default search action
Nur Izura Udzir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Mahjabeen Tahir, Azizol Abdullah, Nur Izura Udzir, Khairul Azhar Kasmiran:
A novel approach for handling missing data to enhance network intrusion detection system. Cyber Secur. Appl. 3: 100063 (2025) - 2023
- [j34]Muhammed Siraj, Mohd Izuan Hafez Ninggal, Nur Izura Udzir, Muhammad Daniel Hafiz Abdullah, Aziah Asmawi:
Smart - Contract Privacy Preservation Mechanism. EAI Endorsed Trans. Scalable Inf. Syst. 10(6) (2023) - 2022
- [j33]Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Adnan Abdul-Aziz Gutub:
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data. IEEE Access 10: 65439-65458 (2022) - [j32]Ghoncheh Babanejad Dehaki, Hamidah Ibrahim, Ali Amer Alwan, Fatimah Sidi, Nur Izura Udzir, Ma'aruf Mohammed Lawal:
Efficient Region-Based Skyline Computation for a Group of Users. IEEE Access 10: 94496-94517 (2022) - [j31]Ghoncheh Babanejad Dehaki, Hamidah Ibrahim, Ali Amer, Fatimah Sidi, Nur Izura Udzir, Ma'aruf Mohammed Lawal:
A Continuous Region-Based Skyline Computation for a Group of Mobile Users. Symmetry 14(10): 2003 (2022) - 2021
- [j30]Ghazaleh Babanejad Dehaki, Hamidah Ibrahim, Ali Amer Alwan, Fatimah Sidi, Nur Izura Udzir:
Efficient Skyline Computation Over an Incomplete Database With Changing States and Structures. IEEE Access 9: 88699-88723 (2021) - [j29]Hassan Mansur Hussien, Sharifah Md Yasin, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Sadeq Salman:
Blockchain technology in the healthcare industry: Trends and opportunities. J. Ind. Inf. Integr. 22: 100217 (2021) - [j28]Hassan Mansur Hussien, Sharifah Md Yasin, Nur Izura Udzir, Mohd Izuan Hafez Ninggal:
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage. Sensors 21(7): 2462 (2021) - [j27]Teo Poh Kuang, Hamidah Ibrahim, Fatimah Sidi, Nur Izura Udzir, Ali Amer Alwan:
An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment. Symmetry 13(12): 2394 (2021) - [c52]Gulmira Shakhmetova, Zhanat Saukhanova, Nur Izura Udzir, Altynbek Sharipbay, Nurgazy Saukhanov:
Application of Pseudo-Memory Finite Automata for Information Encryption. IntelITSIS 2021: 330-339 - 2020
- [j26]Ghazaleh Babanejad Dehaki, Hamidah Ibrahim, Fatimah Sidi, Nur Izura Udzir, Ali Amer Alwan, Yonis Gulzar:
Efficient Computation of Skyline Queries Over a Dynamic and Incomplete Database. IEEE Access 8: 141523-141546 (2020) - [c51]Ghazaleh Babanejad Dehaki, Hamidah Ibrahim, Fatimah Sidi, Nur Izura Udzir, Ali Amer Alwan:
A Rule-based Skyline Computation over a Dynamic Database. iiWAS 2020: 97-103 - [i5]Muhammed Siraj, Mohd Izuan Hafez Ninggal, Nur Izura Udzir, Muhammad Daniel Hafiz Abdullah, Aziah Asmawi:
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud. CoRR abs/2004.02543 (2020)
2010 – 2019
- 2019
- [j25]Hassan Mansur Hussien, Sharifah Md Yasin, Nur Izura Udzir, Aws Alaa Zaidan, Bilal Bahaa Zaidan:
A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction. J. Medical Syst. 43(10): 320:1-320:35 (2019) - [j24]Asif Iqbal Hajamydeen, Nur Izura Udzir:
A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework. Scalable Comput. Pract. Exp. 20(1): 113-160 (2019) - [i4]B. Prabadevi, N. Jeyanthi, Nur Izura Udzir, Dhinaharan Nagamalai:
Lattice Structural Analysis on Sniffing to Denial of Service Attacks. CoRR abs/1907.12735 (2019) - 2018
- [j23]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi:
Missing values estimation for skylines in incomplete database. Int. Arab J. Inf. Technol. 15(1): 66-75 (2018) - [c50]Ghazaleh Babanejad Dehaki, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, Ali Amer Alwan:
Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database. iiWAS 2018: 190-199 - [c49]Ghoncheh Babanejad Dehaki, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi, Ali Amer Alwan:
A Framework for Processing Skyline Queries for a Group of Mobile Users. iiWAS 2018: 333-339 - 2017
- [j22]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
State of the Art in Biometric Key Binding and Key Generation Schemes. Int. J. Commun. Networks Inf. Secur. 9(3) (2017) - [j21]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi:
Processing skyline queries in incomplete distributed databases. J. Intell. Inf. Syst. 48(2): 399-420 (2017) - 2016
- [j20]Asif Iqbal Hajamydeen, Nur Izura Udzir:
A refined filter for UHAD to improve anomaly detection. Secur. Commun. Networks 9(14): 2434-2447 (2016) - [c48]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Hybrid Scheme for Face Template Protection. IMCOM 2016: 6:1-6:7 - [c47]Ahmad Riza'ain Yusof, Nur Izura Udzir, Ali Selamat:
An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack. IEA/AIE 2016: 95-102 - [c46]Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd Sani, Hamidah Ibrahim:
Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes. SCDM 2016: 560-569 - [c45]Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. WISA 2016: 341-352 - [i3]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Ali Dehghan Tanha:
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. CoRR abs/1604.00980 (2016) - [i2]Mohd Anuar Mat Isa, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2015
- [j19]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. J. Inf. Sci. Eng. 31(1): 59-93 (2015) - [c44]Waleed Halboob, Ramlan Mahmod, Nur Izura Udzir, Mohd Taufik Abdullah:
Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation. FNC/MobiSPC 2015: 370-375 - [i1]Auday H. Al-Wattar, Ramlan Mahmod, Zuriati Ahmad Zukarnain, Nur Izura Udzir:
A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation. CoRR abs/1502.03544 (2015) - 2014
- [j18]Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid:
An Overview of Media Streams Caching in Peer-to-Peer Systems. Comput. J. 57(8): 1167-1177 (2014) - [j17]Hassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir:
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks. Clust. Comput. 17(2): 551-568 (2014) - [j16]NorazahAbd Aziz, Nur Izura Udzir, Ramlan Mahmod:
Extending TLS with Mutual Attestation for Platform Integrity Assurance. J. Commun. 9(1): 63-72 (2014) - [j15]Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid:
Windows Web Proxy Caching simulation: a Tool for simulating Web Proxy Caching under Windows Operating Systems. J. Comput. Sci. 10(8): 1380-1388 (2014) - [j14]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Mostafa Behzadi, Ramlan Mahmod, Norwati Mustapha:
Intrusion Detection System in Secure Shell Traffic in Cloud Environment. J. Comput. Sci. 10(10): 2029-2036 (2014) - [c43]Teo Poh Kuang, Hamidah Ibrahim, Nur Izura Udzir, Fatimah Sidi:
XACML Policy Inconsistency Analysis and Resolution. DATA 2014: 133-138 - [c42]Waheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid:
Intelligent Cooperative Least Recently Used Web Caching Policy based on J48 Classifier. iiWAS 2014: 262-269 - [c41]Reza Adinehnia, Nur Izura Udzir, Lilly Suriani Affendey, Iskandar Ishak, Zurina Mohd Hanapi:
Effective mining on large databases for intrusion detection. ISBAST 2014: 204-207 - [c40]Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Hazura Zulzalil, Zaiton Muda:
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers. ISBAST 2014: 232-237 - [c39]Mehdi Barati, Azizol Abdullah, Nur Izura Udzir, Ramlan Mahmod, Norwati Mustapha:
Distributed Denial of Service detection using hybrid machine learning technique. ISBAST 2014: 268-273 - [c38]Warusia Yassin, Nur Izura Udzir, Azizol Abdullah, Mohd Taufik Abdullah, Zaiton Muda, Hazura Zulzalil:
Packet Header Anomaly Detection Using Statistical Analysis. SOCO-CISIS-ICEUTE 2014: 473-482 - 2012
- [j13]Hamid Jazayeriy, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir:
Generating Pareto-Optimal Offers in Bilateral Automated Negotiation with One-Side Uncertain Importance Weights. Comput. Informatics 31(6): 1235-1253 (2012) - [j12]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
An encoding scheme based on fractional number for querying and updating XML data. J. Syst. Softw. 85(8): 1831-1851 (2012) - [j11]Hassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir:
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks. Peer-to-Peer Netw. Appl. 5(1): 1-13 (2012) - [j10]Mohammad Reza HeidariNezhad, Zuriati Ahmad Zukarnain, Nur Izura Udzir, Mohamed Othman:
An Intra-domain Mobility Handling Scheme Across All-IP Wireless Networks. Wirel. Pers. Commun. 63(2): 297-317 (2012) - [c37]Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin:
Towards secure model for SCADA systems. CyberSec 2012: 60-64 - [c36]Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Mar Yah Said, Nur Izura Udzir, Ali Dehghantanha:
Finest authorizing member of common criteria certification. CyberSec 2012: 155-160 - [c35]Solmaz Salehian, Farzaneh Masoumiyan, Nur Izura Udzir:
Energy-efficient intrusion detection in Wireless Sensor Network. CyberSec 2012: 207-212 - [c34]Warusia Yassin, Nur Izura Udzir, Zaiton Muda, Azizol Abdullah, Mohd Taufik Abdullah:
A Cloud-based Intrusion Detection Service framework. CyberSec 2012: 213-218 - [c33]Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah:
Hierarchical secure virtualization model for cloud. CyberSec 2012: 219-224 - [c32]Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asilah Wati Abdul Hamid:
An alert fusion model inspired by artificial immune system. CyberSec 2012: 317-322 - [c31]Hassan Barjini, Mohamed Othman, Hamidah Ibrahim, Nur Izura Udzir:
Analytical Studies and Experimental Examines for Flooding-Based Search Algorithms. ICICA (LNCS) 2012: 299-306 - [c30]M. N. Zawawi, Ramlan Mahmod, Nur Izura Udzir, Fatimah Ahmad, J. M. Desa:
Active warden as the main hindrance for steganography information retrieval. CAMP 2012: 277-280 - [c29]Ali Amer Alwan, Hamidah Ibrahim, Tan Chik Yip, Nur Izura Udzir, Fatimah Sidi:
A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database. ANT/MobiWIS 2012: 894-901 - [c28]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
A Compact Bit String Accessibility Map for Secure XML Query Processing. ANT/MobiWIS 2012: 1172-1179 - 2011
- [j9]Waheed Yasin, Hamidah Ibrahim, Nor Asilah Wati Abdul Hamid, Nur Izura Udzir:
A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems. Comput. Inf. Sci. 4(1): 28-41 (2011) - [j8]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir:
A Framework for Checking and Ranking Integrity Constraints in a Distributed Database. J. Next Gener. Inf. Technol. 2(1): 37-48 (2011) - [j7]Faramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md. Nasir bin Sulaiman, Nur Izura Udzir:
Adaptable Decentralized Service Oriented Architecture. J. Syst. Softw. 84(10): 1591-1617 (2011) - [j6]Hamid Jazayeriy, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir:
The Learning of an Opponent's Approximate Preferences in Bilateral Automated Negotiation. J. Theor. Appl. Electron. Commer. Res. 6(3): 65-84 (2011) - [c27]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards data centric mobile security. IAS 2011: 62-67 - [c26]Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir:
Investigation of bypassing malware defences and malware detections. IAS 2011: 173-178 - [c25]Zaiton Muda, Warusia Yassin, Md Nasir Sulaiman, Nur Izura Udzir:
Intrusion detection based on k-means clustering and OneR classification. IAS 2011: 192-197 - [c24]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems. CISIS 2011: 272-284 - [c23]Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating. DEIS 2011: 466-477 - [c22]Waheed Yasin, Hamidah Ibrahim, Nor Asilah Wati Abdul Hamid, Nur Izura Udzir:
Performance Analysis of Transport Control Protocol Flavours in the Existence of Packet Reordering Phenomena. DEIS 2011: 569-579 - [c21]Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim:
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment. ICEEI 2011: 1-6 - [c20]Zul Hilmi Abdullah, Nur Izura Udzir, Ramlan Mahmod, Khairulmizam Samsudin:
File Integrity Monitor Scheduling Based on File Security Level Classification. ICSECS (2) 2011: 177-189 - [c19]Meghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir:
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. NDT 2011: 24-36 - [c18]Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
An Access Control Model for Supporting XML Document Updating. NDT 2011: 37-46 - [c17]Ali Amer Alwan, Hamidah Ibrahim, Tan Chik Yip, Fatimah Sidi, Nur Izura Udzir:
Performance Evaluation of Preference Evaluation Techniques. NDT 2011: 212-223 - 2010
- [j5]Nur Izura Udzir, Hamidah Ibrahim, Sileshi Demesie:
Finer Garbage Collection in Lindacap. Int. J. Inf. Technol. Web Eng. 5(3): 1-26 (2010) - [j4]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir:
A Model for Ranking and Selecting Integrity Tests in a Distributed Database. Int. J. Inf. Technol. Web Eng. 5(3): 65-84 (2010) - [c16]Ali Dehghantanha, Nur Izura Udzir, Ramlan Mahmod:
Towards a Pervasive Formal Privacy Language. AINA Workshops 2010: 1085-1091
2000 – 2009
- 2009
- [j3]Mohammad Reza HeidariNezhad, Zuriati Zukarnain, Nur Izura Udzir, Mohamed Othman:
Mobility support across hybrid IP-based wireless environment: review of concepts, solutions, and related issues. Ann. des Télécommunications 64(9-10): 677-691 (2009) - [j2]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir:
Improved Integrity Constraints Checking in Distributed Databases by Exploiting Local Checking. J. Comput. Sci. Technol. 24(4): 665-674 (2009) - [c15]Shahram Golzari, Shyamala Doraisamy, Md Nasir Sulaiman, Nur Izura Udzir:
Improving the accuracy of AIRS by incorporating real world tournament selection in resource competition phase. IEEE Congress on Evolutionary Computation 2009: 3040-3044 - [c14]Faramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir:
SLA-Driven Business Process Distribution. eKNOW 2009: 14-21 - [c13]Nur Izura Udzir, Sileshi Demesie, Hamidah Ibrahim:
Garbage collection in LINDACAP. iiWAS 2009: 104-112 - [c12]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir:
Ranking and selecting integrity tests in a distributed database. iiWAS 2009: 185-192 - [c11]Faramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir:
Using process mining to business process distribution. SAC 2009: 2140-2145 - [c10]Faramarz Safi Esfahani, Masrah Azrifah Azmi Murad, Md Nasir Sulaiman, Nur Izura Udzir:
A Frequent Path Mining Algorithm to Intelligent Business Process Decomposition. SWWS 2009: 197-203 - 2008
- [c9]Shahram Golzari, Shyamala Doraisamy, Md. Nasir bin Sulaiman, Nur Izura Udzir:
A Review on Concepts, Algorithms and Recognition Based Applications of Artificial Immune System. CSICC 2008: 569-576 - [c8]Shahram Golzari, Shyamala Doraisamy, Noris Mohd. Norowi, Md Nasir Sulaiman, Nur Izura Udzir:
A Comprehensive Study in Benchmarking Feature Selection and Classification Approaches for Traditional Malay Music Genre Classification. DMIN 2008: 71-77 - [c7]Shahram Golzari, Shyamala Doraisamy, Md Nasir Sulaiman, Nur Izura Udzir:
Notes on Using Nonlinear Resource Allocation Methods in AIRS Classifier. DMIN 2008: 91-95 - [c6]Shahram Golzari, Shyamala Doraisamy, Md Nasir Sulaiman, Nur Izura Udzir, Noris Mohd Norowi:
Artificial Immune Recognition System with Nonlinear Resource Allocation Method and Application to Traditional Malay Music Genre Classification. ICARIS 2008: 132-141 - [c5]Shyamala Doraisamy, Shahram Golzari, Noris Mohd. Norowi, Md Nasir Sulaiman, Nur Izura Udzir:
A Study on Feature Selection and Classification Techniques for Automatic Genre Classification of Traditional Malay Music. ISMIR 2008: 331-336 - [c4]Ali Amer Alwan, Hamidah Ibrahim, Nur Izura Udzir:
A Model for Ranking and Selecting Integrity Tests in Distributed Database. PDPTA 2008: 458-464 - 2007
- [j1]Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob:
Coordination with multicapabilities. Sci. Comput. Program. 64(2): 205-222 (2007) - [c3]Hamidah Ibrahim, Ali Amer Alwan, Nur Izura Udzir:
Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. PDCAT 2007: 151-152 - 2006
- [b1]Nur Izura Udzir:
Capability-based coordination for open distributed systems. University of York, UK, 2006 - 2005
- [c2]Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob:
Coordination with Multicapabilities. COORDINATION 2005: 79-93 - 2004
- [c1]Nur Izura Udzir, Alan Wood:
Implementing contract net in tuple space models. Parallel and Distributed Computing and Networks 2004: 325-330
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint