default search action
Mark Scanlon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Lojenaa Navanesan, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara:
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics. Forensic Sci. Int. Digit. Investig. 48: 301684 (2024) - [j31]Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon:
DFRWS EU 10-year review and future directions in Digital Forensic Research. Forensic Sci. Int. Digit. Investig. 48: 301685 (2024) - [j30]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
A comprehensive evaluation on the benefits of context based password cracking for digital forensics. J. Inf. Secur. Appl. 84: 103809 (2024) - [c29]Akila Wickramasekara, Mark Scanlon:
A Framework for Integrated Digital Forensic Investigation Employing AutoGen AI Agents. ISDFS 2024: 1-6 - [c28]Muhammad Rusyaidi Zunaidi, Asanka P. Sayakkara, Mark Scanlon:
A Digital Forensic Methodology for Encryption Key Recovery from Black-Box IoT Devices. ISDFS 2024: 1-7 - [i42]Muhammad Rusyaidi Zunaidi, Asanka P. Sayakkara, Mark Scanlon:
Systematic Literature Review of EM-SCA Attacks on Encryption. CoRR abs/2402.10030 (2024) - [i41]Opeyemi Bamigbade, John Sheppard, Mark Scanlon:
Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review. CoRR abs/2402.15448 (2024) - [i40]Akila Wickramasekara, Frank Breitinger, Mark Scanlon:
SoK: Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency. CoRR abs/2402.19366 (2024) - 2023
- [j29]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301507 (2023) - [j28]Mark Scanlon, Bruce J. Nikkel, Zeno J. M. H. Geradts:
Digital forensic investigation in the age of ChatGPT. Forensic Sci. Int. Digit. Investig. 44: 301543 (2023) - [j27]Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard:
ChatGPT for digital forensic investigation: The good, the bad, and the unknown. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301609 (2023) - [c27]Syed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard:
An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments. UEMCON 2023: 275-282 - [i39]Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard:
ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown. CoRR abs/2307.10195 (2023) - [i38]Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon:
DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research. CoRR abs/2312.11292 (2023) - [i37]Lojenaa Navanesan, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara:
Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis. CoRR abs/2312.11301 (2023) - 2022
- [j26]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking. IEEE Access 10: 59178-59188 (2022) - [j25]Syed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard:
Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions. IEEE Access 10: 110362-110384 (2022) - [c26]Syed Rizvi, Mark Scanlon, Jimmy McGibney, John Sheppard:
Deep Learning Based Network Intrusion Detection System for Resource-Constrained Environments. ICDF2C 2022: 355-367 - 2021
- [j24]Felix Anda, Edward Dixon, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Vec2UAge: Enhancing underage age estimation performance through facial embeddings. Digit. Investig. 36 Supplement: 301119 (2021) - [j23]Joachim Sester, Darren R. Hayes, Mark Scanlon, Nhien-An Le-Khac:
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis. Digit. Investig. 36 Supplement: 301121 (2021) - [j22]Aikaterini Kanta, Sein Coray, Iwen Coisel, Mark Scanlon:
How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts. Digit. Investig. 37 Supplement: 301186 (2021) - [j21]Quan Le, Luis Miralles-Pechuán, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis. Digit. Investig. 39: 301308 (2021) - [c25]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality. ICDF2C 2021: 159-175 - 2020
- [j20]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis. Digit. Investig. 32 Supplement: 300907 (2020) - [j19]Felix Anda, Nhien-An Le-Khac, Mark Scanlon:
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation. Digit. Investig. 32 Supplement: 300921 (2020) - [j18]Asanka P. Sayakkara, Luis Miralles-Pechuán, Nhien-An Le-Khac, Mark Scanlon:
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection. Digit. Investig. 32 Supplement: 300927 (2020) - [j17]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework. Digit. Investig. 33 Supplement: 301003 (2020) - [j16]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
A survey exploring open source Intelligence for smarter password cracking. Digit. Investig. 35: 301075 (2020) - [c24]Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. ARES 2020: 46:1-46:10 - [c23]Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. Cyber Security 2020: 1-8 - [c22]Xiaoyu Du, Quan Le, Mark Scanlon:
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. Cyber Security 2020: 1-8 - [c21]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. Cyber Security 2020: 1-2 - [c20]Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac:
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. ICDF2C 2020: 231-236 - [i36]Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac:
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. CoRR abs/2012.01107 (2020) - [i35]Aikaterini Kanta, Iwen Coisel, Mark Scanlon:
Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT. CoRR abs/2012.01159 (2020) - [i34]Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. CoRR abs/2012.01179 (2020) - [i33]Xiaoyu Du, Quan Le, Mark Scanlon:
Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events. CoRR abs/2012.01972 (2020) - [i32]Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation. CoRR abs/2012.01987 (2020)
2010 – 2019
- 2019
- [j15]Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac:
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. Digit. Investig. 28 Supplement: S105-S115 (2019) - [j14]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving the accuracy of automated facial age estimation to aid CSEM investigations. Digit. Investig. 28 Supplement: S142 (2019) - [j13]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 29: 43-54 (2019) - [j12]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. Digit. Investig. 29 Supplement: S94-S103 (2019) - [c19]Xiaoyu Du, Mark Scanlon:
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts. ARES 2019: 43:1-43:8 - [c18]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. ARES 2019: 57:1-57:8 - [i31]Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac:
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. CoRR abs/1903.07053 (2019) - [i30]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics. CoRR abs/1903.07703 (2019) - [i29]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. CoRR abs/1904.02089 (2019) - [i28]Xiaoyu Du, Mark Scanlon:
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts. CoRR abs/1907.01421 (2019) - [i27]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. CoRR abs/1907.01427 (2019) - 2018
- [j11]Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon:
Deep learning at the shallow end: Malware classification for non-domain experts. Digit. Investig. 26 Supplement: S118-S126 (2018) - [j10]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. Digit. Investig. 26 Supplement: S77-S86 (2018) - [j9]David Lillis, Frank Breitinger, Mark Scanlon:
Hierarchical Bloom Filter Trees for Approximate Matching. J. Digit. Forensics Secur. Law 13(1): 81-96 (2018) - [c17]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. ARES 2018: 15:1-15:9 - [c16]John Vieyra, Mark Scanlon, Nhien-An Le-Khac:
Solid State Drive Forensics: Where Do We Stand? ICDF2C 2018: 149-164 - [c15]Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic. IFIP Int. Conf. Digital Forensics 2018: 183-197 - [c14]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis. ISSTA/ECOOP Workshops 2018: 138-143 - [c13]Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 129-139 - [c12]Xiaoyu Du, Paul Ledwith, Mark Scanlon:
Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction. TrustCom/BigDataSE 2018: 1674-1679 - [i26]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. CoRR abs/1807.08264 (2018) - [i25]Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon:
Deep learning at the shallow end: Malware classification for non-domain experts. CoRR abs/1807.08265 (2018) - 2017
- [j8]Mark Scanlon, Xiaoyu Du, David Lillis:
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution. Digit. Investig. 20 Supplement: S29-S36 (2017) - [j7]Elias Bou-Harb, Mark Scanlon:
Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections. Digit. Investig. 20 Supplement: S47-S55 (2017) - [c11]David Lillis, Frank Breitinger, Mark Scanlon:
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees. ICDF2C 2017: 144-157 - [c10]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data Within Digital Evidence. TrustCom/BigDataSE/ICESS 2017: 737-744 - [i24]Mark Scanlon, Xiaoyu Du, David Lillis:
EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution. CoRR abs/1704.08990 (2017) - [i23]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data within Digital Evidence. CoRR abs/1708.01728 (2017) - [i22]Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon:
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. CoRR abs/1708.01730 (2017) - [i21]Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon:
Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification. CoRR abs/1708.01731 (2017) - [i20]Alan Reed, Mark Scanlon, Nhien-An Le-Khac:
Forensic Analysis of Epic Privacy Browser on Windows Operating Systems. CoRR abs/1708.01732 (2017) - [i19]Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M. Tahar Kechadi:
Increasing digital investigator availability through efficient workflow management and automation. CoRR abs/1708.09053 (2017) - [i18]Mark Scanlon:
Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification. CoRR abs/1712.02529 (2017) - [i17]Mark Scanlon:
Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies. CoRR abs/1712.03455 (2017) - [i16]David Lillis, Frank Breitinger, Mark Scanlon:
Hierarchical Bloom Filter Trees for Approximate Matching. CoRR abs/1712.04544 (2017) - [i15]Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic. CoRR abs/1712.05727 (2017) - 2016
- [j6]Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon:
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists. Digit. Investig. 16 Supplement: S75-S85 (2016) - [c9]Elias Bou-Harb, Mark Scanlon, Claude Fachkha:
Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections. NTMS 2016: 1-5 - [c8]Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. NTMS 2016: 1-5 - [i14]Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon:
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists. CoRR abs/1604.03844 (2016) - [i13]David Lillis, Brett A. Becker, Tadhg O'Sullivan, Mark Scanlon:
Current Challenges and Future Research Areas for Digital Forensic Investigation. CoRR abs/1604.03850 (2016) - [i12]Mark Scanlon:
Battling the Digital Forensic Backlog through Data Deduplication. CoRR abs/1610.00248 (2016) - [i11]Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon:
Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit. CoRR abs/1610.05462 (2016) - 2015
- [j5]Mark Scanlon, Jason Farina, M. Tahar Kechadi:
Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service. Comput. Secur. 54: 27-43 (2015) - [j4]Jason Farina, M. Tahar Kechadi, Mark Scanlon:
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser. J. Digit. Forensics Secur. Law 10(4): 115-124 (2015) - [c7]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps. ARES 2015: 249-257 - [c6]Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi:
Overview of the Forensic Investigation of Cloud Services. ARES 2015: 556-565 - [c5]Conor Quinn, Mark Scanlon, Jason Farina, M. Tahar Kechadi:
Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility. ICDF2C 2015: 85-99 - [i10]Mark Scanlon, Jason Farina, M. Tahar Kechadi:
Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service. CoRR abs/1506.01414 (2015) - [i9]Jason Farina, M. Tahar Kechadi, Mark Scanlon:
Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser. CoRR abs/1510.00651 (2015) - [i8]Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, M. Tahar Kechadi:
HTML5 Zero Configuration Covert Channels: Security Risks and Challenges. CoRR abs/1510.00661 (2015) - [i7]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. CoRR abs/1510.00664 (2015) - 2014
- [j3]Jason Farina, Mark Scanlon, M. Tahar Kechadi:
BitTorrent Sync: First Impressions and Digital Forensic Implications. Digit. Investig. 11(Supplement 1): S77-S86 (2014) - [j2]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync. J. Digit. Forensics Secur. Law 9(2): 85-100 (2014) - [c4]Mark Scanlon, Jason Farina, M. Tahar Kechadi:
BitTorrent Sync: Network Investigation Methodology. ARES 2014: 21-29 - [c3]Mark Scanlon, Huijie Shen:
An analysis of BitTorrent cross-swarm peer participation and geolocational distribution. ICCCN 2014: 1-6 - [i6]Mark Scanlon, Huijie Shen:
An Analysis of BitTorrent Cross-Swarm Peer Participation and Geolocational Distribution. CoRR abs/1409.8171 (2014) - [i5]Jason Farina, Mark Scanlon, M. Tahar Kechadi:
BitTorrent Sync: First Impressions and Digital Forensic Implications. CoRR abs/1409.8174 (2014) - [i4]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync. CoRR abs/1409.8486 (2014) - [i3]Mark Scanlon, Jason Farina, M. Tahar Kechadi:
BitTorrent Sync: Network Investigation Methodology. CoRR abs/1409.8489 (2014) - [i2]Mark Scanlon, M. Tahar Kechadi:
The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework. CoRR abs/1409.8490 (2014) - [i1]Mark Scanlon, M. Tahar Kechadi:
Digital Evidence Bag Selection for P2P Network Investigation. CoRR abs/1409.8493 (2014) - 2013
- [c2]Mark Scanlon, M. Tahar Kechadi:
Universal Peer-to-Peer Network Investigation Framework. ARES 2013: 694-700 - 2011
- [j1]Mark Scanlon, Alan Hannaway, M. Tahar Kechadi:
Investigating Cybercrimes that Occur on Documented P2P Networks. Int. J. Ambient Comput. Intell. 3(2): 56-63 (2011)
2000 – 2009
- 2009
- [c1]Mark Scanlon, Mohand Tahar Kechadi:
Online Acquisition of Digital Forensic Evidence. ICDF2C 2009: 122-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint