


default search action
Ramesh Chandra Joshi
Person information
- affiliation: Indian Institute of Technology Roorkee, Department of Electronics and Computer Engineering, India
- affiliation: Graphic Era University (GEU), Dehradun, India
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j40]Anil Kumar Prajapati, Emmanuel S. Pilli, Ramesh Babu Battula, Vijay Varadharajan, Abhishek Verma, R. C. Joshi:
A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things. Comput. Electr. Eng. 123: 110071 (2025) - 2023
- [j39]Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi:
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment. Int. J. Grid Util. Comput. 14(4): 356-367 (2023) - 2021
- [j38]Akansha Gupta
, Kamal Kumar Ghanshala, Ramesh C. Joshi:
Machine Learning Classifier Approach with Gaussian Process, Ensemble boosted Trees, SVM, and Linear Regression for 5G Signal Coverage Mapping. Int. J. Interact. Multim. Artif. Intell. 6(6): 156-163 (2021) - [j37]Sameer Singh Chauhan
, Emmanuel S. Pilli
, Ramesh Chandra Joshi:
BSS: a brokering model for service selection using integrated weighting approach in cloud environment. J. Cloud Comput. 10(1): 26 (2021) - [j36]Sameer Singh Chauhan
, Emmanuel S. Pilli
, Ramesh C. Joshi:
BGSA: Broker Guided Service Allocation in Federated Cloud. Sustain. Comput. Informatics Syst. 32: 100609 (2021)
2010 – 2019
- 2019
- [j35]Sameer Singh Chauhan
, Emmanuel S. Pilli
, Ramesh Chandra Joshi, Girdhari Singh
, Mahesh Chandra Govil:
Brokering in interconnected cloud computing environments: A survey. J. Parallel Distributed Comput. 133: 193-209 (2019) - [c58]Preeti Mishra, Akash Negi, Emmanuel S. Pilli
, Ramesh C. Joshi:
VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. ICACDS (1) 2019: 360-369 - 2018
- [j34]Ramesh Singh Rawat, Emmanuel S. Pilli, Ramesh Chandra Joshi:
Survey of Peer-to-Peer Botnets and Detection Frameworks. Int. J. Netw. Secur. 20(3): 547-557 (2018) - [c57]Sameer Singh Chauhan
, Emmanuel S. Pilli
, Ramesh Chandra Joshi, Girdhari Singh
:
UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud. ANTS 2018: 1-6 - [i6]M. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi, G. Atluri:
CLINIQA: A Machine Intelligence Based Clinical Question Answering System. CoRR abs/1805.05927 (2018) - 2016
- [b1]Ramesh Chandra Joshi, Emmanuel S. Pilli:
Fundamentals of Network Forensics - A Research Perspective. Computer Communications and Networks, Springer 2016, ISBN 978-1-4471-7297-0, pp. 3-202 - 2015
- [j33]Anchit Bijalwan
, Mohammad Wazid
, Emmanuel S. Pilli
, Ramesh Chandra Joshi:
Forensics of Random-UDP Flooding Attacks. J. Networks 10(5): 287-293 (2015) - [c56]Avani Sharma
, Tarun Kumar Goyal, Emmanuel S. Pilli
, Arka Prokash Mazumdar
, Mahesh Chandra Govil, Ramesh C. Joshi:
A Secure Hybrid Cloud Enabled architecture for Internet of Things. WF-IoT 2015: 274-279 - 2014
- [j32]Lalit Kumar Awasthi
, Manoj Misra, Ramesh Chandra Joshi:
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems. Int. J. Commun. Networks Distributed Syst. 12(4): 356-380 (2014) - 2013
- [j31]Radhika Goel, Anjali Sardana, Ramesh C. Joshi:
Wireless Honeypot: Framework, Architectures and Tools. Int. J. Netw. Secur. 15(5): 373-383 (2013) - 2012
- [j30]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack. Int. J. Netw. Secur. 14(2): 61-70 (2012) - [j29]Radhika Goel, Anjali Sardana, Ramesh C. Joshi:
Parallel Misuse and Anomaly Detection Model. Int. J. Netw. Secur. 14(4): 211-222 (2012) - [c55]Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:
Personal Secret Information Based Authentication towards Preventing Phishing Attacks. ACITY (1) 2012: 31-42 - [c54]Gaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi:
Secret information display based authentication technique towards preventing phishing attacks. ICACCI 2012: 602-608 - [c53]Aayush Aggarwal, Ramesh Chandra Joshi:
A system for mobile assisted living. ICNSC 2012: 233-237 - [i5]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. CoRR abs/1203.2399 (2012) - [i4]Brij B. Gupta, Manoj Misra, Ramesh C. Joshi:
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach. CoRR abs/1203.2400 (2012) - [i3]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain. CoRR abs/1204.5590 (2012) - [i2]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network. CoRR abs/1204.5592 (2012) - [i1]Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:
Distributed Denial of Service Prevention Techniques. CoRR abs/1208.3557 (2012) - 2011
- [j28]Brajesh Kumar Kaushik
, Rajendra P. Agarwal, Sankar Sarkar, Ramesh C. Joshi, D. S. Chauhan:
Repeater insertion in crosstalk-aware inductively and capacitively coupled interconnects. Int. J. Circuit Theory Appl. 39(6): 629-647 (2011) - [j27]Bankat M. Patil, Ramesh C. Joshi, Durga Toshniwal:
Classification of type-2 diabetic patients by using Apriori and predictive Apriori. Int. J. Comput. Vis. Robotics 2(3): 254-265 (2011) - [j26]Anjali Sardana, Ramesh C. Joshi:
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks. Int. J. Mob. Comput. Multim. Commun. 3(1): 1-20 (2011) - [j25]Naveen Chauhan
, Lalit Kumar Awasthi
, Narottam Chand
, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 20-35 (2011) - [j24]Bankat M. Patil, Ramesh C. Joshi, Durga Toshniwal, Siddeshwar Biradar:
A New Approach: Role of Data Mining in Prediction of Survival of Burn Patients. J. Medical Syst. 35(6): 1531-1542 (2011) - [c52]Anupama Mishra, Brij B. Gupta
, Ramesh Chandra Joshi:
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques. EISIC 2011: 286-289 - [c51]Sudheer Ponnemkunnath, R. C. Joshi:
Efficient Regular Expression Pattern Matching on Graphics Processing Units. IC3 2011: 92-101 - [c50]Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:
Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing. IC3 2011: 491-500 - [c49]Naveen Chauhan
, Lalit Kumar Awasthi
, Narottam Chand
, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. ICCCS 2011: 17-20 - [c48]Emmanuel S. Pilli
, Ramesh C. Joshi, Rajdeep Niyogi:
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics. ICWET 2011: 276-283 - [c47]D. Dutta, R. C. Joshi:
A genetic: algorithm approach to cost-based multi-QoS job scheduling in cloud computing environment. ICWET 2011: 422-427 - [c46]Emmanuel S. Pilli
, Ramesh Chandra Joshi, Rajdeep Niyogi:
Router and Interface Marking for Network Forensics. IFIP Int. Conf. Digital Forensics 2011: 209-220 - 2010
- [j23]Emmanuel S. Pilli
, Ramesh C. Joshi, Rajdeep Niyogi:
Network forensic frameworks: Survey and research challenges. Digit. Investig. 7(1-2): 14-27 (2010) - [j22]Bankat M. Patil, Ramesh Chandra Joshi, Durga Toshniwal:
Hybrid prediction model for Type-2 diabetic patients. Expert Syst. Appl. 37(12): 8102-8108 (2010) - [j21]Teek Parval Sharma
, Ramesh C. Joshi, Manoj Misra:
Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 239-264 (2010) - [j20]Lalit Kumar Awasthi
, Manoj Misra, Ramesh C. Joshi:
A weighted checkpointing protocol for mobile distributed systems. Int. J. Ad Hoc Ubiquitous Comput. 5(3): 137-149 (2010) - [j19]Bankat M. Patil, Ramesh C. Joshi, Durga Toshniwal:
Effective framework for prediction of disease outcome using medical datasets: clustering and classification. Int. J. Comput. Intell. Stud. 1(3): 273-290 (2010) - [j18]Brij B. Gupta
, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. Int. J. Multim. Intell. Secur. 1(4): 378-391 (2010) - [j17]Anjali Sardana, Ramesh C. Joshi, Tai-Hoon Kim, Sung Jang:
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach. J. Intell. Manuf. 21(5): 623-634 (2010) - [j16]Brajesh Kumar Kaushik
, Sankar Sarkar, Rajendra Prasad Agarwal, Ramesh C. Joshi:
An analytical approach to dynamic crosstalk in coupled interconnects. Microelectron. J. 41(2-3): 85-92 (2010) - [j15]Rajesh Kumar Bhatia, Mayank Dave
, Ramesh Chandra Joshi:
Ant colony based rule generation for reusable software component retrieval. ACM SIGSOFT Softw. Eng. Notes 35(2): 1-5 (2010) - [c45]Anjali Sardana, Ramesh Chandra Joshi:
Dual-Level Attack Detection and Characterization for Networks under DDoS. ARES 2010: 9-16 - [c44]Naga Sathish Gidijala, Sanketh Datla, Ramesh C. Joshi:
A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks. IC3 (1) 2010: 32-41 - [c43]Ajanta Konar, Ramesh C. Joshi:
An Efficient Intrusion Detection System Using Clustering Combined with Fuzzy Logic. IC3 (1) 2010: 218-228 - [c42]Bankat M. Patil, Ramesh C. Joshi, Durga Toshniwal:
Impact of K-Means on the Performance of Classifiers for Labeled Data. IC3 (1) 2010: 423-434 - [c41]Bankat M. Patil, Ramesh C. Joshi, Durga Toshniwal:
Missing Value Imputation Based on K-Mean Clustering with Weighted Distance. IC3 (1) 2010: 600-609 - [c40]Emmanuel S. Pilli
, Ramesh Chandra Joshi, Rajdeep Niyogi:
An IP Traceback Model for Network Forensics. ICDF2C 2010: 129-136 - [c39]Atul Kant Kaushik, Emmanuel S. Pilli
, Ramesh C. Joshi:
Network Forensic Analysis by Correlation of Attacks with Network Attributes. ICT 2010: 124-128 - [c38]Sameer Singh Chauhan
, Ramesh Chandra Joshi:
Multiple QoS Guided Heuristic for Independent Task Scheduling in Grid. ICT 2010: 136-141 - [c37]Emmanuel S. Pilli
, Ramesh C. Joshi, Rajdeep Niyogi:
A Framework for Network Forensic Analysis. ICT 2010: 142-147 - [c36]Anjali Sardana, Ramesh Chandra Joshi:
Dual-level defense for networks under DDoS attacks. SAC 2010: 733-734
2000 – 2009
- 2009
- [j14]Anjali Sardana, Ramesh C. Joshi:
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks. Comput. Commun. 32(12): 1384-1399 (2009) - [j13]Brij B. Gupta
, Ramesh Chandra Joshi, Manoj Misra:
Defending against Distributed Denial of Service Attacks: Issues and Challenges. Inf. Secur. J. A Glob. Perspect. 18(5): 224-247 (2009) - [c35]Appala Raju Kotaru, Ramesh C. Joshi:
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach. IC3 2009: 510-520 - [c34]Manoj Gupta, R. C. Joshi:
Hiding Fuzzy Association Rules Set. IICAI 2009: 275-289 - 2008
- [j12]Vinay Arya, Ankush Mittal, Amit Pande, Ramesh C. Joshi:
An Efficient Coding Method for Teleconferencing Video and Confocal Microscopic Image Sequences. J. Comput. Inf. Technol. 16(3): 145-156 (2008) - [j11]Vijay K. Verma, Ramesh C. Joshi, Bin Xie, Dharma P. Agrawal:
Combating the bloated state problem in mobile agents based network monitoring applications. Comput. Networks 52(17): 3218-3228 (2008) - [c33]Archana M. Rajurkar
, R. C. Joshi, Santanu Chaudhary:
Video Content Description Using Fuzzy Spatio-temporal Relations. HICSS 2008: 139 - [c32]Rajeev Singh, Suman Das, Durga Toshniwal, Manoj Mishra, Ramesh C. Joshi:
E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks. ICETET 2008: 1244-1249 - [c31]Suman Das, Rajeev Singh, Ramesh C. Joshi, Durga Toshiwal:
Reducing the Effect of Distributed Directory Harvest Attack and Load of Mail Server. ICIIS 2008: 1-6 - [c30]Nidhi Bansal, Teek Parval Sharma
, Manoj Misra, Ramesh Chandra Joshi:
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks. ICON 2008: 1-6 - [c29]Brij B. Gupta
, Manoj Misra, Ramesh Chandra Joshi:
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. ICON 2008: 1-4 - [c28]P. Eshwar Rohit, Shashikala Tapaswi, Ramesh Chandra Joshi:
Probability based routing for Ad Hoc networks in a building. ICON 2008: 1-6 - [c27]Anjali Sardana, Ramesh Chandra Joshi:
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. ICON 2008: 1-7 - [c26]Teek Parval Sharma
, Ramesh Chandra Joshi, Manoj Misra:
Dual radio based cooperative caching for wireless sensor networks. ICON 2008: 1-7 - [c25]Rajesh Kumar Bhatia, Mayank Dave
, Ramesh C. Joshi:
Ant colony based rule generation for reusable software component retrieval. ISEC 2008: 129-130 - [c24]Teek Parval Sharma
, Ramesh C. Joshi, Manoj Misra:
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. IPCCC 2008: 412-417 - [c23]Anjali Sardana, Ramesh Chandra Joshi:
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. ISIP 2008: 505-509 - 2007
- [j10]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Supporting cooperative caching in mobile ad hoc networks using clusters. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 58-72 (2007) - [j9]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy efficient cache invalidation in a disconnected wireless mobile environment. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 83-91 (2007) - [j8]Narottam Chand
, Ramesh C. Joshi, Manoj Misra:
Cooperative caching in mobile ad hoc networks based on data utility. Mob. Inf. Syst. 3(1): 19-37 (2007) - [j7]Narottam Chand
, Ramesh C. Joshi, Manoj Misra:
Exploiting caching in heterogeneous mobile environment. Wirel. Commun. Mob. Comput. 7(7): 835-848 (2007) - [j6]Narottam Chand
, Ramesh C. Joshi, Manoj Misra:
Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters. Wirel. Pers. Commun. 43(1): 41-63 (2007) - [c22]Anjali Sardana, Krishan Kumar
, Ramesh Chandra Joshi:
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. IAS 2007: 191-196 - [c21]Brajesh Kumar Kaushik, Sankar Sarkar, Rajendra Prasad Agarwal, Ramesh C. Joshi:
Crosstalk Analysis of an Inductively and Capacitively Coupled Interconnect Driven by a CMOS Gate. ICIT 2007: 7-12 - [c20]Durga Toshniwal, Ramesh C. Joshi:
Finding Associations in Time Series Data Using Centroids. DMIN 2007: 16-21 - [c19]Anjali Sardana, Ramesh Chandra Joshi:
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. ICISS 2007: 259-262 - 2006
- [j5]Narottam Chand
, Ramesh C. Joshi, Manoj Misra:
A zone co-operation approach for efficient caching in mobile ad hoc networks. Int. J. Commun. Syst. 19(9): 1009-1028 (2006) - [j4]M. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi:
A pattern recognition-based approach for phylogenetic network construction with constrained recombination. Pattern Recognit. 39(12): 2312-2322 (2006) - [c18]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient cooperative caching in ad hoc networks. COMSWARE 2006: 1-8 - [c17]Anupam Agrawal, M. Radhakrishna, R. C. Joshi:
Out-of-core construction and 3D visualization of level-of-detail terrains populated with large collection of heterogeneous objects. GRAPP 2006: 429-435 - [c16]Tarun Bansal, Pankaj Ghanshani, Ramesh Chandra Joshi:
An Application Dependent Communication Protocol for Wireless Sensor Networks. ICN/ICONS/MCL 2006: 120 - [c15]Narottam Chand
, Ramesh C. Joshi, Manoj Misra:
Efficient Cache Replacement in Mobile Environment Using Data Profit. ICPADS (1) 2006: 203-212 - [c14]Rajesh Kumar Bhatia, Mayank Dave, Ramesh C. Joshi:
Retrieval of Most Relevant Reusable Component Using Genetic Algorithms. Software Engineering Research and Practice 2006: 151-155 - 2005
- [j3]Durga Toshniwal, Ramesh C. Joshi:
Similarity Search in Time Series Data Using Time Weighted Slopes. Informatica (Slovenia) 29(1): 79-88 (2005) - [j2]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Mobile Environment. J. Digit. Inf. Manag. 3(2): 119-125 (2005) - [c13]Durga Toshniwal, Ramesh C. Joshi:
Finding Similarity in Time Series Data by Method of Time Weighted Moments. ADC 2005: 155-164 - [c12]M. A. H. Zahid, Ankush Mittal, Ramesh Chandra Joshi:
A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination. ICDCIT 2005: 592-603 - [c11]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment. IWDC 2005: 536-541 - 2004
- [c10]Shashikala Tapaswi, Ramesh Chandra Joshi:
Classification of Bio-medical Images Using Neuro Fuzzy Approach. DASFAA 2004: 568-581 - [c9]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Broadcast Based Cache Invalidation and Prefetching in Mobile Environment. HiPC 2004: 410-419 - [c8]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. ICDCIT 2004: 85-95 - [c7]Durga Toshniwal, Ramesh Chandra Joshi:
Similarity search in time series databases using moments. ICMLA 2004: 164-171 - [c6]Shashikala Tapaswi, Ramesh Chandra Joshi:
An Evolutionary Computing Approach for Mining of Bio-medical Images. PCM (3) 2004: 523-532 - 2003
- [c5]L. Kumar, Muldip Mishra, Ramesh C. Joshi
:
Low Overhead Optimal Checkpointing for Mobile Distributed Systems. ICDE 2003: 686-688 - 2002
- [c4]Ramesh C. Joshi, Shashikala Tapaswi:
Retrieval of Image Databases Using Supervised Learning Approach. CGIV 2002: 513-516
1990 – 1999
- 1994
- [c3]Ramesh C. Joshi, G. S. D. Varma, Kuldip Singh:
Message-Task Scheduling in Object-Oriented Heterogeneous GURU Distributed DBMS. ICPP (3) 1994: 235-242 - 1992
- [c2]P. K. Bansal, Kuldip Singh, Ramesh C. Joshi:
Quad Tree: A Cost-Effective Fault-Tolerant Multistage Interconnection Network. INFOCOM 1992: 860-866 - 1991
- [c1]P. K. Bansal, Kuldip Singh, Ramesh C. Joshi, G. P. Saroha:
Fault Tolerant Double Tree Multistage Interconnection Network. INFOCOM 1991: 462-468
1980 – 1989
- 1988
- [j1]Ramesh C. Joshi, H. Darbari, S. Goel, Sasikumaran Sasikumaran:
A hierarchical Hex-tree representational technique for solid modelling. Comput. Graph. 12(2): 235-238 (1988)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint