default search action
Ljiljana Trajkovic
Person information
- affiliation: Simon Fraser University, Burnaby, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c79]Hardeep Kaur Takhar, Luiz Felipe Oliveira, Ljiljana Trajkovic:
Case Study: Understanding Internet Anomalies. ISCAS 2024: 1-5 - 2023
- [j26]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Machine Learning for Detecting the WestRock Ransomware Attack Using BGP Routing Records. IEEE Commun. Mag. 61(3): 20-26 (2023) - [c78]Tarun Sharma, Khushi Patni, Zhida Li, Ljiljana Trajkovic:
Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks. ISCAS 2023: 1-5 - [c77]Zhida Li, Ljiljana Trajkovic:
Enhancing Cyber Defense: Using Machine Learning Algorithms for Detection of Network Anomalies. SMC 2023: 1658-1663 - [c76]Hardeep Kaur Takhar, Ljiljana Trajkovic:
BGP Features and Classification of Internet Worms and Ransomware Attacks. SMC 2023: 1664-1669 - 2022
- [j25]Tianyang Zhang, Xi Chen, Bin Wu, Mehmet Dedeoglu, Junshan Zhang, Ljiljana Trajkovic:
Stochastic Modeling and Analysis of Public Electric Vehicle Fleet Charging Station Operations. IEEE Trans. Intell. Transp. Syst. 23(7): 9252-9265 (2022) - [c75]Hardeep Kaur Takhar, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Comparison of Virtual Network Embedding Algorithms for Data Center Networks. ISCAS 2022: 1660-1664 - [c74]Ljiljana Trajkovic:
Machine Learning for Detecting Internet Traffic Anomalies. SISY 2022: 15-16 - 2021
- [j24]Jianquan Lu, Daniel W. C. Ho, Tingwen Huang, Jürgen Kurths, Ljiljana Trajkovic:
IEEE Access Special Section Editorial: Recent Advances on Hybrid Complex Networks: Analysis and Control. IEEE Access 9: 95083-95086 (2021) - [j23]Yingxu Wang, Ming Hou, Konstantinos N. Plataniotis, Sam Kwong, Henry Leung, Edward W. Tunstel, Imre J. Rudas, Ljiljana Trajkovic:
Towards a theoretical framework of autonomous systems underpinned by intelligence and systems sciences. IEEE CAA J. Autom. Sinica 8(1): 52-63 (2021) - [j22]Sabu M. Thampi, El-Sayed M. El-Alfy, Ljiljana Trajkovic:
Soft computing and intelligent systems: Techniques and applications. J. Intell. Fuzzy Syst. 41(5): 5221-5234 (2021) - [j21]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Machine Learning for Detecting Anomalies and Intrusions in Communication Networks. IEEE J. Sel. Areas Commun. 39(7): 2254-2264 (2021) - [j20]Edward W. Tunstel, Manuel J. Cobo, Enrique Herrera-Viedma, Imre J. Rudas, Dimitar P. Filev, Ljiljana Trajkovic, C. L. Philip Chen, Witold Pedrycz, Michael H. Smith, Robert Kozma:
Systems Science and Engineering Research in the Context of Systems, Man, and Cybernetics: Recollection, Trends, and Future Directions. IEEE Trans. Syst. Man Cybern. Syst. 51(1): 5-21 (2021) - [c73]Ana Laura Gonzalez Rios, Kamila Bekshentayeva, Maheeppartap Singh, Soroush Haeri, Ljiljana Trajkovic:
Virtual Network Embedding for Switch-Centric Data Center Networks. ISCAS 2021: 1-5 - [c72]Harry Weber, Ljiljana Trajkovic, Wolfgang Mathis:
Finding DC Operating Points of Nonlinear Circuits Using Carleman Linearization. MWSCAS 2021: 1078-1081 - [c71]Ljiljana Trajkovic:
Data Mining and Machine Learning for Analysis of Network Traffic : PLENARY TALK. SISY 2021: 11-12 - [c70]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Classifying Denial of Service Attacks Using Fast Machine Learning Algorithms. SMC 2021: 1221-1226 - [c69]Kamila Bekshentayeva, Ljiljana Trajkovic:
Detection of Denial of Service Attacks Using Echo State Networks. SMC 2021: 1227-1232 - [d2]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Border Gateway Protocol (BGP) routing records from Route Views. IEEE DataPort, 2021 - [d1]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Border Gateway Protocol (BGP) routing records from Reseaux IP Europeens (RIPE) and BCNET. IEEE DataPort, 2021 - [i1]Yingxu Wang, Fakhri Karray, Sam Kwong, Konstantinos N. Plataniotis, Henry Leung, Ming Hou, Edward W. Tunstel, Imre J. Rudas, Ljiljana Trajkovic, Okyay Kaynak, Janusz Kacprzyk, Mengchu Zhou, Michael H. Smith, Philip Chen, Shushma Patel:
On the Philosophical, Cognitive and Mathematical Foundations of Symbiotic Autonomous Systems (SAS). CoRR abs/2102.07617 (2021) - 2020
- [j19]Sabu M. Thampi, El-Sayed M. El-Alfy, Ljiljana Trajkovic:
Soft computing and intelligent systems: techniques and applications. J. Intell. Fuzzy Syst. 38(5): 6187-6191 (2020) - [j18]Xinxin Wang, Zeshui Xu, Xunjie Gou, Ljiljana Trajkovic:
Tracking a Maneuvering Target by Multiple Sensors Using Extended Kalman Filter With Nested Probabilistic-Numerical Linguistic Information. IEEE Trans. Fuzzy Syst. 28(2): 346-360 (2020) - [j17]Xiang Li, Ljiljana Trajkovic:
Guest Editorial Introduction to the Special Section on Network of Cyber-Social Networks: Modeling, Analysis, and Control. IEEE Trans. Netw. Sci. Eng. 7(2): 686-687 (2020) - [j16]Francesco Sorrentino, Louis M. Pecora, Ljiljana Trajkovic:
Group Consensus in Multilayer Networks. IEEE Trans. Netw. Sci. Eng. 7(3): 2016-2026 (2020) - [c68]Ljiljana Trajkovic:
Complex Networks. IEEE ICCI*CC 2020: 1 - [c67]Ana Laura Gonzalez Rios, Zhida Li, Kamila Bekshentayeva, Ljiljana Trajkovic:
Detection of Denial of Service Attacks in Communication Networks. ISCAS 2020: 1-5 - [c66]Zhida Li, Ana Laura Gonzalez Rios, Ljiljana Trajkovic:
Detecting Internet Worms, Ransomware, and Blackouts Using Recurrent Neural Networks. SMC 2020: 2165-2172 - [c65]Yingxu Wang, Svetlana N. Yanushkevich, Ming Hou, Konstantinos N. Plataniotis, Mark Coates, Marina L. Gavrilova, Yaoping Hu, Fakhri Karray, Henry Leung, Arash Mohammadi, Sam Kwong, Edward W. Tunstel, Ljiljana Trajkovic, Imre J. Rudas, Janusz Kacprzyk:
A Tripartite Theory of Trustworthiness for Autonomous Systems. SMC 2020: 3375-3380
2010 – 2019
- 2019
- [c64]Zhida Li, Ana Laura Gonzalez Rios, Guangyu Xu, Ljiljana Trajkovic:
Machine Learning Techniques for Classifying Network Anomalies and Intrusions. ISCAS 2019: 1-5 - [c63]Ljiljana Trajkovic:
Complex Networks : Plenary Talk. SISY 2019: 11-12 - 2018
- [j15]Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra, Ljiljana Trajkovic:
Soft computing and intelligent systems: Techniques and applications. J. Intell. Fuzzy Syst. 34(3): 1237-1241 (2018) - [j14]Soroush Haeri, Ljiljana Trajkovic:
Virtual Network Embedding via Monte Carlo Tree Search. IEEE Trans. Cybern. 48(2): 510-521 (2018) - [c62]Michal Aibin, Krzysztof Walkowiak, Soroush Haeri, Ljiljana Trajkovic:
Traffic Prediction for Inter-Data Center Cross-Stratum Optimization Problems. ICNC 2018: 393-398 - [c61]Prerna Batta, Maninder Singh, Zhida Li, Qingye Ding, Ljiljana Trajkovic:
Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies. ISCAS 2018: 1-4 - [c60]Ljiljana Trajkovic:
You and Your Career. SISY 2018: 13-14 - [c59]Zhida Li, Prerna Batta, Ljiljana Trajkovic:
Comparison of Machine Learning Algorithms for Detection of Network Intrusions. SMC 2018: 4248-4253 - 2017
- [c58]Aitizaz Uddin Syed, Mohsin Iftikhar, Ljiljana Trajkovic:
Optimal PPDU Duration Algorithm for VHT MU-MIMO Systems. ICCCN 2017: 1-2 - [c57]Hanene Ben Yedder, Qingye Ding, Umme Zakia, Zhida Li, Soroush Haeri, Ljiljana Trajkovic:
Comparison of Virtualization Algorithms and Topologies for Data Center Networks. ICCCN 2017: 1-6 - [c56]Ljiljana D. Milic, Ljiljana Trajkovic:
Radoslav Horvat and Mirko Milić, founders of circuit theory in former Yugoslavia. ICECS 2017: 465-468 - [c55]Hanene Ben Yedder, Umme Zakia, Aly Ahmed, Ljiljana Trajkovic:
Modeling prediction in recommender systems using restricted boltzmann machine. SMC 2017: 2063-2068 - 2016
- [c54]George Chang, Majid Arianezhad, Ljiljana Trajkovic:
Using resource public key infrastructure for secure border gateway protocol. CCECE 2016: 1-6 - [c53]Marijana Cosovic, Slobodan Obradovio, Ljiljana Trajkovic:
Classifying anomalous events in BGP datasets. CCECE 2016: 1-4 - [c52]Soroush Haeri, Qingye Ding, Zhida Li, Ljiljana Trajkovic:
Global resource capacity algorithm with path splitting for virtual network embedding. ISCAS 2016: 666-669 - [c51]Soroush Haeri, Ljiljana Trajkovic:
Virtual network embeddings in data center networks. ISCAS 2016: 874-877 - [c50]Soroush Haeri, Ljiljana Trajkovic:
VNE-Sim: A Virtual Network Embedding Simulator. SimuTools 2016: 112-117 - [c49]Qingye Ding, Zhida Li, Prerna Batta, Ljiljana Trajkovic:
Detecting BGP anomalies using machine learning techniques. SMC 2016: 3352-3355 - 2015
- [j13]Soroush Haeri, Ljiljana Trajkovic:
Intelligent Deflection Routing in Buffer-Less Networks. IEEE Trans. Cybern. 45(2): 316-327 (2015) - [c48]Soroush Haeri, Rajvir Gill, Marilyn Hay, Toby Wong, Ljiljana Trajkovic:
Multihoming with locator/ID Separation Protocol: An experimental testbed. IM 2015: 1238-1241 - [c47]Ljiljana Trajkovic:
Communication networks: Traffic data, network topologies, and routing anomalies. SISY 2015: 15 - [c46]Aitizaz Uddin Syed, Ljiljana Trajkovic:
Improving VHT MU-MIMO communications by concatenating long data streams in consecutive groups. WCNC Workshops 2015: 107-112 - [e1]Indu Nair, Sushmita Mitra, Ljiljana Trajkovic, Punam Bedi, Suzanne McIntosh, M. S. Rajasree:
Proceedings of the Third International Symposium on Women in Computing and Informatics, WCI 2015, co-located with ICACCI 2015, Kochi, India, August 10-13, 2015. ACM 2015, ISBN 978-1-4503-3361-0 [contents] - 2014
- [c45]Soroush Haeri, Ljiljana Trajkovic:
Deflection routing in complex networks. ISCAS 2014: 2217-2220 - [c44]Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, Ljiljana Trajkovic:
Classification of BGP anomalies using decision trees and fuzzy rough sets. SMC 2014: 1312-1317 - 2013
- [j12]Vladimir Vukovic, Grozdan Petrovic, Ljiljana Trajkovic:
Packet Error Probability in Multi-Path Diversity Scheme with Majority Combining. IEEE Commun. Lett. 17(9): 1684-1687 (2013) - [c43]Eva Cavero, Álvaro Alesanco Iglesias, Ljiljana Trajkovic, Constantinos S. Pattichis, José García:
Proposal of Real-Time Echocardiogram Transmission Dased on Visualization Modes with WiMAX Access. CinC 2013: 273-276 - [c42]Tanjila Farah, Ljiljana Trajkovic:
Anonym: A tool for anonymization of the Internet traffic. CYBCONF 2013: 261-266 - [c41]Soroush Haeri, Wilson Wang-Kit Thong, Guanrong Chen, Ljiljana Trajkovic:
A reinforcement learning-based algorithm for deflection routing in optical burst-switched networks. IRI 2013: 474-481 - [c40]Jinhu Lu, Guanrong Chen, Maciej J. Ogorzalek, Ljiljana Trajkovic:
Theory and applications of complex networks: Advances and challenges. ISCAS 2013: 2291-2294 - [c39]Soroush Haeri, Majid Arianezhad, Ljiljana Trajkovic:
A Predictive Q-Learning Algorithm for Deflection Routing in Buffer-less Networks. SMC 2013: 764-769 - 2012
- [c38]Nabil M. Al-Rousan, Ljiljana Trajkovic:
Machine learning models for classification of BGP anomalies. HPSR 2012: 103-108 - [c37]Nabil M. Al-Rousan, Soroush Haeri, Ljiljana Trajkovic:
Feature selection for classification of BGP anomalies using Bayesian models. ICMLC 2012: 140-147 - [c36]Rajvir Gill, Ravinder Paul, Ljiljana Trajkovic:
Effect of MRAI timers and routing policies on BGP convergence times. IPCCC 2012: 314-323 - [c35]Wilson Wang-Kit Thong, Guanrong Chen, Ljiljana Trajkovic:
RED-f routing protocol for complex networks. ISCAS 2012: 1644-1647 - 2011
- [j11]Vladimir Vukovic, Grozdan Petrovic, Ljiljana Trajkovic:
Packet Error Probability in a Three-Branch Diversity System with Majority Combining. IEEE Commun. Lett. 15(1): 7-9 (2011) - [j10]Will Hrudey, Ljiljana Trajkovic:
Mobile WiMAX MAC and PHY layer optimization for IPTV. Math. Comput. Model. 53(11-12): 2119-2135 (2011) - [c34]Soroush Haeri, Dario Kresic, Ljiljana Trajkovic:
Probabilistic verification of BGP convergence. ICNP 2011: 127-128 - [c33]Ljiljana Trajkovic:
Teaching circuits to new generations of engineers. ISCAS 2011: 1187-1190 - [c32]Ying-Xun Lai, Yueh-Min Huang, Chin-Feng Lai, Ljiljana Trajkovic:
Parallel Dynamic Voltage and Frequency Scaling for stream decoding using a multicore embedded system. ISCAS 2011: 1956-1959 - [c31]Tanjila Farah, Sukhchandan Lally, Rajvir Gill, Nabil M. Al-Rousan, Ravinder Paul, Don Xu, Ljiljana Trajkovic:
Collection of BCNET BGP traffic. ITC 2011: 322-323 - 2010
- [c30]Laxmi Subedi, Ljiljana Trajkovic:
Spectral analysis of Internet topology graphs. ISCAS 2010: 1803-1806
2000 – 2009
- 2009
- [j9]Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Trajkovic:
Detrended Fluctuation Analysis of the TCP-Red Algorithm. Int. J. Bifurc. Chaos 19(12): 4237-4245 (2009) - [c29]Mohamadreza Najiminaini, Laxmi Subedi, Ljiljana Trajkovic:
Analysis of Internet Topologies: A Historical View. ISCAS 2009: 1697-1700 - 2008
- [c28]Xi Chen, Siu Chung Wong, Chi Kong Tse, Ljiljana Trajkovic:
Stability study of the TCP-RED system using detrended fluctuation analysis. ISCAS 2008: 324-327 - 2007
- [c27]Xi Chen, Siu Chung Wong, Chi K. Michael Tse, Ljiljana Trajkovic:
Stability Analysis of RED Gateway with Multiple TCP Reno Connections. ISCAS 2007: 1429-1432 - [c26]Savio Lau, Ljiljana Trajkovic:
Analysis of traffic data from a hybrid satellite-terrestrial network. QSHINE 2007: 9 - [c25]Modupe Omueti, Ljiljana Trajkovic:
TCP with adaptive delay and loss response for heterogeneous networks. WICON 2007: 25 - 2006
- [c24]Nenad Laskovic, Ljiljana Trajkovic:
BGP with an adaptive minimal route advertisement interval. IPCCC 2006 - [c23]Mingjian Liu, A. Marciello, Mario di Bernardo, Ljiljana Trajkovic:
Discontinuity-induced bifurcations in TCP/RED communication algorithms. ISCAS 2006 - [c22]Bozidar Vujicic, Hao Chen, Ljiljana Trajkovic:
Prediction of traffic in a public safety network. ISCAS 2006 - [c21]André Dufour, Ljiljana Trajkovic:
Improving Gnutella network performance using synthetic coordinates. QSHINE 2006: 31 - 2005
- [j8]Duncan S. Sharp, Nikola Cackov, Nenad Laskovic, Qing Shao, Ljiljana Trajkovic:
Erratum to "Analysis of Public Safety Traffic on Trunked Land Mobile Radio Systems". IEEE J. Sel. Areas Commun. 23(1): 186 (2005) - [j7]Nikola Cackov, Jiaqing Song, Bozidar Vujicic, Svetlana Vujicic, Ljiljana Trajkovic:
Simulation and Performance Evaluation of a Public Safety Wireless Network: Case Study. Simul. 81(8): 571-585 (2005) - [c20]Jiaqing Song, Ljiljana Trajkovic:
Modeling and performance analysis of public safety wireless networks. IPCCC 2005: 567-572 - [c19]Mingjian Liu, Hui Zhang, Ljiljana Trajkovic:
Stroboscopic model and bifurcations in TCP/RED. ISCAS (3) 2005: 2060-2063 - [c18]Nikola Cackov, Zelimir Lucic, Momcilo Bogdanov, Ljiljana Trajkovic:
Wavelet-based estimation of long-range dependence in MPEG video traces. ISCAS (3) 2005: 2068-2071 - [c17]Wan G. Zeng, Ljiljana Trajkovic:
TCP packet control for wireless networks. WiMob (2) 2005: 196-203 - 2004
- [j6]Duncan S. Sharp, Nikola Cackov, Nenad Laskovic, Qing Shao, Ljiljana Trajkovic:
Analysis of public safety traffic on trunked land mobile radio systems. IEEE J. Sel. Areas Commun. 22(7): 1197-1205 (2004) - [j5]Stuart Harvey Rubin, S. N. Jayaram Murthy, Michael H. Smith, Ljiljana Trajkovic:
KASER: knowledge amplification by structured expert randomization. IEEE Trans. Syst. Man Cybern. Part B 34(6): 2317-2329 (2004) - [c16]Inas Khalifa, Ljiljana Trajkovic:
An overview and comparison of analytical TCP models. ISCAS (5) 2004: 469-472 - [c15]Johnson Chen, Ljiljana Trajkovic:
Analysis of Internet topology data. ISCAS (4) 2004: 629-632 - [c14]Hao Chen, Ljiljana Trajkovic:
Trunked radio systems: traffic prediction based on user clusters. ISWCS 2004: 76-80 - [c13]Vladimir Vukadinovic, Ljiljana Trajkovic:
RED with Dynamic Thresholds for improved fairness. SAC 2004: 371-372 - 2003
- [c12]Takashi Hisakado, Kohshi Okumura, Vladimir Vukadinovic, Ljiljana Trajkovic:
Characterization of a simple communication network using Legendre transform. ISCAS (3) 2003: 738-741 - [c11]Stuart Harvey Rubin, Michael H. Smith, Ljiljana Trajkovic:
A blackboard architecture for countering terrorism. SMC 2003: 1550-1553 - 2002
- [c10]Wanliang Ma, Ljiljana Trajkovic, Kartikeya Mayaram:
HomSSPICE: a homotopy-based circuit simulator for periodic steady-state analysis of oscillators. ISCAS (1) 2002: 645-648 - [c9]Luc A. Andriantiatsaholiniaina, Ljiljana Trajkovic:
Analysis of User Behavior from Billing Records of a CDPD Wireless Network. LCN 2002: 781-790 - [c8]Hao Chen, Ljiljana Trajkovic:
Simulation of Route Optimization in Mobile IP. LCN 2002: 847-848 - 2001
- [j4]Velibor Markovski, Fei Xue, Ljiljana Trajkovic:
Simulation and Analysis of Packet Loss in User Datagram Protocol Transfers. J. Supercomput. 20(2): 175-196 (2001) - [c7]Michael Jiang, Milan Nikolic, Stephen Hardy, Ljiljana Trajkovic:
Impact of self-similarity on wireless data network performance. ICC 2001: 477-481 - [c6]Fei Xue, Velibor Markovski, Ljiljana Trajkovic:
Packet loss in video transfers over IP networks. ISCAS (2) 2001: 345-348 - [c5]Stuart H. Rubin, Robert J. Rush Jr., J. Boerke, Ljiljana Trajkovic:
On the role of informed search in veristic computing. SMC 2001: 2301-2308 - 2000
- [c4]Fei Xue, Velibor Markovski, Ljiljana Trajkovic:
Wavelet Analysis of Packet Loss in Video Transfers over UDP. International Conference on Internet Computing 2000: 427-434 - [c3]Felix Lau, Stuart H. Rubin, Michael H. Smith, Ljiljana Trajkovic:
Distributed denial of service attacks. SMC 2000: 2275-2280
1990 – 1999
- 1999
- [j3]Ljiljana Trajkovic, Arnie Neidhardt:
Effect of traffic knowledge on the efficiency of admission-control policies. Comput. Commun. Rev. 29(1): 5-34 (1999) - [c2]A. Dyes, E. Chan, H. Hofmann, W. Horia, Ljiljana Trajkovic:
Simple implementations of homotopy algorithms for finding DC solutions of nonlinear circuits. ISCAS (6) 1999: 290-293 - 1998
- [c1]Michael H. Smith, Ljiljana Trajkovic, Stuart H. Rubin:
FuzzyBase: an information-intelligent retrieval system. SMC 1998: 2797-2802 - 1993
- [j2]Robert C. Melville, Ljiljana Trajkovic, San-Chin Fang, Layne T. Watson:
Artificial parameter homotopy methods for the DC operating point problem. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 12(6): 861-877 (1993) - 1992
- [j1]Ljiljana Trajkovic, S. Jamaloddin Golestani:
Congestion control for multimedia services. IEEE Netw. 6(5): 20-26 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint