus Johnson, Robert Lagerström:
The meta attack language - a formal description. Comput. Secur. 130: 103284 (2023) - [j30]Fredrik Heiding, Sotirios Katsikeas, Robert Lagerström:
Research communities in cyber security vulnerability assessments: A comprehensive literature review. Comput. Sci. Rev. 48: 100551 (2023) - [j29]Emre Süren, Fredrik Heiding, Johannes Olegård, Robert Lagerström:
PatrIoT: practical and agile threat research for IoT. Int. J. Inf. Sec. 22(1): 213-233 (2023) - [j28]Mathias Ekstedt, Zeeshan Afzal, Preetam Mukherjee, Simon Hacks, Robert Lagerström:
Yet another cybersecurity risk assessment framework. Int. J. Inf. Sec. 22(6): 1713-1729 (2023) - [j27]Viktor Engström, Pontus Johnson, Robert Lagerström, Erik Ringdahl, Max Wällstedt:
Automated Security Assessments of Amazon Web Services Environments. ACM Trans. Priv. Secur. 26(2): 20:1-20:31 (2023) - 2022
- [j26]Viktor Engström, Robert Lagerström:
Two decades of cyberattack simulations: A systematic literature review. Comput. Secur. 116: 102681 (2022) - [j25]Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström:
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures. Comput. Secur. 117: 102705 (2022) - [j24]Ali Mohamed, Franz Wang, Ismail Butun, Junaid Qadir, Robert Lagerström, Paolo Gastaldo, Daniele D. Caviglia:
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks. Sensors 22(9): 3498 (2022) - [j23]Wenjun Xiong, Emeline Legrand, Oscar Åberg, Robert Lagerström:
Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix. Softw. Syst. Model. 21(1): 157-177 (2022) - [c74]Engla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård:
Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. ARES 2022: 74:1-74:7 - 2021
- [j22]Wenjun Xiong, Simon Hacks, Robert Lagerström:
A Method for Assigning Probability Distributions in Attack Simulation Languages. Complex Syst. Informatics Model. Q. 26: 55-77 (2021) - [j21]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research communities in cyber security: A comprehensive literature review. Comput. Sci. Rev. 42: 100431 (2021) - [j20]Robert Lagerström, Georg Grossmann, Selmin Nurcan:
Preface to the EDOC 2017/2018 Special Issue. Inf. Syst. 101: 101802 (2021) - [c73]Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou:
Integrating Security Behavior into Attack Simulations. ARES 2021: 120:1-120:13 - [c72]Philip Wester, Fredrik Heiding, Robert Lagerström:
Anomaly-based Intrusion Detection using Tree Augmented Naive Bayes. EDOC Workshops 2021: 112-121 - [c71]Mattias Grenfeldt, Asta Olofsson, Viktor Engström, Robert Lagerström:
Attacking Websites Using HTTP Request Smuggling: Empirical Testing of Servers and Proxies. EDOC 2021: 173-181 - [c70]Simon Hacks, Robert Lagerström, Daniel Ritter:
Towards Automated Attack Simulations of BPMN-based Processes. EDOC 2021: 182-191 - [c69]Joakim Loxdal, Måns I. Andersson, Simon Hacks, Robert Lagerström:
Why Phishing Works on Smartphones: A Preliminary Study. HICSS 2021: 1-10 - [c68]Wenjun Xiong, Simon Hacks, Robert Lagerström:
A Method for Quality Assessment of Threat Modeling Languages: The Case of enterpriseLang. PoEM (Forum) 2021: 49-58 - [i2]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research Communities in cyber security: A Comprehensive Literature Review. CoRR abs/2104.13196 (2021) - [i1]Simon Hacks, Robert Lagerström, Daniel Ritter:
Towards Automated Attack Simulations of BPMN-based Processes. CoRR abs/2106.08568 (2021) - 2020
- [j19]Margus Välja, Fredrik Heiding, Ulrik Franke, Robert Lagerström:
Automating threat modeling using an ontology framework. Cybersecur. 3(1): 19 (2020) - [j18]Simon Hacks, Sotirios Katsikeas, Engla Ling, Robert Lagerström, Mathias Ekstedt:
powerLang: a probabilistic attack simulation language for the power domain. Energy Inform. 3(1) (2020) - [c67]Benyamin Shafabakhsh, Robert Lagerström, Simon Hacks:
Evaluating the Impact of Inter Process Communication in Microservice Architectures. QuASoQ@APSEC 2020: 55-63 - [c66]Engla Ling, Robert Lagerström, Mathias Ekstedt:
A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain. CRITIS 2020: 47-58 - [c65]Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - [c64]Robert Lagerström, Wenjun Xiong, Mathias Ekstedt:
Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative Study. ICISSP 2020: 369-376 - [c63]Fredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström:
Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study. ICISSP 2020: 424-431 - [c62]Samuel Andrén, Erik Lindström, Alice Hugosson, Sofia Rönnqvist, Robert Lagerström, Simon Hacks:
Assessing Alignment Between Business and IT Strategy: A Case Study. PoEM (Forum) 2020: 1-12 - [c61]Fredrik Heiding, Robert Lagerström:
Ethical Principles for Designing Responsible Offensive Cyber Security Training. Privacy and Identity Management 2020: 21-39 - [c60]Soren Kavosi, Simon Hacks, Robert Lagerström:
Divergence Between Conceptual Business Process Management and its Practical Business Improvement Implementation: A Comparative Study. CBI (2) 2020: 65-70
2010 – 2019
- 2019
- [j17]Wenjun Xiong, Robert Lagerström:
Threat modeling - A systematic literature review. Comput. Secur. 84: 53-69 (2019) - [j16]Robert Lagerström, Alan MacCormack, David Dreyfus, Carliss Y. Baldwin:
A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability. Complex Syst. Informatics Model. Q. 19: 75-98 (2019) - [j15]Margus Välja, Robert Lagerström, Ulrik Franke, Göran Ericsson:
A Framework for Automatic IT Architecture Modeling: Applying Truth Discovery. Complex Syst. Informatics Model. Q. 20: 20-56 (2019) - [c59]Wenjun Xiong, Robert Lagerström:
Threat Modeling of Connected Vehicles: A privacy analysis and extension of vehicleLang. CyberSA 2019: 1-7 - [c58]Simon Hacks, Alexander Hacks, Sotirios Katsikeas, Benedikt Klaer, Robert Lagerström:
Creating Meta Attack Language Instances using ArchiMate: Applied to Electric Power and Energy System Cases. EDOC 2019: 88-97 - [c57]Wenjun Xiong, Per Carlsson, Robert Lagerström:
Re-using Enterprise Architecture Repositories for Agile Threat Modeling. EDOC Workshops 2019: 118-127 - [c56]Xinyue Mao, Mathias Ekstedt, Engla Ling, Erik Ringdahl, Robert Lagerström:
Conceptual Abstraction of Attack Graphs - A Use Case of securiCAD. GraMSec@CSF 2019: 186-202 - [c55]Daniel Elsner, Pouya Aleatrati Khosroshahi, Alan D. MacCormack, Robert Lagerström:
Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications. HICSS 2019: 1-10 - [c54]Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström:
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language. ICISSP 2019: 175-182 - [c53]Wenjun Xiong, Fredrik Krantz, Robert Lagerström:
Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept. ICISSP (Revised Selected Papers) 2019: 272-287 - [c52]Wenjun Xiong, Fredrik Krantz, Robert Lagerström:
Threat Modeling and Attack Simulations of Connected Vehicles: A Research Outlook. ICISSP 2019: 479-486 - [c51]Wenjun Xiong, Melek Gülsever, Koray Mustafa Kaya, Robert Lagerström:
A Study of Security Vulnerabilities and Software Weaknesses in Vehicles. NordSec 2019: 204-218 - 2018
- [j14]Alexandre Vernotte, Margus Välja, Matus Korman, Gunnar Björkman, Mathias Ekstedt, Robert Lagerström:
Load balancing of renewable energy: a cyber security analysis. Energy Inform. 1(1) (2018) - [j13]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - [c50]Pontus Johnson, Robert Lagerström, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. ARES 2018: 38:1-38:8 - [c49]Mert Canat, Nuria Pol Catala, Alexander Jourkovski, Svetlomir Petrov, Martin Wellme, Robert Lagerström:
Enterprise Architecture and Agile Development: Friends or Foes? EDOC Workshops 2018: 176-183 - 2017
- [j12]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [c48]Margus Välja, Matus Korman, Robert Lagerström:
A Study on Software Vulnerabilities and Weaknesses of Embedded Systems in Power Networks. SPSR-SG@CPSWeek 2017: 47-52 - [c47]Matus Korman, Margus Välja, Gunnar Björkman, Mathias Ekstedt, Alexandre Vernotte, Robert Lagerström:
Analyzing the Effectiveness of Attack Countermeasures in a SCADA System. SPSR-SG@CPSWeek 2017: 73-78 - [c46]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. EDOC Workshops 2017: 65-70 - [c45]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - [c44]Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, Lee Doolan:
Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities. ESSoS 2017: 53-69 - [c43]Sérgio Guerreiro, Wided Guédria, Robert Lagerström, Steven J. H. van Kervel:
A Meta Model for Interoperability of Secure Business Transactions - Using BlockChain and DEMO. KEOD 2017: 253-260 - [c42]Oscar Bjuhr, Klas Segeljakt, Mattin Addibpour, Franz Heiser, Robert Lagerström:
Software Architecture Decoupling at Ericsson. ICSA Workshops 2017: 259-262 - [e1]Sylvain Hallé, Roger Villemaire, Robert Lagerström:
21st IEEE International Enterprise Distributed Object Computing Conference, EDOC 2017, Quebec City, QC, Canada, October 10-13, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-3045-3 [contents] - 2016
- [j11]Pontus Johnson, Dan Gorton, Robert Lagerström, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. Comput. Secur. 62: 278-295 (2016) - [j10]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation. Complex Syst. Informatics Model. Q. 7: 1-24 (2016) - [c41]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c40]Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach. EDOC Workshops 2016: 1-8 - [c39]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c38]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - 2015
- [c37]Franz Heiser, Robert Lagerström, Mattin Addibpour:
Revealing Hidden Structures in Organizational Transformation - A Case Study. CAiSE Workshops 2015: 327-338 - [c36]Margus Välja, Robert Lagerström, Mathias Ekstedt, Matus Korman:
A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources. EDOC Workshops 2015: 79-87 - [c35]Mathias Ekstedt, Pontus Johnson, Robert Lagerström, Dan Gorton, Joakim Nydren, Khurram Shahzad:
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management. EDOC Workshops 2015: 152-155 - [c34]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Search-Based Design of Large Software Systems-of-Systems. SESoS@ICSE 2015: 44-47 - [c33]Matus Korman, Robert Lagerström, Mathias Ekstedt:
Modeling Authorization in Enterprise-wide Contexts. PoEM (Short Papers) 2015: 81-90 - 2014
- [j9]Liv Gingnell, Ulrik Franke, Robert Lagerström, Evelina Ericsson, Joakim Lilliesköld:
Quantifying Success Factors for IT Projects - An Expert-Based Bayesian Model. Inf. Syst. Manag. 31(1): 21-36 (2014) - [j8]Hannes Holm, Markus Buschle, Robert Lagerström, Mathias Ekstedt:
Automatic data collection for enterprise architecture models. Softw. Syst. Model. 13(2): 825-841 (2014) - [c32]Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Stephan Aier:
Visualizing and Measuring Enterprise Application Architecture: An Exploratory Telecom Case. HICSS 2014: 3847-3856 - [c31]Robert Lagerström, Mathias Ekstedt:
Extending a general theory of software to engineering. GTSE 2014: 36-39 - 2013
- [j7]Robert Lagerström, Ulf Sporrong, Anders Wall:
Increasing software development efficiency and maintainability for complex industrial systems - A case study. J. Softw. Evol. Process. 25(3): 285-301 (2013) - [c30]Magnus Österlind, Pontus Johnson, Kiran Karnati, Robert Lagerström, Margus Välja:
Enterprise Architecture Evaluation Using Utility Theory. EDOC Workshops 2013: 347-351 - [c29]Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, David Dreyfus:
Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case. PoEM 2013: 9-23 - [c28]Alexander Hjalmarsson, Matus Korman, Robert Lagerström:
Software Migration Project Cost Estimation using COCOMO II and Enterprise Architecture Modeling. PoEM (Short Papers) 2013: 39-48 - 2012
- [j6]Robert Lagerström, Liv Marcks von Würtemberg, Hannes Holm, Oscar Luczak:
Identifying factors affecting software development cost and productivity. Softw. Qual. J. 20(2): 395-417 (2012) - [c27]Magnus Österlind, Robert Lagerström, Peter Rosell:
Assessing Modifiability in Application Services Using Enterprise Architecture Models - A Case Study. TEAR/PRET 2012: 162-181 - 2011
- [c26]Robert Lagerström, Teodor Sommestad, Markus Buschle, Mathias Ekstedt:
Enterprise Architecture Management's Impact on Information Technology Success. HICSS 2011: 1-10 - [c25]Jan Saat, Robert Winter, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions. HICSS 2011: 1-9 - 2010
- [j5]Robert Lagerström, Pontus Johnson, David Höök:
Architecture analysis of enterprise systems modifiability - Models, analysis, and validation. J. Syst. Softw. 83(8): 1387-1403 (2010) - [j4]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation. Softw. Qual. J. 18(4): 437-468 (2010) - [c24]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis Using the PRM Formalism. CAiSE Forum (Selected Papers) 2010: 108-121 - [c23]Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, Teodor Sommestad:
A Tool for Enterprise Architecture Analysis using the PRM formalism. CAiSE Forum 2010 - [c22]Jan Saat, Ulrik Franke, Robert Lagerström, Mathias Ekstedt:
Enterprise Architecture Meta Models for IT/Business Alignment Situations. EDOC 2010: 14-23 - [c21]Johan König, Kun Zhu, Lars Nordström, Mathias Ekstedt, Robert Lagerström:
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate. EDOCW 2010: 60-68 - [c20]Ulrik Franke, Mathias Ekstedt, Robert Lagerström, Jan Saat, Robert Winter:
Trends in Enterprise Architecture Practice - A Survey. TEAR 2010: 16-29
2000 – 2009
- 2009
- [j3]Robert Lagerström, Ulrik Franke, Pontus Johnson, Johan Ullberg:
A method for creating entreprise architecture metamodels applied to systems modifiability. Int. J. Comput. Sci. Appl. 6(5): 89-120 (2009) - [c19]Robert Lagerström, Jan Saat, Ulrik Franke, Stephan Aier, Mathias Ekstedt:
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach. BMMDS/EMMSAD 2009: 381-393 - [c18]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c17]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c16]Ulrik Franke, Johan Ullberg, Teodor Sommestad, Robert Lagerström, Pontus Johnson:
Decision support oriented Enterprise Architecture metamodel management using classification trees. EDOCW 2009: 328-335 - [c15]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c14]Robert Lagerström, Pontus Johnson, David Höök:
An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis. Software Engineering (Workshops) 2009: 43-54 - [c13]Ulrik Franke, David Höök, Johan König, Robert Lagerström, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt:
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks. SNPD 2009: 327-332 - 2008
- [c12]Mårten Simonsson, Robert Lagerström, Pontus Johnson:
A Bayesian network for IT governance performance prediction. ICEC 2008: 1:1-1:8 - [c11]Johan Ullberg, Robert Lagerström, Pontus Johnson:
A Framework for Service Interoperability Analysis using Enterprise Architecture Models. IEEE SCC (2) 2008: 99-107 - [c10]Robert Lagerström, Moustafa Chenine, Pontus Johnson, Ulrik Franke:
Probabilistic Metamodel Merging. CAiSE Forum 2008: 25-28 - [c9]Robert Lagerström, Pontus Johnson:
Using Architectural Models to Predict the Maintainability of Enterprise Systems. CSMR 2008: 248-252 - [c8]Johan Ullberg, Robert Lagerström, Mathias Ekstedt:
A framework for interoperability analysis on the semantic web using architecture models. EDOCW 2008: 207-215 - [c7]Johan Ullberg, Robert Lagerström, Pontus Johnson:
Enterprise Architecture: A Service Interoperability Analysis Framework. IESA 2008: 611-623 - [c6]Mårten Simonsson, Robert Lagerström, Pontus Johnson:
The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction. MSVVEIS 2008: 170-179 - [c5]Per Närman, Pontus Johnson, Robert Lagerström, Ulrik Franke, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42 - 2007
- [j2]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Enterprise architecture analysis with extended influence diagrams. Inf. Syst. Frontiers 9(2-3): 163-180 (2007) - [j1]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Extended Influence Diagrams for System Quality Analysis. J. Softw. 2(3): 30-42 (2007) - [c4]Robert Lagerström, Jonas Ohrstrom:
A Framework for Assessing Business Value of Service Oriented Architectures. IEEE SCC 2007: 670-671 - [c3]Robert Lagerström, Pontus Johnson, Per Närman:
Extended Influence Diagram Generation. IESA 2007: 599-602 - 2006
- [c2]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Extended Influence Diagrams for Enterprise Architecture Analysis. EDOC 2006: 3-12 - [c1]Pontus Johnson, Lars Nordström, Robert Lagerström:
Formalizing Analysis of Enterprise Architecture. I-ESA 2006: 35-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint