default search action
Wissam Mallouli
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Qiang Ni, Antonios Gouglidis, Wissam Mallouli, Heng Siong Lim:
Intrusion Response Systems for the 5G Networks and Beyond: A New Joint Security-vs-QoS Optimization Approach. IEEE Trans. Netw. Sci. Eng. 11(3): 3039-3052 (2024) - [c65]Stylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos:
AI-Powered Penetration Testing using Shennina: From Simulation to Validation. ARES 2024: 169:1-169:7 - [c64]Manh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
AI4SOAR: A Security Intelligence Tool for Automated Incident Response. ARES 2024: 170:1-170:8 - [c63]Charalambos Klitis, Ioannis Makris, Pavlos S. Bouzinis, Dimitrios Christos Asimopoulos, Wissam Mallouli, Kitty Kioskli, Eleni Seralidou, Christos Douligeris, Loizos Christofi:
NERO: Advanced Cybersecurity Awareness Ecosystem for SMEs. ARES 2024: 174:1-174:9 - [c62]Ivan Orefice, Wissam Mallouli, Ana R. Cavalli, Filip Sebek, Alberto Lizarduy:
Diagnosis Automation Using Similarity Analysis: Application to Industrial Systems. ICSOFT 2024: 331-338 - 2023
- [j15]Zujany Salazar, Fatiha Zaïdi, Huu Nghia Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca:
A Network Traffic Mutation Based Ontology, and Its Application to 5G Networks. IEEE Access 11: 43925-43944 (2023) - [j14]Daniele Granata, Massimiliano Rak, Wissam Mallouli:
Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach. IEEE Access 11: 129788-129804 (2023) - [j13]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Tiew On Ting, Qiang Ni, Wissam Mallouli:
Novel modeling and optimization for joint Cybersecurity-vs-QoS Intrusion Detection Mechanisms in 5G networks. Comput. Networks 237: 110051 (2023) - [c61]Manh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca:
A deep learning anomaly detection framework with explainability and robustness. ARES 2023: 134:1-134:7 - [c60]Eduard Paul Enoiu, Dragos Truscan, Andrey Sadovykh, Wissam Mallouli:
VeriDevOps Software Methodology: Security Verification and Validation for DevOps Practices. ARES 2023: 135:1-135:9 - [c59]Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. ARES 2023: 136:1-136:8 - [c58]Francesco G. Caccavale, Huu Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli:
HTTP/2 Attacks Generation using 5Greplay. ARES 2023: 138:1-138:7 - [c57]Valeria Valdés, Ana Rosa Cavalli, Fatiha Zaïdi, Wissam Mallouli:
Testing techniques to assess impact and cascading effects. CloudCom 2023: 269-272 - [c56]Lorens Barraud, Francesco G. Caccavale, Jean-Baptiste Peyrat, Wissam Mallouli, Véronique Capdevielle, Hicham Khalife, Ana Rosa Cavalli:
5G SUCI Catcher: Attack and Detection. CloudCom 2023: 285-290 - [c55]Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. CloudCom 2023: 298-302 - [c54]Valeria Valdés, Fatiha Zaïdi, Ana Rosa Cavalli, Wissam Mallouli:
A Resilience Component for a Digital Twin. FPS (2) 2023: 93-104 - [c53]Anis Bouaziz, Manh-Dung Nguyen, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli:
Study on Adversarial Attacks Techniques, Learning Methods and Countermeasures: Application to Anomaly Detection. ICSOFT 2023: 510-517 - [i3]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Qiang Ni, Antonios Gouglidis, Wissam Mallouli, Heng Siong Lim:
Joint Security-vs-QoS Game Theoretical Optimization for Intrusion Response Mechanisms for Future Network Systems. CoRR abs/2303.08544 (2023) - [i2]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. CoRR abs/2304.05719 (2023) - 2022
- [j12]George Amponis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Wissam Mallouli, Ana R. Cavalli, Dimitrios Klonidis, Evangelos K. Markakis, Panagiotis G. Sarigiannidis:
Threatening the 5G core via PFCP DoS attacks: the case of blocking UAV communications. EURASIP J. Wirel. Commun. Netw. 2022(1): 124 (2022) - [c52]Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli:
Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. ARES 2022: 67:1-67:6 - [c51]Zujany Salazar, Fatiha Zaïdi, Wissam Mallouli, Ana Rosa Cavalli, Huu Nghia Nguyen, Edgardo Montes de Oca:
A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic. ICSOFT 2022: 234-241 - [c50]Wissam Mallouli:
Security Testing as part of Software Quality Assurance: Principles and Challenges. ICST Workshops 2022: 29 - [c49]Zujany Salazar, Ana Rosa Cavalli, Wissam Mallouli, Filip Sebek, Fatiha Zaïdi, Monika Ewa Rakoczy:
Monitoring Approaches for Security and Safety Analysis: Application to a Load Position System. ICST Workshops 2022: 40-48 - [c48]Luong Nguyen, Mariana Segovia, Wissam Mallouli, Edgardo Montes de Oca, Ana R. Cavalli:
Digital Twin for IoT Environments: A Testing and Simulation Tool. QUATIC 2022: 205-219 - [i1]Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco:
The Role of Machine Learning in Cybersecurity. CoRR abs/2206.09707 (2022) - 2021
- [c47]Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca:
5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. ARES 2021: 106:1-106:8 - [c46]Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli:
SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. ARES 2021: 108:1-108:10 - [c45]José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht:
GEIGER: Solution for small businesses to protect themselves against cyber-threats. ARES 2021: 157:1-157:4 - [c44]Max van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit:
A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs. ARES 2021: 158:1-158:12 - [c43]Andrey Sadovykh, Gunnar Widforss, Dragos Truscan, Eduard Paul Enoiu, Wissam Mallouli, Rosa Iglesias, Alessandra Bagnato, Olga Hendel:
VeriDevOps: Automated Protection and Prevention to Meet Security Requirements in DevOps. DATE 2021: 1330-1333 - [c42]Vinh Hoa La, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli:
A Framework for Security Monitoring of Real IoT Testbeds. ICSOFT 2021: 645-652 - 2020
- [c41]Wissam Mallouli, Ana Rosa Cavalli, Alessandra Bagnato, Edgardo Montes de Oca:
Metrics-driven DevSecOps. ICSOFT 2020: 228-233
2010 – 2019
- 2019
- [j11]Guillaume Doyen, Thibault Cholez, Wissam Mallouli, Bertrand Mathieu, Hoang Long Mai, Xavier Marchal, Daishi Kondo, Messaoud Aouadj, Alain Ploix, Edgardo Montes de Oca, Olivier Festor:
An Orchestrated NDN Virtual Infrastructure Transporting Web Traffic: Design, Implementation, and First Experiments with Real End Users. IEEE Commun. Mag. 57(6): 33-39 (2019) - [j10]Erkuden Rios, Eider Iturbe, Xabier Larrucea, Massimiliano Rak, Wissam Mallouli, Jacek Dominiak, Victor Muntés, Peter Matthews, Luis Gonzalez:
Service level agreement-based GDPR compliance and security assurance in (multi)Cloud-based systems. IET Softw. 13(3): 213-222 (2019) - [j9]Valentina Casola, Alessandra De Benedictis, Antonio Riccio, Diego Rivera, Wissam Mallouli, Edgardo Montes de Oca:
A security monitoring system for internet of things. Internet Things 7 (2019) - [j8]Tan N. Nguyen, Hoang Long Mai, Rémi Cogranne, Guillaume Doyen, Wissam Mallouli, Luong Nguyen, Moustapha El Aoun, Edgardo Montes de Oca, Olivier Festor:
Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking. IEEE Trans. Inf. Forensics Secur. 14(9): 2470-2485 (2019) - [c40]Hoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection Functions. CNSM 2019: 1-9 - [c39]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Toward Content-Oriented Orchestration: SDN and NFV as Enabling Technologies for NDN. IM 2019: 594-598 - [c38]Diego Rivera, Edgardo Montes de Oca, Wissam Mallouli, Ana R. Cavalli, Brecht Vermeulen, Matevz Vucnik:
Industrial IoT Security Monitoring and Test on Fed4Fire+ Platforms. ICTSS 2019: 270-278 - 2018
- [j7]Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. Comput. J. 61(8): 1109-1122 (2018) - [j6]Tan N. Nguyen, Hoang Long Mai, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
A Security Monitoring Plane for Named Data Networking Deployment. IEEE Commun. Mag. 56(11): 88-94 (2018) - [c37]Hoang Long Mai, Messaoud Aouadj, Guillaume Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli:
Implementation of content poisoning attack detection and reaction in virtualized NDN networks. ICIN 2018: 1-3 - [c36]Sarah A. Dahab, Erika Silva, Stephane Maag, Ana Rosa Cavalli, Wissam Mallouli:
Enhancing Software Development Process Quality based on Metrics Correlation and Suggestion. ICSOFT 2018: 154-165 - [c35]Sarah A. Dahab, Stephane Maag, Wissam Mallouli, Ana R. Cavalli:
Smart Measurements and Analysis for Software Quality Enhancement. ICSOFT (Selected Papers) 2018: 194-219 - [c34]Hoang Long Mai, Tan N. Nguyen, Guillaume Doyen, Rémi Cogranne, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor:
Towards a security monitoring plane for named data networking and its application against content poisoning attack. NOMS 2018: 1-9 - [c33]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Thibault Cholez, Guillaume Doyen, Wissam Mallouli, Olivier Festor:
Leveraging NFV for the deployment of NDN: Application to HTTP traffic transport. NOMS 2018: 1-5 - 2017
- [c32]Erkuden Rios, Eider Iturbe, Wissam Mallouli, Massimiliano Rak:
Dynamic security assurance in multi-cloud DevOps. CNS 2017: 467-475 - [c31]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli:
A Platform for Security Monitoring of Multi-cloud Applications. Ershov Informatics Conference 2017: 59-71 - [c30]Erkuden Rios, Massimiliano Rak, Eider Iturbe, Wissam Mallouli:
SLA-Based Continuous Security Assurance in Multi-Cloud DevOps. SecSE@ESORICS 2017: 50-68 - [c29]Pamela Carvallo, Ana R. Cavalli, Wissam Mallouli, Erkuden Rios:
Multi-cloud Applications Security Monitoring. GPC 2017: 748-758 - [p1]Théo Combe, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Bertrand Mathieu, Edgardo Montes de Oca:
An SDN and NFV Use Case: NDN Implementation and Security Monitoring. Guide to Security in SDN and NFV 2017: 299-321 - 2016
- [j5]José Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca:
An approach for deploying and monitoring dynamic security policies. Comput. Secur. 58: 20-38 (2016) - [c28]Xavier Marchal, Moustapha El Aoun, Bertrand Mathieu, Wissam Mallouli, Thibault Cholez, Guillaume Doyen, Patrick Truong, Alain Ploix, Edgardo Montes de Oca:
A virtualized and monitored NDN infrastructure featuring a NDN/HTTP gateway. ICN 2016: 225-226 - [c27]Erkuden Rios, Wissam Mallouli, Massimiliano Rak, Valentina Casola, Antonio M. Ortiz:
SLA-Driven Monitoring of Multi-cloud Application Components Using the MUSA Framework. ICDCS Workshops 2016: 55-60 - [c26]Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sánchez, Fatiha Zaïdi:
Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach. ICDCS Workshops 2016: 61-66 - [c25]Diego Rivera, Ana R. Cavalli, Natalia Kushik, Wissam Mallouli:
An Implementation of a QoE Evaluation Technique Including Business Model Parameters. ICSOFT-PT 2016: 138-145 - 2015
- [j4]Felipe Barbosa Abreu, Anderson Nunes Paiva Morais, Ana R. Cavalli, Bachar Wehbi, Edgardo Montes de Oca, Wissam Mallouli:
An effective attack detection approach in wireless mesh networks. Int. J. Space Based Situated Comput. 5(2): 89-99 (2015) - [c24]Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca:
Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. ARES 2015: 741-748 - [c23]Antonio M. Ortiz, Erkuden Rios, Wissam Mallouli, Eider Iturbe, Edgardo Montes de Oca:
Self-protecting multi-cloud applications. CNS 2015: 643-647 - [c22]Raul A. Fuentes-Samaniego, Ana R. Cavalli, Wissam Mallouli, Javier Baliosian:
Monitoring-based validation of functional and performance aspects of a greedy ant colony optimization protocol. LANOMS 2015: 69-72 - [c21]José Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca:
Dynamic Deployment and Monitoring of Security Policies. TrustBus 2015: 180-192 - 2014
- [j3]Natalia Kushik, Jeevan Pokhrel, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli:
QoE Prediction for Multimedia Services: Comparing Fuzzy and Logic Network Approaches. Int. J. Organ. Collect. Intell. 4(3): 44-64 (2014) - [c20]Jeevan Pokhrel, Felipe Lalanne, Ana R. Cavalli, Wissam Mallouli:
QoE Estimation for Web Service Selection Using a Fuzzy-Rough Hybrid Expert System. AINA 2014: 629-634 - [c19]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [c18]Natalia Kushik, Nina Yevtushenko, Ana R. Cavalli, Wissam Mallouli, Jeevan Pokhrel:
Evaluating Web Service QoE by Learning Logic Networks. WEBIST (1) 2014: 168-176 - 2013
- [c17]Keqin Li, Wissam Mallouli:
The Forth International Workshop on Security Testing (SECTEST 2013). ICST Workshops 2013: 433-434 - 2012
- [j2]Amel Mammar, Wissam Mallouli, Ana R. Cavalli:
A systematic approach to integrate common timed security rules within a TEFSM-based system specification. Inf. Softw. Technol. 54(1): 87-98 (2012) - 2011
- [j1]Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez:
VDC-Based Dynamic Code Analysis: Application to C Programs. J. Internet Serv. Inf. Secur. 1(2/3): 4-20 (2011) - [c16]Amel Mammar, Ana R. Cavalli, Willy Jimenez, Wissam Mallouli, Edgardo Montes de Oca:
Using Testing Techniques for Vulnerability Detection in C Programs. ICTSS 2011: 80-96 - 2010
- [c15]Alessandra Bagnato, Fabio Raiteri, Wissam Mallouli, Bachar Wehbi:
Practical Experience Gained from Passive Testing of Web Based Systems. ICST Workshops 2010: 394-402 - [c14]Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, Eliane Martins, Andrey Sadovykh, Sébastien Salva, Fatiha Zaïdi:
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition. ICWS 2010: 377-384 - [c13]Gerardo Morales, Stéphane Maag, Ana R. Cavalli, Wissam Mallouli, Edgardo Montes de Oca, Bachar Wehbi:
Timed Extended Invariants for the Passive Testing of Web Services. ICWS 2010: 592-599
2000 – 2009
- 2009
- [c12]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification. APSEC 2009: 489-496 - [c11]Felipe Lalanne, Stéphane Maag, Edgardo Montes de Oca, Ana R. Cavalli, Wissam Mallouli, Arnaud Gonguet:
An Automated Passive Testing Approach for the IMS PoC Service. ASE 2009: 535-539 - 2008
- [c10]Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli:
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking. ADHOC-NOW 2008: 345-356 - [c9]Wissam Mallouli, Amel Mammar, Ana R. Cavalli:
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines. DS-RT 2008: 173-180 - [c8]Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli, Mounir Lallali:
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints. DS-RT 2008: 315-318 - [c7]Wissam Mallouli, Fayçal Bessayah, Ana R. Cavalli, Azzedine Benameur:
Security Rules Specification and Analysis Based on Passive Testing. GLOBECOM 2008: 2078-2083 - [c6]Wissam Mallouli, Gerardo Morales, Ana R. Cavalli:
Testing Security Policies for Web Applications. ICST Workshops 2008: 269-270 - [c5]Wissam Mallouli, Mounir Lallali, Gerardo Morales, Ana R. Cavalli:
Modeling and Testing Secure Web-Based Systems: Application to an Industrial Case Study. SITIS 2008: 128-136 - 2007
- [c4]Wissam Mallouli, Ana R. Cavalli:
Testing Security Rules with Decomposable Activities. HASE 2007: 149-155 - [c3]Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens:
A formal approach for testing security rules. SACMAT 2007: 127-132 - 2006
- [c2]Bachar Wehbi, Wissam Mallouli, Ana R. Cavalli:
Light Client Management Protocol for Wireless Mesh Networks. MDM 2006: 123 - [c1]Ana R. Cavalli, Stéphane Maag, Wissam Mallouli, Mikael Marche, Yves-Marie Quemener:
Application of Two Test Generation Tools to an Industrial Case Study. TestCom 2006: 134-148
Coauthor Index
aka: Ana Rosa Cavalli
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint