default search action
Emin Anarim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Ramin Fuladi, Tuncer Baykas, Emin Anarim:
The use of statistical features for low-rate denial-of-service attack detection. Ann. des Télécommunications 79(9-10): 679-691 (2024) - [j46]Oguzhan Sayinbas, Alper Köse, Mutlu Koca, Emin Anarim:
A Novel Scheduling Strategy in Priority-Aware IoT Networks for Age of Information Optimization. IEEE Commun. Lett. 28(2): 337-341 (2024) - [j45]Alper Köse, Arda Atalik, Mutlu Koca, Emin Anarim:
Impact of Block Coding on Age of Information in Centralized IoT: Insights From BEC and BSC. IEEE Commun. Lett. 28(7): 1494-1498 (2024) - [j44]Alper Köse, Mutlu Koca, Emin Anarim:
Impact of Network Coding on Age of Information. IEEE Internet Things J. 11(6): 9725-9739 (2024) - [j43]Ibrahim Kahraman, Alper Köse, Mutlu Koca, Emin Anarim:
Age of Information in Internet of Things: A Survey. IEEE Internet Things J. 11(6): 9896-9914 (2024) - [j42]Ibrahim Kahraman, Alper Köse, Mutlu Koca, Emin Anarim:
Impact of Network Coding on Age of Information in Multisource Multihop IoT Networks. IEEE Internet Things J. 11(20): 33053-33063 (2024) - [c68]Fahri Sinan, Ramin Fuladi, Emin Anarim:
Matrix Profile Based Algorithms Using Self-Collected Data for Detecting DDoS Attacks in loT Equipment. BlackSeaCom 2024: 135-139 - [c67]Mehmet Fide, Emin Anarim:
User Authentication with GRU based Siamese Networks using Keyboard Usage Behaviour. SIU 2024: 1-4 - 2023
- [j41]Erhan Davarci, Emin Anarim:
Gender Detection Based on Gait Data: A Deep Learning Approach With Synthetic Data Generation and Continuous Wavelet Transform. IEEE Access 11: 108833-108851 (2023) - [c66]Ramin Fuladi, Tuncer Baykas, Emin Anarim:
The Use of Statistical Features for Low-Rate Denial of Service Attack Detection. 6GNet 2023: 1-6 - [c65]Alper Köse, Mutlu Koca, Emin Anarim:
Age of Information in Network Coded Multicast Networks. EuCNC/6G Summit 2023: 353-358 - [c64]Alper Köse, Mutlu Koca, Emin Anarim, Muriel Médard:
Age of Information Minimizing Dynamic User Pairing in Downlink NOMA Systems. MeditCom 2023: 145-150 - [c63]Pelin Damla Ates, Çagatay Ates, Mutlu Koca, Emin Anarim:
Autoencoder and Extreme Value Theory Based Unknown Intrusion Detection System. SIU 2023: 1-4 - 2022
- [j40]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A DDoS attack detection and countermeasure scheme based on DWT and auto-encoder neural network for SDN. Comput. Networks 214: 109140 (2022) - [j39]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network. Comput. Secur. 112: 102524 (2022) - [j38]Metehan Yildirim, Emin Anarim:
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis. Int. J. Inf. Sec. 21(2): 239-251 (2022) - [c62]Süleyman Özdel, Çagatay Ates, Pelin Damla Ates, Mutlu Koca, Emin Anarim:
Payload-Based Network Traffic Analysis for Application Classification and Intrusion Detection. EUSIPCO 2022: 638-642 - [c61]Erhan Davarci, Emin Anarim:
User Identification on Smartphones with Motion Sensors and Touching Behaviors. SIU 2022: 1-4 - [c60]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A Comparative Study on the Performance Evaluation of DDoS Attack Detection Methods. SIU 2022: 1-4 - [c59]Murat Karayaka, Arda Bayer, Semih Balki, Emin Anarim, Mutlu Koca:
Application Based Network Traffic Dataset and SPID Analysis. SIU 2022: 1-4 - [c58]Ilhan Selçuk Mert, Emin Anarim, Mutlu Koca:
Multi-Phase Traffic Classification Based on Payload. SIU 2022: 1-4 - [c57]Süleyman Özdel, Pelin Damla Ates, Çagatay Ates, Mutlu Koca, Emin Anarim:
Network Traffic Classification with Flow Based Approach. SIU 2022: 1-4 - [c56]Süleyman Özdel, Pelin Damla Ates, Çagatay Ates, Mutlu Koca, Emin Anarim:
Network Anomaly Detection with Payload-based Analysis. SIU 2022: 1-4 - 2021
- [j37]Alper Köse, Mutlu Koca, Emin Anarim, Muriel Médard, Hakan Gökcesu:
Graph-Theoretical Dynamic User Pairing for Downlink NOMA Systems. IEEE Commun. Lett. 25(10): 3234-3238 (2021) - [c55]Erhan Davarci, Emin Anarim:
Hybrid Architecture for Gender Recognition Using Smartphone Motion Sensors. EUSIPCO 2021: 801-805 - [c54]Erhan Davarci, Emin Anarim:
Gender Detection with Smartphone Motion Sensors Using Convolutional Neural Networks. SIU 2021: 1-4 - 2020
- [j36]Derya Erhan, Emin Anarim:
Hybrid DDoS Detection Framework Using Matching Pursuit Algorithm. IEEE Access 8: 118912-118923 (2020) - [j35]Oguzhan Ersoy, Thomas Brochmann Pedersen, Emin Anarim:
Homomorphic extensions of CRT-based secret sharing. Discret. Appl. Math. 285: 317-329 (2020) - [j34]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A DDoS attack detection and defense scheme using time-series analysis for SDN. J. Inf. Secur. Appl. 54: 102587 (2020) - [j33]Çagatay Ates, Süleyman Özdel, Emin Anarim:
Graph-based fuzzy approach against DDoS attacks. J. Intell. Fuzzy Syst. 39(5): 6315-6324 (2020) - [c53]Çagatay Ates, Süleyman Özdel, Emin Anarim:
DDoS Detection Algorithm Based on Fuzzy Logic. SIU 2020: 1-4 - [c52]Derya Erhan, Emin Anarim:
Istatistiksel Yöntemler ile DDoS Saldırı Tespiti DDoS Detection Using Statistical Methods. SIU 2020: 1-4 - [c51]Rifat Volkan Senyuva, Emin Anarim:
Multigrid Based Sparse Recovery Method for Multidimensional Harmonic Retrieval. SIU 2020: 1-4
2010 – 2019
- 2019
- [c50]Çagatay Ates, Süleyman Özdel, Emin Anarim:
A New Network Anomaly Detection Method Based on Header Information Using Greedy Algorithm. CoDIT 2019: 657-662 - [c49]Derya Erhan, Emin Anarim:
Statistical Properties of DDoS Attacks. CoDIT 2019: 1238-1242 - [c48]Onur Keles, Emin Anarim:
Adjustment of Digital Screens to Compensate the Eye Refractive Errors via Deconvolution. IPTA 2019: 1-6 - [c47]Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
Anomaly-Based DDoS Attack Detection by Using Sparse Coding and Frequency Domain. PIMRC 2019: 1-6 - [c46]Çagatay Ates, Süleyman Özdel, Metehan Yildirim, Emin Anarim:
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation. SIU 2019: 1-4 - [c45]Çagatay Ates, Süleyman Özdel, Metehan Yildirim, Emin Anarim:
Network Anomaly Detection Using Header Information With Greedy Algorithm. SIU 2019: 1-4 - [c44]Metehan Yildirim, Emin Anarim:
Session-Based User Authentication via Mouse Dynamics. SIU 2019: 1-4 - 2018
- [j32]Dogac Basaran, Ali Taylan Cemgil, Emin Anarim:
Multiresolution alignment for multiple unsynchronized audio sequences using sequential Monte Carlo samplers. Digit. Signal Process. 77: 77-85 (2018) - [j31]Dogac Basaran, Ali Taylan Cemgil, Emin Anarim:
Multiresolution alignment for multiple unsynchronized audio sequences using Sequential Monte Carlo samplers. SoftwareX 8: 33-38 (2018) - [c43]Ozgun Bal, Mutlu Koca, Emin Anarim:
Open platform for attack and countermeasure analysis on system security. SIU 2018: 1-4 - [c42]Cemil Eren Kayatas, Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
Statistical measures: Promising features for time series based DDoS attack detection. SIU 2018: 1-4 - 2017
- [j30]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Networks 67: 24-39 (2017) - [j29]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
A key agreement protocol with partial backward confidentiality. Comput. Networks 129: 159-177 (2017) - [c41]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. ARES 2017: 62:1-62:6 - [c40]Ramin Fadaei Fouladi, Cemil Eren Kayatas, Emin Anarim:
Statistical Measures: Promising Features for Time Series Based DDoS Attack Detection. IWCIM@EUSIPCO 2017: 96 - [c39]Erhan Davarci, Betul Soysal, Imran Erguler, Sabri Orhun Aydin, Onur Dincer, Emin Anarim:
Age group detection using smartphone motion sensors. EUSIPCO 2017: 2201-2205 - [c38]Rifat Volkan Senyuva, Gunes Karabulut-Kurt, Emin Anarim:
Compressed sensing technique for synchronization and channel estimation in OFDMA uplink transmissions. EUSIPCO 2017: 2611-2615 - 2016
- [j28]Rifat Volkan Senyuva, Günes Karabulut-Kurt, Emin Anarim:
Compressive sensing based joint frequency offset and channel estimation for OFDM. EURASIP J. Wirel. Commun. Netw. 2016: 86 (2016) - [j27]Oguzhan Ersoy, Thomas Brochmann Pedersen, Kamer Kaya, Ali Aydin Selçuk, Emin Anarim:
A CRT-based verifiable secret sharing scheme secure against unbounded adversaries. Secur. Commun. Networks 9(17): 4416-4427 (2016) - [c37]Rifat Volkan Senyuva, Gunes Karabulut-Kurt, Emin Anarim:
Comparison of modulation types in pilot-based sparse channel estimation for OFDM. SIU 2016: 433-436 - [c36]Erhan Davarci, Betul Soysal, Imran Erguler, Emin Anarim:
Side channel analysis on android smartphones. SIU 2016: 553-556 - [c35]Derya Erhan, Emin Anarim, Gunes Karabulut-Kurt:
DDoS attack detection using matching pursuit algorithm. SIU 2016: 1081-1084 - [c34]Dogac Basaran, Ali Taylan Cemgil, Emin Anarim:
Model based multiple musical sequence alignment using tempo extraction as preprocessing. SIU 2016: 1525-1528 - [c33]Ramin Fadaei Fouladi, Cemil Eren Kayatas, Emin Anarim:
Frequency based DDoS attack detection approach using naive Bayes classification. TSP 2016: 104-107 - 2015
- [j26]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
An improved conference-key agreement protocol for dynamic groups with efficient fault correction. Secur. Commun. Networks 8(7): 1347-1359 (2015) - [j25]Dogac Basaran, Ali Taylan Cemgil, Emin Anarim:
A Probabilistic Model-Based Approach for Aligning Multiple Audio Sequences. IEEE ACM Trans. Audio Speech Lang. Process. 23(7): 1160-1171 (2015) - 2014
- [j24]Imran Erguler, Emin Anarim, Gökay Saldamli:
Unbalanced states violates RFID privacy. J. Intell. Manuf. 25(2): 273-281 (2014) - [c32]Hidir Yuzuguzel, Ali Taylan Cemgil, Emin Anarim:
Query ranking strategies in probabilistic expert systems. SIU 2014: 1199-1202 - [c31]Melih A. Karaman, Gürkan Gür, Mustafa Ergen, Emin Anarim:
Spectrum-Aware Dynamic Frequency Reuse (SADFR) for SON-based OFDM a HetNets. WCNC 2014: 2558-2563 - 2013
- [j23]Musa Zeytinci, Veli Sari, Frederic Kerem Harmanci, Emin Anarim, Mehmet Akar:
Location estimation using RSS measurements with unknown path loss exponents. EURASIP J. Wirel. Commun. Netw. 2013: 178 (2013) - [j22]Hakan Murat Karaca, Tolga Kurt, Salih Zafer Dicle, Emin Anarim:
Auction-Based Throughput Maximization in Cognitive Radio Networks Under Interference Constraint. Wirel. Pers. Commun. 72(2): 1259-1275 (2013) - [c30]Dogac Basaran, A. Taylan Cemgil, Emin Anarim:
SMC samplers for multiresolution audio sequence alignment. ICASSP 2013: 201-205 - [c29]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks. ICCVE 2013: 828-831 - [c28]Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
An improved fault-tolerant conference-key agreement protocol with forward secrecy. SIN 2013: 306-310 - [c27]Dogac Basaran, Ali Taylan Cemgil, Emin Anarim:
Model based audio sequence alignment based on deterministic similarity methods. SIU 2013: 1-4 - [c26]Derya Erhan, Emin Anarim, Günes Karabulut-Kurt, Rabun Kosar:
Effect of DDoS attacks on traffic features. SIU 2013: 1-4 - [c25]Ramin Fadaei Fouladi, Tina Seifpoor, Emin Anarim:
Frequency characteristics of DoS and DDoS attacks. SIU 2013: 1-4 - 2012
- [j21]Imran Erguler, Emin Anarim:
Practical attacks and improvements to an efficient radio frequency identification authentication protocol. Concurr. Comput. Pract. Exp. 24(17): 2069-2080 (2012) - [j20]Imran Erguler, Emin Anarim:
Security flaws in a recent RFID delegation protocol. Pers. Ubiquitous Comput. 16(3): 337-349 (2012) - [j19]Imran Erguler, Cihan Unsal, Emin Anarim, Gökay Saldamli:
Security analysis of an ultra-lightweight RFID authentication protocol - SLMAP. Secur. Commun. Networks 5(3): 287-291 (2012) - [c24]Hakan Murat Karaca, Zafer Diele, Tolga Kurt, Emin Anarim:
System throughput versus SINR constraint in cognitive radio networks. SPAWC 2012: 144-148 - 2011
- [j18]Imran Erguler, Emin Anarim, Gökay Saldamli:
A Salient Missing Link in RFID Security Protocols. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j17]Imran Erguler, Emin Anarim:
Scalability and Security Conflict for RFID Authentication Protocols. Wirel. Pers. Commun. 59(1): 43-56 (2011) - [c23]Dogac Basaran, A. Taylan Cemgil, Emin Anarim:
Model based multiple audio sequence alignment. WASPAA 2011: 13-16 - 2010
- [c22]Imran Erguler, Emin Anarim:
Attacks on an Efficient RFID Authentication Protocol. CIT 2010: 1065-1069 - [c21]Melike Demir, Ayse Bener, Tolga Kurt, Emin Anarim:
Application of Software Product Line Principles to Multi-Sector Software Development. SPLC Workshops 2010: 267-268 - [i2]Imran Erguler, Emin Anarim:
Scalability and Security Conflict for RFID Authentication Protocols. IACR Cryptol. ePrint Arch. 2010: 18 (2010)
2000 – 2009
- 2009
- [c20]Mete Akgün, M. Ufuk Çaglayan, Emin Anarim:
Secure RFID Authentication with Efficient Key-Lookup. GLOBECOM 2009: 1-8 - [c19]Mete Akgün, M. Ufuk Çaglayan, Emin Anarim:
A new RFID authentication protocol with resistance to server impersonation. IPDPS 2009: 1-8 - 2008
- [j16]Mustafa A. Altinkaya, Emin Anarim, Bülent Sankur:
Phase dependence mitigation for autocorrelation-based frequency estimation. Digit. Signal Process. 18(2): 249-266 (2008) - [j15]Yucel Altug, N. Polat Ayerden, Mehmet Kivanç Mihçak, Emin Anarim:
A Note on the Periodicity and the Output Rate of Bit Search Type Generators. IEEE Trans. Inf. Theory 54(2): 666-679 (2008) - [c18]Imran Erguler, Emin Anarim:
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography. WiMob 2008: 543-548 - 2007
- [j14]Gürkan Gür, Yücel Altug, Emin Anarim, Fatih Alagöz:
Image Error Concealment Using Watermarking with Subbands for Wireless Channels. IEEE Commun. Lett. 11(2): 179-181 (2007) - [c17]M. Bora Zeytinci, Fernaz Alimoglu, F. Kerem Harmanci, Emin Anarim, Fatih Alagöz:
A combined approach for NLOS mitigation in cellular positioning with TOA measurements. EUSIPCO 2007: 530-534 - [i1]Yucel Altug, N. Polat Ayerden, Mehmet Kivanç Mihçak, Emin Anarim:
A Note on the Periodicity and the Output Rate of Bit Search Type Generators. CoRR abs/cs/0702092 (2007) - 2006
- [c16]Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:
Three-tier satellite multicast security protocol based on ECMQV and IMC methods. CAMAD 2006: 129-136 - [c15]Mustafa A. Altinkaya, Emin Anarim, Bülent Sankur:
Phase noise mitigation in the autocorrelation estimates with data windowing: The case of two close sinusoids. EUSIPCO 2006: 1-5 - [c14]Isa Hacioglu, F. Kerem Harmanci, Emin Anarim, Hakan Deliç:
Time-of-arrival estimation under impulsive noise for wireless positioning systems. EUSIPCO 2006: 1-5 - [c13]Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:
NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes. GLOBECOM 2006 - [c12]Attila Altay Yavuz, Fatih Alagöz, Emin Anarim:
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes. ISCIS 2006: 434-444 - [c11]Imran Erguler, Emin Anarim:
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers. ISCIS 2006: 918-923 - [c10]Attila Altay Yavuz, Emin Anarim, Fatih Alagöz:
Improved Merkle Cryptosystem (IMC). ISCIS 2006: 924-934 - 2005
- [j13]Hamza Özer, Bülent Sankur, Nasir D. Memon, Emin Anarim:
Perceptual Audio Hashing Functions. EURASIP J. Adv. Signal Process. 2005(12): 1780-1793 (2005) - [j12]Ozgur Depren, Murat Topallar, Emin Anarim, M. Kemal Ciliz:
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Syst. Appl. 29(4): 713-722 (2005) - [c9]Mustafa A. Altinkaya, Emin Anarim, Bülent Sankur:
Removal of the phase noise in the autocorrelation estimates with data windowing. EUSIPCO 2005: 1-4 - [c8]Imran Erguler, Emin Anarim:
A modified stream generator for the GSM encryption algorithms A5/1 and A5/2. EUSIPCO 2005: 1-4 - [c7]Imran Erguler, Emin Anarim:
A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. ISCIS 2005: 215-223 - 2002
- [j11]Mustafa A. Altinkaya, Hakan Deliç, Bülent Sankur, Emin Anarim:
Subspace-based frequency estimation of sinusoidal signals in alpha-stable noise. Signal Process. 82(12): 1807-1827 (2002) - 2001
- [j10]Hakan Caglar, C. Sinan Güntürk, Emin Anarim, Bülent Sankur:
Permutation Based Design of Orthogonal Block Transforms and Filter Banks. Multidimens. Syst. Signal Process. 12(1): 63-79 (2001) - [j9]Çigdem Eroglu Erdem, Günes Karabulut, Evsen Yanmaz, Emin Anarim:
Motion estimation in the frequency domain using fuzzy c-planes clustering. IEEE Trans. Image Process. 10(12): 1873-1879 (2001) - 2000
- [j8]Yücel Yemez, Bülent Sankur, Emin Anarim:
A quadratic motion-based object-oriented video codec. Signal Process. Image Commun. 15(9): 729-766 (2000) - [c6]Hakan M. Karaca, Emin Anarim, Avni Morgül:
Role of prefiltering in unsupervised video segmentation. ICASSP 2000: 1999-2002
1990 – 1999
- 1998
- [j7]Hakan Caglar, C. Sinan Güntürk, Bülent Sankur, Emin Anarim:
VQ-adaptive block transform coding of images. IEEE Trans. Image Process. 7(1): 110-115 (1998) - 1997
- [c5]Yücel Yemez, Bülent Sankur, Emin Anarim:
An object-oriented video codec based on region growing motion segmentation. ICIP (3) 1997: 444-447 - 1996
- [j6]Emin Anarim, Hakan Ucar, Yorgo Istefanopulos:
Identification of image and blur parameters in frequency domain using the EM algorithm. IEEE Trans. Image Process. 5(1): 159-164 (1996) - [j5]Tolga Aydin, Yücel Yemez, Emin Anarim, Bülent Sankur:
Multidirectional and multiscale edge detection via M-band wavelet transform. IEEE Trans. Image Process. 5(9): 1370-1377 (1996) - [c4]Hakan Çaglar, C. Sinan Güntürk, Emin Anarim, Bülent Sankur:
Matched block transform design techniques. EUSIPCO 1996: 1-4 - [c3]Bilgin Esme, Bülent Sankur, Emin Anarim:
Facial feature extraction using genetic algorithms. EUSIPCO 1996: 1-4 - [c2]Yücel Yemez, Bülent Sankur, Emin Anarim:
Region growing motion segmentation and estimation in object-oriented video coding. ICIP (2) 1996: 521-524 - 1994
- [j4]Emin Anarim, Halûk Aydinoglu, I. Cem Göknar:
Decision based directional edge detector. Signal Process. 35(2): 149-156 (1994) - [c1]Turgut Aydin, Yücel Yemez, Bülent Sankur, Emin Anarim, Oktay Alkin:
Use of M-band wavelet transform for multidirectional and multiscale edge detection. ICASSP (5) 1994: 17-20 - 1993
- [j3]Emin Anarim, Bülent Sankur:
Robust detection of tone signals by autoregressive frequency estimation. Signal Process. 30(3): 271-277 (1993) - [j2]Yücel Yemez, Emin Anarim, Yorgo Istefanopulos:
Causal and semicausal AR image model identification using the EM algorithm. IEEE Trans. Image Process. 2(4): 523-528 (1993) - 1991
- [j1]Emin Anarim, Yorgo Istefanopulos:
Statistical analysis of Pisarenko type tone frequency estimator. Signal Process. 24(3): 291-298 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint