default search action
Guy-Vincent Jourdan
Person information
- affiliation: University of Ottawa, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]William Aiken, Lila Carden, Azmeen Bhabhrawala, Paula Branco, Guy-Vincent Jourdan, Adam Berg:
Strategic Digitalization in Oil and Gas: A Case Study on Mixed Reality and Digital Twins. IEEE Access 12: 87248-87267 (2024) - [j19]Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Herna Lydia Viktor:
A Survey on the Applications of Semi-supervised Learning to Cyber-security. ACM Comput. Surv. 56(10): 253 (2024) - [c76]Karanjot Singh Saggu, Paula Branco, Guy-Vincent Jourdan:
Improving GNN-Based Methods for Scam Detection in Bitcoin Transactions - A Practical Case Study. DSAA 2024: 1-10 - 2023
- [c75]William Aiken, Paula Branco, Guy-Vincent Jourdan:
Going Haywire: False Friends in Federated Learning and How to Find Them. AsiaCCS 2023: 593-607 - [c74]Paria Shirani, Sagar Bhatt, Asmaa Hailane, Guy-Vincent Jourdan:
Towards Cross-Architecture Binary Code Vulnerability Detection. CASCON 2023: 191-196 - [c73]Paula Branco, Nuno Moniz, Guy-Vincent Jourdan:
First Workshop on Machine Learning Challenges in Cybersecurity. CASCON 2023: 248-250 - [c72]Julien Cassagne, Ettore Merlo, Paula Branco, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Unsupervised Graph Neural Networks for Source Code Similarity Detection. DS 2023: 535-549 - [c71]Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Herna L. Viktor:
HEART: Heterogeneous Log Anomaly Detection Using Robust Transformers. DS 2023: 673-687 - [c70]Zhikun Yuen, Paula Branco, Aaron Chew, Guy-Vincent Jourdan, Fabian Lim, Laura Wynter:
Are GNNs the Right Tool to Mine the Blockchain? The Case of the Bitcoin Generator Scam. DSAA 2023: 1-11 - [c69]Eric Edem Dzeha, Guy-Vincent Jourdan:
IntelliTweet: A Multifaceted Feature Approach to Detect Malicious Tweets. FPS (1) 2023: 157-173 - [c68]Emad Badawi, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Web Scams Detection System. FPS (1) 2023: 174-188 - [c67]Julien Cassagne, Ettore Merlo, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Following the Obfuscation Trail: Identifying and Exploiting Obfuscation Signatures in Malicious Code. FPS (1) 2023: 321-338 - [c66]William Aiken, Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Mehrdad Sabetzadeh, Herna L. Viktor:
Measuring Improvement of F1-Scores in Detection of Self-Admitted Technical Debt. TechDebt@ICSE 2023: 37-41 - [e4]Guy-Vincent Jourdan, Laurent Mounier, Carlisle M. Adams, Florence Sèdes, Joaquín García-Alfaro:
Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13877, Springer 2023, ISBN 978-3-031-30121-6 [contents] - [i3]William Aiken, Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Mehrdad Sabetzadeh, Herna L. Viktor:
Measuring Improvement of F1-Scores in Detection of Self-Admitted Technical Debt. CoRR abs/2303.09617 (2023) - [i2]Ehsan Nazari, Paula Branco, Guy-Vincent Jourdan:
Generalized Attacks on Face Verification Systems. CoRR abs/2309.05879 (2023) - 2022
- [j18]Paul Kiyambu Mvula, Paula Branco, Guy-Vincent Jourdan, Herna L. Viktor:
COVID-19 malicious domain names classification. Expert Syst. Appl. 204: 117553 (2022) - [c65]Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Phishing Kits Source Code Similarity Distribution: A Case Study. SANER 2022: 983-994 - 2021
- [j17]Uraz Cengiz Türker, Robert M. Hierons, Guy-Vincent Jourdan:
Minimizing Characterizing sets. Sci. Comput. Program. 208: 102645 (2021) - [c64]Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:
Proactive Detection of Phishing Kit Traffic. ACNS (2) 2021: 257-286 - [c63]Anubhav Chhabra, Paula Branco, Guy-Vincent Jourdan, Herna L. Viktor:
An Extensive Comparison of Systems for Entity Extraction from Log Files. FPS 2021: 376-392 - [c62]Ehsan Nazari, Paula Branco, Guy-Vincent Jourdan:
Using CGAN to Deal with Class Imbalance and Small Sample Size in Cybersecurity Problems. PST 2021: 1-10 - 2020
- [j16]Emad Badawi, Guy-Vincent Jourdan:
Cryptocurrencies Emerging Threats and Defensive Mechanisms: A Systematic Literature Review. IEEE Access 8: 200021-200037 (2020) - [c61]Qian Cui, Guy-Vincent Jourdan, Gregor v. Bochmann, Iosif-Viorel Onut:
SemanticPhish: A Semantic-based Scanning System for Early Detection of Phishing Attacks. eCrime 2020: 1-12 - [c60]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
An Automatic Detection and Analysis of the Bitcoin Generator Scam. EuroS&P Workshops 2020: 407-416 - [e3]Lily Shaddick, Guy-Vincent Jourdan, Vio Onut, Tinny Ng:
CASCON '20: Proceedings of the 30th Annual International Conference on Computer Science and Software Engineering, Toronto, Ontario, Canada, November 10 - 13, 2020. ACM 2020 [contents]
2010 – 2019
- 2019
- [j15]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
Automatic Detection and Analysis of the "Game Hack" Scam. J. Web Eng. 18(8): 729-760 (2019) - [c59]Kadir Bulut, Guy-Vincent Jourdan, Uraz Cengiz Türker:
Minimizing Characterizing Sets. FACS 2019: 72-86 - [c58]Sophie Le Page, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
Domain Classifier: Compromised Machines Versus Malicious Registrations. ICWE 2019: 265-279 - [c57]Emad Badawi, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
The "Game Hack" Scam. ICWE 2019: 280-295 - [c56]Sophie Le Page, Guy-Vincent Jourdan:
Victim or Attacker? A Multi-dataset Domain Classification of Phishing Attacks. PST 2019: 1-10 - [e2]Tima Pakfetrat, Guy-Vincent Jourdan, Kostas Kontogiannis, Robert F. Enenkel:
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, CASCON 2019, Markham, Ontario, Canada, November 4-6, 2019. ACM 2019 [contents] - 2018
- [j14]Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Russell Couturier, Iosif-Viorel Onut:
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces. J. Internet Serv. Appl. 9(1): 9:1-9:27 (2018) - [c55]Sophie Le Page, Guy-Vincent Jourdan, Gregor von Bochmann, Jason Flood, Iosif-Viorel Onut:
Using URL shorteners to compare phishing and malware attacks. eCrime 2018: 1-13 - [c54]Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
Phishing Attacks Modifications and Evolutions. ESORICS (1) 2018: 243-262 - [c53]Sophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Using AP-TED to Detect Phishing Attack Variations. PST 2018: 1-6 - [e1]Iosif-Viorel Onut, Andrew Jaramillo, Guy-Vincent Jourdan, Dorina C. Petriu, Wang Chen:
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, CASCON 2018, Markham, Ontario, Canada, October 29-31, 2018. ACM 2018 [contents] - 2017
- [c52]Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Russell Couturier, Iosif-Viorel Onut:
Tracking Phishing Attacks Over Time. WWW 2017: 667-676 - 2016
- [j13]Guy-Vincent Jourdan, Hüsnü Yenigün:
Recovering Representations of Systems with Repetitive Subfunctions from Observations. J. Multiple Valued Log. Soft Comput. 27(2-3): 255-273 (2016) - [c51]Salman Hooshmand, Muhammad Faheem, Gregor von Bochmann, Guy-Vincent Jourdan, Russell Couturier, Iosif-Viorel Onut:
D-ForenRIA: a distributed tool to reconstruct user sessions for rich internet applications. CASCON 2016: 64-74 - [c50]Sara Baghbanzadeh, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Seyed M. Mirtaheri, Muhammad Faheem, Iosif-Viorel Onut:
Reconstructing Interactions with Rich Internet Applications from HTTP Traces. IFIP Int. Conf. Digital Forensics 2016: 147-164 - [c49]Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Fault Tolerant P2P RIA Crawling. NETYS 2016: 32-47 - [c48]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Reducing locating sequences for testing from finite state machines. SAC 2016: 1654-1659 - [c47]Salman Hooshmand, Akib Mahmud, Gregor von Bochmann, Muhammad Faheem, Guy-Vincent Jourdan, Russ Couturier, Iosif-Viorel Onut:
D-ForenRIA: Distributed Reconstruction of User-Interactions for Rich Internet Applications. WWW (Companion Volume) 2016: 211-214 - 2015
- [j12]Mustafa Alhashem, Guy-Vincent Jourdan, Nejib Zaguia:
On The Book Embedding Of Ordered Sets. Ars Comb. 119: 47-64 (2015) - [j11]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Reduced checking sequences using unreliable reset. Inf. Process. Lett. 115(5): 532-535 (2015) - [c46]Guy-Vincent Jourdan, Gregor von Bochmann, Ettore Merlo, James Miller, Vio Onut, Lin Tan:
Workshop on the application of security and testing to rich internet applications. CASCON 2015: 320-322 - [c45]Canan Güniçen, Guy-Vincent Jourdan, Hüsnü Yenigün:
Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation. ICTSS 2015: 19-34 - 2014
- [j10]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Model-Based Rich Internet Applications Crawling: "Menu" and "Probability" Models. J. Web Eng. 13(3&4): 243-262 (2014) - [j9]Mustafa Emre Dincturk, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
A Model-Based Approach for Crawling Rich Internet Applications. ACM Trans. Web 8(3): 19:1-19:39 (2014) - [j8]Ahmed Jedda, Arnaud Casteigts, Guy-Vincent Jourdan, Hussein T. Mouftah:
Bluetooth scatternet formation from a time-efficiency perspective. Wirel. Networks 20(5): 1133-1156 (2014) - [c44]Carlisle M. Adams, Guy-Vincent Jourdan:
Digital signatures for mobile users. CCECE 2014: 1-5 - [c43]Ali Moosavi, Salman Hooshmand, Sara Baghbanzadeh, Guy-Vincent Jourdan:
Indexing Rich Internet Applications Using Components-Based Crawling. ICWE 2014: 200-217 - [c42]Khaled Ben Hafaiedh, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Scalable P2P RIA Crawling System with Partial Knowledge. NETYS 2014: 185-199 - [c41]Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
GDist-RIA Crawler: A Greedy Distributed Crawler for Rich Internet Applications. NETYS 2014: 200-214 - [c40]Seyed M. Mirtaheri, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
PDist-RIA Crawler: A Peer-to-Peer Distributed Crawler for Rich Internet Applications. WISE (2) 2014: 365-380 - [i1]Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Brief History of Web Crawlers. CoRR abs/1405.0749 (2014) - 2013
- [c39]Seyed M. Mirtaheri, Di Zou, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Dist-RIA Crawler: A Distributed Crawler for Rich Internet Applications. 3PGCIC 2013: 105-112 - [c38]Seyed M. Mirtaheri, Mustafa Emre Dinçtürk, Salman Hooshmand, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A brief history of web crawlers. CASCON 2013: 40-54 - [c37]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut:
Building Rich Internet Applications Models: Example of a Better Strategy. ICWE 2013: 291-305 - [c36]Ahmed Jedda, Arnaud Casteigts, Guy-Vincent Jourdan, Hussein T. Mouftah:
BSF-UED: A new time-efficient Bluetooth Scatternet Formation algorithm based on Unnecessary-Edges Deletion. ISCC 2013: 886-891 - 2012
- [j7]Ahmed Jedda, Guy-Vincent Jourdan, Nejib Zaguia:
Towards better understanding of the behaviour of Bluetooth networks distributed algorithms. Int. J. Parallel Emergent Distributed Syst. 27(6): 563-586 (2012) - [c35]Suryakant Choudhary, Mustafa Emre Dincturk, Seyed M. Mirtaheri, Ali Moosavi, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Crawling rich internet applications: the state of the art. CASCON 2012: 146-160 - [c34]Guy-Vincent Jourdan, Ali Mesbah:
Workshop on Mobile and Rich Internet Application Model Generation. CASCON 2012: 265-266 - [c33]Bo Wan, Gregor von Bochmann, Guy-Vincent Jourdan:
Evaluating Reliability-Testing Usage Models. COMPSAC 2012: 129-137 - [c32]Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:
Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada. DPM/SETOP 2012: 75-88 - [c31]Suryakant Choudhary, Mustafa Emre Dincturk, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut, Paul Ionescu:
Solving Some Modeling Challenges when Testing Rich Internet Applications for Security. ICST 2012: 850-857 - [c30]Mustafa Emre Dincturk, Suryakant Choudhary, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Statistical Approach for Efficient Crawling of Rich Internet Applications. ICWE 2012: 362-369 - [c29]Ahmed Jedda, Guy-Vincent Jourdan, Hussein T. Mouftah:
Time-efficient algorithms for the outdegree limited bluetooth scatternet formation problem. ISCC 2012: 132-138 - 2011
- [c28]Kamara Benjamin, Gregor von Bochmann, Mustafa Emre Dincturk, Guy-Vincent Jourdan, Iosif-Viorel Onut:
A Strategy for Efficient Crawling of Rich Internet Applications. ICWE 2011: 74-89 - [c27]Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan:
Enabling dynamic linkage of linguistic census data at Statistics Canada (extended abstract). ISI 2011: 228 - [c26]Gregor von Bochmann, Guy-Vincent Jourdan, Bo Wan:
Improved Usage Model for Web Application Reliability Testing. ICTSS 2011: 15-31 - 2010
- [j6]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün, Ji Chao Zhang:
Lower bounds on lengths of checking sequences. Formal Aspects Comput. 22(6): 667-679 (2010) - [c25]Ahmed Jeddah, Guy-Vincent Jourdan, Nejib Zaguia:
Some side effects of FHSS on Bluetooth networks distributed algorithms. AICCSA 2010: 1-8 - [c24]Kamara Benjamin, Gregor von Bochmann, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Some Modeling Challenges When Testing Rich Internet Applications for Security. ICST Workshops 2010: 403-409 - [c23]Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost:
Lightweight protection against brute force login attacks on Web applications. PST 2010: 181-188
2000 – 2009
- 2009
- [c22]Guy-Vincent Jourdan:
Software Security Vulnerabilities Seen As Feature Interactions. ICFI 2009: 149-159 - [c21]Ahmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan:
Analyzing the Device Discovery Phase of Bluetooth Scatternet Formation Algorithms. ICDCS Workshops 2009: 468-471 - [c20]Ahmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan:
An Analysis of the BluePleidas Algorithm's Device Discovery Phase. ICTA 2009: 359-366 - [c19]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün, Dong Zhu:
Using a SAT solver to generate checking sequences. ISCIS 2009: 549-554 - [c18]Ahmed Jeddah, Nejib Zaguia, Guy-Vincent Jourdan:
A Note on the Study of Bluetooth Networks' Distributed Algorithms. MASS 2009: 953-958 - [c17]Gregor von Bochmann, Guy-Vincent Jourdan:
Testing k-Safe Petri Nets. TestCom/FATES 2009: 33-48 - [c16]Robert M. Hierons, Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences. SEFM 2009: 157-166 - [c15]Guy-Vincent Jourdan, Gregor von Bochmann:
On Testing 1-Safe Petri Nets. TASE 2009: 275-281 - 2008
- [c14]Gregor von Bochmann, Stefan Haar, Claude Jard, Guy-Vincent Jourdan:
Testing Systems Specified as Partial Order Input/Output Automata. TestCom/FATES 2008: 169-183 - [c13]Robert M. Hierons, Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Using adaptive distinguishing sequences in checking sequence constructions. SAC 2008: 682-687 - 2007
- [j5]Guy-Vincent Jourdan:
Centralized Web Proxy Services: Security and Privacy Considerations. IEEE Internet Comput. 11(6): 46-52 (2007) - [c12]Guy-Vincent Jourdan, Hasan Ural, Shen Wang, Hüsnü Yenigün:
Recovering Repetitive Sub-functions from Observations. FORTE 2007: 35-49 - [c11]Stefan Haar, Claude Jard, Guy-Vincent Jourdan:
Testing Input/Output Partial Order Automata. TestCom/FATES 2007: 171-185 - 2006
- [c10]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Minimizing Coordination Channels in Distributed Testing. FORTE 2006: 451-466 - [c9]Guy-Vincent Jourdan, Panitee Ritthiruangdech, Hasan Ural:
Test Suite Reduction Based on Dependence Analysis. ISCIS 2006: 1021-1030 - [c8]Jessica Chen, Guy-Vincent Jourdan, Wenxin Ma, Hasan Ural:
Improving Coverage in Functional Testing. QSIC 2006: 99-106 - 2005
- [j4]Guy-Vincent Jourdan, Hasan Ural, Nejib Zaguia:
Minimizing the number of inputs while applying adaptive test cases. Inf. Process. Lett. 94(4): 165-169 (2005) - [c7]Nejib Zaguia, Guy-Vincent Jourdan, Mustafa Alhashem:
On the Pagenumber of Bipartite Orders. CCCG 2005: 252-255 - [c6]Guy-Vincent Jourdan, Hasan Ural, Hüsnü Yenigün:
Recovering the Lattice of Repetitive Sub-functions. ISCIS 2005: 956-965 - 2003
- [c5]Guy-Vincent Jourdan, Ivan Rival, Nejib Zaguia:
Degree Navigator™: The Journey of a Visualization Software. GD 2003: 491-493
1990 – 1999
- 1996
- [j3]Claude Jard, Guy-Vincent Jourdan:
Incremental Transitive Dependency Tracking in Distributed Computations. Parallel Process. Lett. 6(3): 427-435 (1996) - 1995
- [j2]Eddy Fromentin, Claude Jard, Guy-Vincent Jourdan, Michel Raynal:
On-The-Fly Analysis of Distributed Computations. Inf. Process. Lett. 54(5): 267-274 (1995) - [j1]Claude Jard, Guy-Vincent Jourdan, Jean-Xavier Rampon:
On-Line Computations of the Ideal Lattice of Posets. RAIRO Theor. Informatics Appl. 29(3): 227-244 (1995) - [c4]Eddy Fromentin, Claude Jard, Guy-Vincent Jourdan, Michel Raynal:
Recognition of Patterns on Control Flows for Debugging Distributed Executions. AADEBUG 1995: 221-232 - 1994
- [c3]Guy-Vincent Jourdan, Ivan Rival, Nejib Zaguia:
Upward Drawing on the Plane Grid Using Less Ink. GD 1994: 318-327 - [c2]Claude Jard, Thierry Jéron, Guy-Vincent Jourdan, Jean-Xavier Rampon:
A General Approach to Trace-Checking in Distributed Computing Systems. ICDCS 1994: 396-403 - [c1]Claude Jard, Guy-Vincent Jourdan:
On the Coding of Dependencies in Distributed Computations (Abstract). PODC 1994: 377
Coauthor Index
aka: Gregor v. Bochmann
aka: Mustafa Emre Dinçtürk
aka: Vio Onut
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint