default search action
Akond Ashfaque Ur Rahman
Person information
- affiliation: Auburn University, USA
- affiliation (former): North Carolina State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Md. Jobair Hossain Faruk, Fazlul Alam, Mazharul Islam, Akond Rahman:
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency. Clust. Comput. 27(4): 4015-4034 (2024) - [j15]Akond Rahman, Dibyendu Brinto Bose, Farhat Lamia Barsha, Rahul Pandita:
Defect Categorization in Compilers: A Multi-vocal Literature Review. ACM Comput. Surv. 56(4): 104:1-104:42 (2024) - [j14]Akond Rahman, Dibyendu Brinto Bose, Yue Zhang, Rahul Pandita:
An empirical study of task infections in Ansible scripts. Empir. Softw. Eng. 29(1): 34 (2024) - [j13]Md. Mahadi Hassan, John Salvador, Shubhra Kanti Karmaker Santu, Akond Rahman:
State Reconciliation Defects in Infrastructure as Code. Proc. ACM Softw. Eng. 1(FSE): 1865-1888 (2024) - [c62]Md. Mostafizur Rahman, Abdul Barek, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu:
Authentic Learning on DevOps Security with Labware: Git Hooks To Facilitate Automated Security Static Analysis. COMPSAC 2024: 2418-2423 - [c61]Abdul Barek, Md. Mostafizur Rahman, Mst. Shapna Akter, ABM Kamrul Islam Riad, Md. Abdur Rahman, Hossain Shahriar, Akond Rahman, Fan Wu:
Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module. COMPSAC 2024: 2424-2429 - [c60]Yue Zhang, Rachel Meredith, Wilson Reeves, Julia Coriolano, Muhammad Ali Babar, Akond Rahman:
Does Generative AI Generate Smells Related to Container Orchestration?: An Exploratory Study with Kubernetes Manifests. MSR 2024: 192-196 - [c59]Pemsith Mendis, Wilson Reeves, Muhammad Ali Babar, Yue Zhang, Akond Rahman:
Evaluating the Quality of Open Source Ansible Playbooks: An Executability Perspective. SEA4DQ@SIGSOFT FSE 2024: 2-5 - [c58]Akond Rahman, Yue Zhang, Fan Wu, Hossain Shahriar:
Student Perceptions of Authentic Learning to Learn White-box Testing. SIGCSE (2) 2024: 1784-1785 - [i19]Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr., Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl:
Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns. CoRR abs/2405.06371 (2024) - 2023
- [j12]Akond Rahman, Dibyendu Brinto Bose, Raunak Shakya, Rahul Pandita:
Come for syntax, stay for speed, understand defects: an empirical study of defects in Julia programs. Empir. Softw. Eng. 28(4): 93 (2023) - [j11]Farzana Ahamed Bhuiyan, Akond Rahman:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Trans. Priv. Secur. 26(2): 17:1-17:24 (2023) - [j10]Akond Rahman, Shazibul Islam Shamim, Dibyendu Brinto Bose, Rahul Pandita:
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study. ACM Trans. Softw. Eng. Methodol. 32(4): 99:1-99:36 (2023) - [j9]Akond Rahman, Chris Parnin:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-Based Infrastructure Management. IEEE Trans. Software Eng. 49(6): 3536-3553 (2023) - [c57]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. COMPSAC 2023: 1057-1063 - [c56]Md Arabin Islam Talukder, Sumaiya Farzana Mishu, Hossain Shahriar, ABM Kamrul Islam Riad, Fan Wu, Akond Rahman:
A Plugin for Kotlin based Android Apps to Detect Security Breaches through Dataflow. COMPSAC 2023: 1840-1845 - [c55]Yue Zhang, Muktadir Rahman, Fan Wu, Akond Rahman:
Quality Assurance for Infrastructure Orchestrators: Emerging Results from Ansible. ICSA-C 2023: 1-3 - [c54]Yue Zhang, Fan Wu, Akond Rahman:
Practitioner Perceptions of Ansible Test Smells. ICSA-C 2023: 1-3 - [c53]Hanyang Hu, Yani Bu, Kristen Wong, Gaurav Sood, Karen Smiley, Akond Rahman:
Characterizing Static Analysis Alerts for Terraform Manifests: An Experience Report. SecDev 2023: 7-13 - [i18]Mst. Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Asadur Rahman, Atef Mohamed, Mohammad Ashiqur Rahman, Akond Rahman, Fan Wu:
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection. CoRR abs/2306.00284 (2023) - [i17]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. CoRR abs/2306.08060 (2023) - [i16]Mst. Shapna Akter, Juanjose Rodriguez-Cardenas, Hossain Shahriar, Akond Rahman, Fan Wu:
Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python. CoRR abs/2311.16944 (2023) - 2022
- [c52]Dibyendu Brinto Bose, Kaitlyn Cottrell, Akond Rahman:
Vision for a secure Elixir ecosystem: an empirical study of vulnerabilities in Elixir programs. ACM Southeast Regional Conference 2022: 215-218 - [c51]Dibyendu Brinto Bose, Gerald C. Gannod, Akond Rahman, Kaitlyn Cottrell:
What questions do developers ask about Julia? ACM Southeast Regional Conference 2022: 224-228 - [c50]Md. Jobair Hossain Faruk, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Akond Rahman:
Bie Vote: A Biometric Identification Enabled Blockchain-Based Secure and Transparent Voting Framework. BCCA 2022: 253-258 - [c49]Mohammad Masum, Nafisa Anjum, Md. Jobair Hossain Faruk, Hossain Shahriar, Nazmus Sakib, Maria Valero, Mohammed Karim, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
A Novel Machine Learning Based Framework for Bridge Condition Analysis. IEEE Big Data 2022: 5530-5535 - [c48]Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Nazmus Sakib, Akond Rahman, Fan Wu, Alfredo Cuzzocrea:
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. IEEE Big Data 2022: 5639-5645 - [c47]Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. COMPSAC 2022: 520-529 - [c46]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? COMPSAC 2022: 530-538 - [c45]Farzana Ahamed Bhuiyan, Stacy J. Prowell, Hossain Shahriar, Fan Wu, Akond Rahman:
Shifting Left for Machine Learning: An Empirical Study of Security Weaknesses in Supervised Learning-based Projects. COMPSAC 2022: 798-808 - [c44]Akond Rahman, Farzana Ahamed Bhuiyan, Mohammad Mehedi Hassan, Hossain Shahriar, Fan Wu:
Towards Automation for MLOps: An Exploratory Study of Bot Usage in Deep Learning Libraries. COMPSAC 2022: 1093-1097 - [c43]Mohammad Mehedi Hassan, Akond Rahman:
As Code Testing: Characterizing Test Quality in Open Source Ansible Development. ICST 2022: 208-219 - [c42]Md. Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu:
Investigating Novel Approaches to Defend Software Supply Chain Attacks. ISSRE Workshops 2022: 283-288 - [c41]Akond Rahman, Md. Shazibul Islam Shamim, Hossain Shahriar, Fan Wu:
Can We use Authentic Learning to Educate Students about Secure Infrastructure as Code Development? ITiCSE (2) 2022: 631 - [c40]Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. TrustCom 2022: 959-967 - [c39]Akond Rahman, Tushar Sharma:
Lessons from Research to Practice on Writing Better Quality Puppet Scripts. SANER 2022: 63-67 - [i15]Paramita Basak Upama, Md. Jobair Hossain Faruk, Mohammad Nazim, Mohammad Masum, Hossain Shahriar, Gias Uddin, Shabir Barzanjeh, Sheikh Iqbal Ahamed, Akond Rahman:
Evolution of Quantum Computing: A Systematic Survey on the Use of Quantum Computing Tools. CoRR abs/2204.01856 (2022) - [i14]Mohammad Masum, Mohammad Nazim, Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Md Abdullah Hafiz Khan, Gias Uddin, Shabir Barzanjeh, Erhan Saglamyurek, Akond Rahman, Sheikh Iqbal Ahamed:
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go? CoRR abs/2204.02784 (2022) - [i13]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan Chia-Tien Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. CoRR abs/2206.12770 (2022) - [i12]Akond Rahman, Chris Parnin:
Detecting and Characterizing Propagation of Security Weaknesses in Puppet-based Infrastructure Management. CoRR abs/2208.01242 (2022) - [i11]Shazibul Islam Shamim, Jonathan Alexander Gibson, Patrick Morrison, Akond Rahman:
Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes. CoRR abs/2211.07032 (2022) - 2021
- [j8]Farzana Ahamed Bhuiyan, Md Bulbul Sharif, Akond Rahman:
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study. IEEE Access 9: 28471-28495 (2021) - [j7]Akond Rahman, Laurie A. Williams:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. IEEE Secur. Priv. 19(3): 33-41 (2021) - [j6]Akond Ashfaque Ur Rahman, Effat Farhana:
An Empirical Study of Bugs in COVID-19 Software Projects. J. Softw. Eng. Res. Dev. 9: 3:1-3:19 (2021) - [j5]Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. ACM Trans. Softw. Eng. Methodol. 30(1): 3:1-3:31 (2021) - [c38]Md. Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael E. Whitman, Alfredo Cuzzocrea, Dan C. Lo, Akond Rahman, Fan Wu:
Malware Detection and Prevention using Artificial Intelligence Techniques. IEEE BigData 2021: 5369-5377 - [c37]Kaitlyn Cottrell, Dibyendu Brinto Bose, Hossain Shahriar, Akond Rahman:
An Empirical Study of Vulnerabilities in Robotics. COMPSAC 2021: 735-744 - [c36]Akond Rahman, Hossain Shahriar, Dibyendu Brinto Bose:
How Do Students Feel About Automated Security Static Analysis Exercises? FIE 2021: 1-4 - [c35]Dibyendu Brinto Bose, Akond Rahman, Md. Shazibul Islam Shamim:
'Under-reported' Security Defects in Kubernetes Manifests. EnCyCriS@ICSE 2021: 9-12 - [c34]Farzana Ahamed Bhuiyan, Justin Murphy, Patrick Morrison, Akond Rahman:
Practitioner Perception of Vulnerability Discovery Strategies. EnCyCriS@ICSE 2021: 41-44 - [c33]Akond Rahman, Hossain Shahriar, Dibyendu Brinto Bose:
Exercise Perceptions: Experience Report from a Secure Software Development Course. QUATIC 2021: 521-535 - [c32]Akond Rahman, Farhat Lamia Barsha, Patrick Morrison:
Shhh!: 12 Practices for Secret Management in Infrastructure as Code. SecDev 2021: 56-62 - 2020
- [j4]Akond Rahman, Effat Farhana, Laurie A. Williams:
The 'as code' activities: development anti-patterns for infrastructure as code. Empir. Softw. Eng. 25(5): 3430-3467 (2020) - [c31]Farzana Ahamed Bhuiyan, Raunak Shakya, Akond Rahman:
Can we use software bug reports to identify vulnerability discovery strategies? HotSoS 2020: 7:1-7:10 - [c30]Justin Murphy, Elias T. Brady, Md. Shazibul Islam Shamim, Akond Rahman:
A curated dataset of security defects in scientific software projects. HotSoS 2020: 13:1-13:2 - [c29]Raunak Shakya, Akond Rahman:
A preliminary taxonomy of techniques used in software fuzzing. HotSoS 2020: 14:1-14:2 - [c28]Akond Rahman, Effat Farhana, Chris Parnin, Laurie A. Williams:
Gang of eight: a defect taxonomy for infrastructure as code scripts. ICSE 2020: 752-764 - [c27]Farzana Ahamed Bhuiyan, Akond Rahman, Patrick Morrison:
Vulnerability discovery strategies used in software projects. ASE Workshops 2020: 13-18 - [c26]Farzana Ahamed Bhuiyan, Akond Rahman:
Characterizing co-located insecure coding patterns in infrastructure as code scripts. ASE Workshops 2020: 27-32 - [c25]Akond Rahman, Farzana Ahamed Bhuiyan:
A vision to mitigate bioinformatics software development challenges. ASE Workshops 2020: 57-60 - [c24]Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman:
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices. SecDev 2020: 58-64 - [i10]Akond Rahman, Effat Farhana, Laurie A. Williams:
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code. CoRR abs/2006.00177 (2020) - [i9]Akond Rahman, Effat Farhana:
An Exploratory Characterization of Bugs in COVID-19 Software Projects. CoRR abs/2006.00586 (2020) - [i8]Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, Akond Rahman:
XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices. CoRR abs/2006.15275 (2020)
2010 – 2019
- 2019
- [j3]Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
A systematic mapping study of infrastructure as code research. Inf. Softw. Technol. 108: 65-77 (2019) - [j2]Akond Rahman, Laurie A. Williams:
Source code properties of defective infrastructure as code scripts. Inf. Softw. Technol. 112: 148-163 (2019) - [c23]Kanthi K. Sarpatwar, Venkata Sitaramagiridharganesh Ganapavarapu, Karthikeyan Shanmugam, Akond Rahman, Roman Vaculín:
Blockchain Enabled AI Marketplace: The Price You Pay for Trust. CVPR Workshops 2019: 2857-2866 - [c22]Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie A. Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6 - [c21]Akond Rahman, Laurie A. Williams:
A bird's eye view of knowledge needs related to penetration testing. HotSoS 2019: 9:1-9:2 - [c20]Akond Rahman, Chris Parnin, Laurie A. Williams:
The seven sins: security smells in infrastructure as code scripts. ICSE 2019: 164-175 - [c19]Effat Farhana, Nasif Imtiaz, Akond Rahman:
Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software. ICSME 2019: 496-500 - [c18]Md. Rayhanur Rahman, Akond Rahman, Laurie A. Williams:
Share, But be Aware: Security Smells in Python Gists. ICSME 2019: 536-540 - [c17]Akond Rahman, Effat Farhana, Nasif Imtiaz:
Snakes in paradise?: insecure python-related coding practices in stack overflow. MSR 2019: 200-204 - [c16]Nasif Imtiaz, Akond Rahman, Effat Farhana, Laurie A. Williams:
Challenges with responding to static analysis tool alerts. MSR 2019: 245-249 - [i7]Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Infrastructure as Code Scripts. CoRR abs/1907.07159 (2019) - 2018
- [c15]Akond Rahman, Asif Partho, Patrick Morrison, Laurie A. Williams:
What questions do programmers ask about configuration as code? RCoSE@ICSE 2018: 16-22 - [c14]Amritanshu Agrawal, Akond Rahman, Rahul Krishna, Alexander Sobran, Tim Menzies:
We don't need another hero?: the impact of "heroes" on software development. ICSE (SEIP) 2018: 245-253 - [c13]Rahul Krishna, Amritanshu Agrawal, Akond Rahman, Alexander Sobran, Tim Menzies:
What is the connection between issues, bugs, and enhancements?: lessons learned from 800+ software projects. ICSE (SEIP) 2018: 306-315 - [c12]Akond Rahman, Jonathan Stallings, Laurie A. Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. ICSE (Companion Volume) 2018: 414-415 - [c11]Akond Rahman:
Characteristics of defective infrastructure as code scripts in DevOps. ICSE (Companion Volume) 2018: 476-479 - [c10]Akond Rahman, Laurie A. Williams:
Characterizing Defective Configuration Scripts Used for Continuous Deployment. ICST 2018: 34-45 - [c9]Akond Rahman:
Anti-Patterns in Infrastructure as Code. ICST 2018: 434-435 - [c8]Akond Rahman:
Comprehension effort and programming activities: related? or not related? MSR 2018: 66-69 - [c7]Akond Rahman, Amritanshu Agrawal, Rahul Krishna, Alexander Sobran:
Characterizing the influence of continuous integration: empirical results from 250+ open source and proprietary projects. SWAN@ESEC/SIGSOFT FSE 2018: 8-14 - [i6]Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research. CoRR abs/1807.04872 (2018) - [i5]Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie A. Williams:
Categorizing Defects in Infrastructure as Code. CoRR abs/1809.07937 (2018) - [i4]Akond Rahman, Laurie A. Williams:
Source Code Properties of Defective Infrastructure as Code Scripts. CoRR abs/1810.09605 (2018) - 2017
- [c6]Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams:
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. HotSoS 2017: 13-23 - [c5]Akond Rahman, Asif Partho, David Meder, Laurie A. Williams:
Which Factors Influence Practitioners' Usage of Build Automation Tools? RCoSE@ICSE 2017: 20-26 - [c4]Akond Rahman, Priysha Pradhan, Asif Partho, Laurie A. Williams:
Predicting Android Application Security and Privacy Risk with Static Code Metrics. MOBILESoft@ICSE 2017: 149-153 - [i3]Rahul Krishna, Amritanshu Agrawal, Akond Rahman, Alexander Sobran, Tim Menzies:
What is the Connection Between Issues, Bugs, and Enhancements? (Lessons Learned from 800+ Software Projects). CoRR abs/1710.08736 (2017) - [i2]Amritanshu Agrawal, Akond Rahman, Rahul Krishna, Alexander Sobran, Tim Menzies:
We Don't Need Another Hero? The Impact of "Heroes" on Software Development. CoRR abs/1710.09055 (2017) - [i1]Akond Rahman, Amritanshu Agrawal, Rahul Krishna, Alexander Sobran, Tim Menzies:
Continuous Integration: The Silver Bullet? CoRR abs/1711.03933 (2017) - 2016
- [c3]Akond Ashfaque Ur Rahman, Laurie A. Williams:
Security practices in DevOps. HotSoS 2016: 109-111 - [c2]Akond Ashfaque Ur Rahman, Laurie A. Williams:
Software security in DevOps: synthesizing practitioners' perceptions and practices. CSED@ICSE 2016: 70-76 - 2015
- [c1]Akond Ashfaque Ur Rahman, Eric Helms, Laurie A. Williams, Chris Parnin:
Synthesizing Continuous Deployment Practices Used in Software Development. AGILE 2015: 1-10 - 2011
- [j1]Akond Ashfaque Ur Rahman, Atiqul Islam Mollah, Mahmuda Naznin:
Multiple Targets Tracking Using Kinematics in Wireless Sensor Networks. Wirel. Sens. Netw. 3(8): 263-274 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint