default search action
Jinoh Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Robin Frehner, Kesheng Wu, Alexander Sim, Jinoh Kim, Kurt Stockinger:
Detecting Anomalies in Time Series Using Kernel Density Approaches. IEEE Access 12: 33420-33439 (2024) - [j27]Sang-Yoon Chang, Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Xiaobo Zhou:
Base station gateway to secure user channel access at the first hop edge. Comput. Networks 240: 110165 (2024) - [c58]Sourav Purification, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Fake Base Station Detection and Blacklisting. ICCCN 2024: 1-9 - [c57]Mincheol Shin, Sang-Yoon Chang, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Intelligent Trajectory-based Approach to UAV Location Integrity Checks. ICCCN 2024: 1-9 - [c56]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Flying Base Station Channel Capacity. SNTA@HPDC 2024: 24-31 - [c55]Amanul Islam, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim:
Anomaly Detection in 5G using Variational Autoencoders. SVCC 2024: 1-6 - [c54]Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Toward Post-Quantum Digital Certificate for eSIM. SVCC 2024: 1-3 - [c53]Sourav Purification, Kyungmin Park, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Wireless Link Routing to Secure Against Fake Base Station in 5G. SVCC 2024: 1-3 - 2023
- [j26]Chiho Kim, Sang-Yoon Chang, Dongeun Lee, Jonghyun Kim, Kyungmin Park, Jinoh Kim:
Reliable Detection of Location Spoofing and Variation Attacks. IEEE Access 11: 10813-10825 (2023) - [j25]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Securing UAV Flying Base Station for Mobile Networking: A Review. Future Internet 15(5): 176 (2023) - [j24]Robin Shao, Alex Sim, Kesheng Wu, Jinoh Kim:
Leveraging History to Predict Infrequent Abnormal Transfers in Distributed Workflows. Sensors 23(12): 5485 (2023) - [j23]Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1302-1318 (2023) - [j22]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Dongeun Lee, Jinoh Kim:
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture. IEEE Trans. Netw. Serv. Manag. 20(3): 3900-3914 (2023) - [c52]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++: Cryptocurrency Blockchain Handshaking With Software Assurance. CCNC 2023: 804-809 - [c51]Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance. CCNC 2023: 915-916 - [c50]Sang-Yoon Chang, Kyungmin Park, Jonghyun Kim, Jinoh Kim:
Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power. SNTA@HPDC 2023: 3-8 - [c49]Donghwoon Kwon, Rares-Mihail Neagu, Prem Rasakonda, Jeong-Tak Ryu, Jinoh Kim:
Evaluating Unbalanced Network Data for Attack Detection. SNTA@HPDC 2023: 23-26 - [c48]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Jinoh Kim:
An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection. ICMLA 2023: 574-579 - [e5]Massimo Cafaro, Eric Chan-Tin, Jerry Chou, Jinoh Kim:
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, SNTA 2023, Orlando, FL, USA, 20 June 2023. ACM 2023 [contents] - 2022
- [j21]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency. Comput. Networks 219: 109436 (2022) - [j20]Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT anomaly detection performance for federated learning. Digit. Commun. Networks 8(3): 314-323 (2022) - [j19]Luca Vassio, Danilo Giordano, Jinoh Kim, Jon Crowcroft:
Message from the Chairs of the WAIN workshop 2021. SIGMETRICS Perform. Evaluation Rev. 49(4): 92 (2022) - [j18]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. IEEE Trans. Netw. Serv. Manag. 19(3): 3619-3632 (2022) - [c47]Robin Shao, Jinoh Kim, Alex Sim, Kesheng Wu:
Predicting Slow Network Transfers in Scientific Computing. SNTA@HPDC 2022: 13-20 - [c46]Jinoh Kim, Massimo Cafaro, Jerry Chou, Alex Sim:
SNTA'22: The 5th Workshop on Systems and Network Telemetry and Analytics. HPDC 2022: 296-297 - [c45]Minji Kim, Dongeun Lee, Kookjin Lee, Doowon Kim, Sangman Lee, Jinoh Kim:
Deep Sequence Models for Packet Stream Analysis and Early Decisions. LCN 2022: 56-63 - [c44]Nikhil Sai Kanuri, Sang-Yoon Chang, Younghee Park, Jonghyun Kim, Jinoh Kim:
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks. SVCC 2022: 107-119 - [c43]Theo Gamboni-Diehl, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang:
Lightweight Code Assurance Proof for Wireless Software. WISEC 2022: 285-287 - [e4]Massimo Cafaro, Jerry Chou, Jinoh Kim, Alex Sim:
SNTA@HPDC 2022, Fifth International Workshop on Systems and Network Telemetry and Analytics, Minneapolis, MN, USA, 30 June 2022. ACM 2022, ISBN 978-1-4503-9315-7 [contents] - [d1]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. IEEE DataPort, 2022 - [i7]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. CoRR abs/2212.01298 (2022) - 2021
- [j17]Sunhee Baek, Donghwoon Kwon, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim, Jinoh Kim:
Clustering-based label estimation for network anomaly detection. Digit. Commun. Networks 7(1): 37-44 (2021) - [j16]Astha Syal, Alina Lazar, Jinoh Kim, Alex Sim, Kesheng Wu:
Network traffic performance analysis from passive measurements using gradient boosting machine learning. Int. J. Big Data Intell. 8(1): 13-30 (2021) - [j15]Makiya Nakashima, Alex Sim, Youngsoo Kim, Jonghyun Kim, Jinoh Kim:
Automated Feature Selection for Anomaly Detection in Network Traffic Data. ACM Trans. Manag. Inf. Syst. 12(3): 18:1-18:28 (2021) - [c42]Chiho Kim, Sang-Yoon Chang, Jonghyun Kim, Dongeun Lee, Jinoh Kim:
Zero-day Malware Detection using Threshold-free Autoencoding Architecture. IEEE BigData 2021: 1279-1284 - [c41]Wenjun Fan, Jinoh Kim, Ikkyun Kim, Xiaobo Zhou, Sang-Yoon Chang:
Performance Analyses for Applying Machine Learning on Bitcoin Miners. ICEIC 2021: 1-4 - [c40]Hun-Jeong Kang, Christopher Kallas, Myung-Hwan Park, Jinoh Kim:
A Scalable Learning Model for Multi-seasonal Time Series Forecasting. ICEIC 2021: 1-4 - [c39]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. IEEE ICBC 2021: 1-9 - [c38]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, Xiaobo Zhou, C. Edward Chow, Sang-Yoon Chang:
Robust P2P Connectivity Estimation for Permissionless Bitcoin Network. IWQoS 2021: 1-6 - [c37]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking. LCN 2021: 319-322 - [c36]Manohar Raavi, Simeon Wuthier, Arijet Sarker, Jinoh Kim, Jong Hyun Kim, Sang-Yoon Chang:
Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network. SVCC 2021: 143-154 - [e3]Massimo Cafaro, Jinoh Kim, Alex Sim:
SNTA@HPDC 2021: Proceedings of the 2021 on Systems and Network Telemetry and Analytics, Virtual Event, Sweden, 21 June, 2021. ACM 2021, ISBN 978-1-4503-8386-8 [contents] - [i6]Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu, Jaegyoon Hahm:
Improving Botnet Detection with Recurrent Neural Network and Transfer Learning. CoRR abs/2104.12602 (2021) - 2020
- [j14]Jinhwan Choi, Yu Gu, Jinoh Kim:
Learning-based dynamic cache management in a cloud. J. Parallel Distributed Comput. 145: 98-110 (2020) - [c35]Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu:
Botnet Detection Using Recurrent Variational Autoencoder. GLOBECOM 2020: 1-6 - [c34]Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu, Jaegyoon Hahm:
Transfer Learning Approach for Botnet Detection Based on Recurrent Variational Autoencoder. SNTA@HPDC 2020: 41-47 - [c33]Makiya Nakashima, Alex Sim, Jinoh Kim:
Evaluation of Deep Learning Models for Network Performance Prediction for Scientific Facilities. SNTA@HPDC 2020: 53-56 - [c32]Mohammad Al Olaimat, Dongeun Lee, Youngsoo Kim, Jonghyun Kim, Jinoh Kim:
A Learning-based Data Augmentation for Network Anomaly Detection. ICCCN 2020: 1-10 - [c31]Taejoon Kim, Yu Gu, Jinoh Kim:
QoS-enabled Cache Architecture for a Private Cloud. ICNC 2020: 434-439 - [c30]Brett Weinger, Jinoh Kim, Alex Sim, Makiya Nakashima, Nour Moustafa, K. John Wu:
Enhancing IoT Anomaly Detection Performance for Federated Learning. MSN 2020: 206-213 - [e2]Massimo Cafaro, Jinoh Kim, Alex Sim:
Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, SNTA@HPDC 2020, Stockholm, Sweden, June 23, 2020. ACM 2020, ISBN 978-1-4503-7980-9 [contents] - [i5]Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu:
Botnet Detection Using Recurrent Variational Autoencoder. CoRR abs/2004.00234 (2020)
2010 – 2019
- 2019
- [j13]Ritesh K. Malaiya, Donghwoon Kwon, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim, Jinoh Kim:
An Empirical Evaluation of Deep Learning for Network Anomaly Detection. IEEE Access 7: 140806-140817 (2019) - [j12]Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, Kuinam J. Kim:
A survey of deep learning-based network anomaly detection. Clust. Comput. 22(Suppl 1): 949-961 (2019) - [j11]Jinoh Kim, Alex Sim, Brian Tierney, Sang C. Suh, Ikkyun Kim:
Multivariate network traffic analysis using clustered patterns. Computing 101(4): 339-361 (2019) - [j10]Justin Tharp, Sang C. Suh, Hyeonkoo Cho, Jinoh Kim:
Improving signature quality for network application identification. Digit. Commun. Networks 5(3): 139-146 (2019) - [j9]Jinoh Kim, Alex Sim:
A New Approach to Multivariate Network Traffic Analysis. J. Comput. Sci. Technol. 34(2): 388-402 (2019) - [c29]Burak Cetin, Alina Lazar, Jinoh Kim, Alex Sim, Kesheng Wu:
Federated Wireless Network Intrusion Detection. IEEE BigData 2019: 6004-6006 - [c28]Jinoh Kim:
Session details: Keynote Speech. SNTA@HPDC 2019 - [c27]Astha Syal, Alina Lazar, Jinoh Kim, Alex Sim, Kesheng Wu:
Automatic Detection of Network Traffic Anomalies and Changes. SNTA@HPDC 2019: 3-10 - [c26]Jinoh Kim, Caitlin Sim, Jinhwan Choi:
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection. SNTA@HPDC 2019: 45-48 - [e1]Jinoh Kim, Alex Sim:
Proceedings of the ACM Workshop on Systems and Network Telemetry and Analytics, SNTA@HPDC 2019, Phoenix, AZ, USA, June 25, 2019. ACM 2019, ISBN 978-1-4503-6761-5 [contents] - [i4]Jinhwan Choi, Yu Gu, Jinoh Kim:
Learning-based Dynamic Cache Management in a Cloud. CoRR abs/1902.00795 (2019) - [i3]Taejoon Kim, Yu Gu, Jinoh Kim:
A Hybrid Cache Architecture for Meeting Per-Tenant Performance Goals in a Private Cloud. CoRR abs/1906.01260 (2019) - [i2]Makiya Nakashima, Alex Sim, Youngsoo Kim, Jonghyun Kim, Jinoh Kim:
An Ensemble Approach toward Automated Variable Selection for Network Anomaly Detection. CoRR abs/1910.12806 (2019) - 2018
- [c25]Taejoon Kim, Sang C. Suh, Hyunjoo Kim, Jonghyun Kim, Jinoh Kim:
An Encoding Technique for CNN-based Network Anomaly Detection. IEEE BigData 2018: 2960-2965 - [c24]Ritesh K. Malaiya, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim:
An Empirical Evaluation of Deep Learning for Network Anomaly Detection. ICNC 2018: 893-898 - [c23]Eric Chan-Tin, Taejoon Kim, Jinoh Kim:
Website Fingerprinting Attack Mitigation Using Traffic Morphing. ICDCS 2018: 1575-1578 - [c22]Donghwoon Kwon, Kathiravan Natarajan, Sang C. Suh, Hyunjoo Kim, Jinoh Kim:
An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks. ICDCS 2018: 1595-1598 - [i1]Jinoh Kim, Caitlin Sim, Jinhwan Choi:
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection. CoRR abs/1810.01945 (2018) - 2017
- [c21]Sunhee Baek, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim:
Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks. CSCloud 2017: 205-210 - [c20]Jinoh Kim, Alex Sim:
A New Approach to Online, Multivariate Network Traffic Analysis. ICCCN 2017: 1-6 - [c19]Jinoh Kim, Alex Sim, Sang C. Suh, Ikkyun Kim:
An approach to online network monitoring using clustered patterns. ICNC 2017: 656-661 - [c18]Jinoh Kim, Wucherl Yoo, Alex Sim, Sang C. Suh, Ikkyun Kim:
A lightweight network anomaly detection technique. ICNC 2017: 896-900 - 2015
- [j8]Jerry Chi-Yuan Chou, Ting-Hsuan Lai, Jinoh Kim, Doron Rotem:
Exploiting Replication for Energy-Aware Scheduling in Disk Storage Systems. IEEE Trans. Parallel Distributed Syst. 26(10): 2734-2749 (2015) - [c17]Jinoh Kim, Bin Dong, Surendra Byna, Kesheng Wu:
Security for the scientific data services framework. IEEE BigData 2015: 1871-1875 - [c16]Jinoh Kim, Ilhwan Moon, Kyung-Il Lee, Sang C. Suh, Ikkyun Kim:
Scalable Security Event Aggregation for Situation Analysis. BigDataService 2015: 14-23 - [c15]Anil Kumar, Jinoh Kim, Sang C. Suh, Ganho Choi:
Incorporating multiple cluster models for network traffic classification. LCN 2015: 185-188 - 2014
- [j7]Seonho Kim, Jinoh Kim, Jon B. Weissman:
A Security-enabled Grid System for MINDS Distributed Data Mining. J. Grid Comput. 12(3): 521-542 (2014) - [j6]Ilhwan Moon, Umar Albalawi, Jinoh Kim, Sang C. Suh, Wang-Hwan Lee:
A Hybrid Classifier with a Binning Method for Network Application Identification. J. Integr. Des. Process. Sci. 18(2): 3-22 (2014) - [j5]Jinoh Kim, Jerry Chi-Yuan Chou, Doron Rotem:
iPACS: Power-aware covering sets for energy proportionality and performance in data parallel computing clusters. J. Parallel Distributed Comput. 74(1): 1762-1774 (2014) - 2013
- [j4]Justin Tharp, Jinoh Kim, Sang C. Suh, Hyeonkoo Cho:
Reconciling Multiple Matches for the Signature-Based Application Identification. J. Commun. 8(12): 883-892 (2013) - 2012
- [j3]Jinoh Kim, Doron Rotem:
FREP: Energy proportionality for disk storage using replication. J. Parallel Distributed Comput. 72(8): 960-974 (2012) - [r1]Jerry Chi-Yuan Chou, Jinoh Kim, Doron Rotem:
Energy-Saving Techniques for Disk Storage Systems. Handbook of Energy-Aware and Green Computing 2012: 147-167 - 2011
- [j2]Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Passive Network Performance Estimation for Large-Scale, Data-Intensive Computing. IEEE Trans. Parallel Distributed Syst. 22(8): 1365-1373 (2011) - [c14]Jinoh Kim, Doron Rotem:
Energy proportionality for disk storage using replication. EDBT 2011: 81-92 - [c13]Jerry Chi-Yuan Chou, Jinoh Kim, Doron Rotem:
Energy-Aware Scheduling in Disk Storage Systems. ICDCS 2011: 423-433 - [c12]Jinoh Kim, Hasan Abbasi, Luis Chacón, Ciprian Docan, Scott Klasky, Qing Liu, Norbert Podhorszki, Arie Shoshani, Kesheng Wu:
Parallel in situ indexing for data-intensive computing. LDAV 2011: 65-72 - [c11]Jinoh Kim, Jerry Chi-Yuan Chou, Doron Rotem:
Energy Proportionality and Performance in Data Parallel Computing Clusters. SSDBM 2011: 414-431 - 2010
- [c10]Jinoh Kim, Doron Rotem:
Using Replication for Energy Conservation in RAID Systems. PDPTA 2010: 703-709
2000 – 2009
- 2009
- [j1]Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems. IEEE Trans. Parallel Distributed Syst. 20(6): 788-801 (2009) - 2008
- [c9]Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Accessibility-Based Resource Selection in Loosely-Coupled Distributed Systems. ICDCS 2008: 777-784 - 2007
- [c8]Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Exploiting Heterogeneity for Collective Data Downloading in Volunteer-based Networks. CCGRID 2007: 275-282 - [c7]Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim:
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. International Conference on Computational Science (1) 2007: 1222-1229 - [c6]Krishnaveni Budati, Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
NGS: Service Adaptation in Open Grid Platforms. IPDPS 2007: 1-8 - 2005
- [c5]Geonlyang Kim, Jinoh Kim, Jungchan Na:
Design and Implementation of Policy Decision Point in Policy-Based Network. ACIS-ICIS 2005: 534-538 - 2004
- [c4]Geonlyang Kim, Jinoh Kim, Jungchan Na, Jongsoo Jang:
Role-based policy distribution techniques in policy-based networks. Communications, Internet, and Information Technology 2004: 103-107 - 2003
- [c3]Moon Sun Shin, Hosung Moon, Keun Ho Ryu, Kiyoung Kim, Jinoh Kim:
Applying Data Mining Techniques to Analyze Alert Data. APWeb 2003: 193-200 - [c2]Jinoh Kim, Ikkyun Kim, Kiyoung Kim, Jongsoo Jang, Sung Won Sohn, Koohong Kang:
An Integrated Network-Wide Defense Framework (INwDF) for Large Networks. Security and Management 2003: 20-26 - 2002
- [c1]Jinoh Kim, Kiyoung Kim, Jongsoo Jang:
Policy-Based Intrusion Detection and Automated Response Mechanism. ICOIN (2) 2002: 399-408
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint