default search action
Ulrike Meyer
Person information
- affiliation: RWTH Aachen University, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c85]Alexander Löbel, René Schäfer, Hanna Püschel, Esra Güney, Ulrike Meyer:
Access Your Data... if You Can: An Analysis of Dark Patterns Against the Right of Access on Popular Websites. APF 2024: 23-47 - [c84]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem. AsiaCCS 2024 - [c83]Arthur Drichel, Marc Meyer, Ulrike Meyer:
Towards Robust Domain Generation Algorithm Classification. AsiaCCS 2024 - [c82]Andreas Klinger, Vincent Ehrmanntraut, Ulrike Meyer:
Estimating the Runtime and Global Network Traffic of SMPC Protocols. CODASPY 2024: 7-18 - [c81]Arthur Drichel, Benedikt von Querfurth, Ulrike Meyer:
Extended Abstract: A Transfer Learning-Based Training Approach for DGA Classification. DIMVA 2024: 381-391 - [c80]Vincent Ehrmanntraut, Ulrike Meyer:
Privacy-Preserving Breadth-First-Search and Maximal Flow. WPES@CCS 2024: 73-97 - [i23]Arthur Drichel, Marc Meyer, Ulrike Meyer:
Towards Robust Domain Generation Algorithm Classification. CoRR abs/2404.06236 (2024) - [i22]Vincent Ehrmanntraut, Ulrike Meyer:
Privacy-Preserving Breadth-First-Search and Maximal-Flow. IACR Cryptol. ePrint Arch. 2024: 1420 (2024) - 2023
- [c79]Vincent Drury, Jakob Drees, Ulrike Meyer:
Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name Notation. ARES 2023: 72:1-72:10 - [c78]Andreas Klinger, Ulrike Meyer:
Privacy-Preserving Fully Online Matching with Deadlines. CODASPY 2023: 105-116 - [c77]Andreas Klinger, Felix Battermann, Ulrike Meyer:
Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation. CODASPY 2023: 129-139 - [c76]Arthur Drichel, Ulrike Meyer:
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. RAID 2023: 330-345 - [c75]Alexander Löbel, Frederic Salmen, Ulrike Meyer, Ulrik Schroeder:
Behind the Screens: The Security & Privacy Advice Landscape of Children in Grades 5 & 6. WiPSCE 2023: 20:1-20:2 - [i21]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem. CoRR abs/2302.13880 (2023) - [i20]Arthur Drichel, Ulrike Meyer:
False Sense of Security: Leveraging XAI to Analyze the Reasoning and True Performance of Context-less DGA Classifiers. CoRR abs/2307.04358 (2023) - 2022
- [j7]Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder:
Exploring and Evaluating Different Game Mechanics for Anti-Phishing Learning Games. Int. J. Serious Games 9(3): 23-41 (2022) - [c74]Vincent Drury, Luisa Lux, Ulrike Meyer:
Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. ARES 2022: 14:1-14:11 - [c73]Arthur Drichel, Justus von Brandt, Ulrike Meyer:
Detecting Unknown DGAs without Context Information. ARES 2022: 29:1-29:12 - [c72]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange. CODASPY 2022: 53-64 - [c71]Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder:
Better the Phish You Know: Evaluating Personalization in Anti-Phishing Learning Games. CSEDU (2) 2022: 458-466 - [c70]Rene Roepke, Vincent Drury, Philipp Peeß, Tobias Johnen, Ulrike Meyer, Ulrik Schroeder:
More Than Meets the Eye - An Anti-Phishing Learning Game with a Focus on Phishing Emails. GALA 2022: 118-126 - [c69]Sebastian Schäfer, Alexander Löbel, Ulrike Meyer:
Accurate Real-Time Labeling of Application Traffic. LCN 2022: 291-294 - [c68]Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel:
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. PST 2022: 1-10 - [c67]Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer:
Secure Maximum Weight Matching Approximation on General Graphs. WPES@CCS 2022: 83-87 - [i19]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Maximum Matching on General Graphs and its Application to Enable Privacy-Preserving Kidney Exchange. CoRR abs/2201.06446 (2022) - [i18]Arthur Drichel, Justus von Brandt, Ulrike Meyer:
Detecting Unknown DGAs without Context Information. CoRR abs/2205.14940 (2022) - [i17]Sebastian Schäfer, Ulrike Meyer:
A Pipeline for DNS-Based Software Fingerprinting. CoRR abs/2208.07042 (2022) - [i16]Malte Breuer, Pascal Hein, Leonardo Pompe, Ben Temme, Ulrike Meyer, Susanne Wetzel:
Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming. CoRR abs/2208.11319 (2022) - [i15]Andreas Brüggemann, Malte Breuer, Andreas Klinger, Thomas Schneider, Ulrike Meyer:
Secure Maximum Weight Matching Approximation on General Graphs (Full Version). IACR Cryptol. ePrint Arch. 2022: 1173 (2022) - [i14]Andreas Klinger, Ulrike Meyer:
Towards Secure Evaluation of Online Functionalities (Corrected and Extended Version). IACR Cryptol. ePrint Arch. 2022: 1755 (2022) - 2021
- [c66]Arthur Drichel, Nils Faerber, Ulrike Meyer:
First Step Towards EXPLAINable DGA Multiclass Classification. ARES 2021: 25:1-25:13 - [c65]Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer:
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. ARES 2021: 59:1-59:12 - [c64]Andreas Klinger, Ulrike Meyer:
Towards Secure Evaluation of Online Functionalities. ARES 2021: 131:1-131:14 - [c63]Arthur Drichel, Benedikt Holmes, Justus von Brandt, Ulrike Meyer:
The More, the Better: A Study on Collaborative Machine Learning for DGA Detection. CYSARM@CCS 2021: 1-12 - [c62]Rene Roepke, Vincent Drury, Ulrike Meyer, Ulrik Schroeder:
Exploring Different Game Mechanics for Anti-phishing Learning Games. GALA 2021: 34-43 - [c61]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice. PST 2021: 1-7 - [c60]Arthur Drichel, Mehdi Akbari Gurabi, Tim Amelung, Ulrike Meyer:
Towards Privacy-Preserving Classification-as-a-Service for DGA Detection. PST 2021: 1-10 - [c59]René Röpke, Vincent Drury, Ulrik Schroeder, Ulrike Meyer:
A Modular Architecture for Personalized Learning Content in Anti-Phishing Learning Games. Software Engineering (Satellite Events) 2021 - [i13]Arthur Drichel, Nils Faerber, Ulrike Meyer:
First Step Towards EXPLAINable DGA Multiclass Classification. CoRR abs/2106.12336 (2021) - [i12]Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer:
Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. CoRR abs/2106.12343 (2021) - [i11]Arthur Drichel, Benedikt Holmes, Justus von Brandt, Ulrike Meyer:
The More, the Better? A Study on Collaborative Machine Learning for DGA Detection. CoRR abs/2109.11830 (2021) - [i10]Benedikt Holmes, Arthur Drichel, Ulrike Meyer:
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection. CoRR abs/2110.05849 (2021) - [i9]Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice. CoRR abs/2111.02269 (2021) - 2020
- [c58]Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Analyzing the real-world applicability of DGA classifiers. ARES 2020: 15:1-15:11 - [c57]Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers. ARES 2020: 85:1-85:9 - [c56]Vincent Drury, Ulrike Meyer:
No Phishing With the Wrong Bait: Reducing the Phishing Risk by Address Separation. EuroS&P Workshops 2020: 646-652 - [c55]René Röpke, Ulrik Schroeder, Vincent Drury, Ulrike Meyer:
Towards Personalized Game-Based Learning in Anti-Phishing Education. ICALT 2020: 65-66 - [c54]René Röpke, Klemens Koehler, Vincent Drury, Ulrik Schroeder, Martin R. Wolf, Ulrike Meyer:
A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education. MSTEC 2020: 41-60 - [c53]Malte Breuer, Ulrike Meyer, Susanne Wetzel, Anja Mühlfeld:
A Privacy-Preserving Protocol for the Kidney Exchange Problem. WPES@CCS 2020: 151-162 - [i8]Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Analyzing the Real-World Applicability of DGA Classifiers. CoRR abs/2006.11103 (2020) - [i7]Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert:
Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers. CoRR abs/2007.00300 (2020) - [i6]Malte Breuer, Ulrike Meyer, Susanne Wetzel, Anja Mühlfeld:
A Privacy-Preserving Protocol for the Kidney Exchange Problem. CoRR abs/2009.11086 (2020)
2010 – 2019
- 2019
- [c52]Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Fabian Förg, Susanne Wetzel:
Privacy - Preserving Multi-Party Conditional Random Selection. PST 2019: 1-7 - [c51]Ulrike Meyer, Vincent Drury:
Certified Phishing: Taking a Look at Public Key Certificates of Phishing Websites. SOUPS @ USENIX Security Symposium 2019 - 2018
- [c50]Stefan Wüller, Malte Breuer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Trade Chain Detection. DPM/CBT@ESORICS 2018: 373-388 - [c49]Stefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Subgraph Checking. PST 2018: 1-6 - [c48]Samuel Schüppen, Dominik Teubert, Patrick Herrmann, Ulrike Meyer:
FANCI : Feature-based Automated NXDomain Classification and Intelligence. USENIX Security Symposium 2018: 1165-1181 - 2017
- [j6]Stefan Wüller, Daniel A. Mayer, Fabian Förg, Samuel Schüppen, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel:
Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques. J. Comput. Secur. 25(1): 59-81 (2017) - [c47]Fabian Foerg, Susanne Wetzel, Ulrike Meyer:
Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering. CODASPY 2017: 107-114 - [c46]Bastian Küppers, Florian Kerber, Ulrike Meyer, Ulrik Schroeder:
Beyond Lockdown: Towards Reliable e-Assessment. DeLFI 2017: 191-196 - [c45]Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Towards Privacy-Preserving Multi-party Bartering. Financial Cryptography Workshops 2017: 19-34 - [c44]Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. PST 2017: 205-214 - [c43]Stefan Wüller, Michael Vu, Ulrike Meyer, Susanne Wetzel:
Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. WPES@CCS 2017: 123-132 - [i5]Stefan Wüller, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. IACR Cryptol. ePrint Arch. 2017: 377 (2017) - 2016
- [j5]Marián Kühnel, Ulrike Meyer:
Applying highly space efficient blacklisting to mobile malware. Log. J. IGPL 24(6): 971-981 (2016) - [c42]Marián Kühnel, Ulrike Meyer:
Classification of Short Messages Initiated by Mobile Malware. ARES 2016: 618-627 - [c41]Dominik Teubert, Fred Grossmann, Ulrike Meyer:
Anomaly-based Mobile Malware Detection: System Calls as Source for Features. ICISSP 2016: 26-36 - [c40]Stefan Wüller, Marián Kühnel, Ulrike Meyer:
Information Hiding in the RSA Modulus. IH&MMSec 2016: 159-167 - [c39]Patrick Herrmann, Ulrike Meyer:
B. A. T. M. A. N. Handover Extension for Routing Nodes in Infrastructure WMNs. LCN 2016: 680-687 - [c38]Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel:
Privacy-preserving two-party bartering secure against active adversaries. PST 2016: 229-238 - 2015
- [j4]André Egners, Patrick Herrmann, Ulrike Meyer:
Multi-operator wireless mesh networks secured by an all-encompassing security architecture. Int. J. Inf. Sec. 14(2): 169-186 (2015) - [c37]Florian Kerber, Dominik Teubert, Ulrike Meyer:
Covert remote syscall communication at kernel level: A SPOOKY backdoor. MALWARE 2015: 74-81 - [c36]Stefan Wüller, Ulrike Meyer, Fabian Förg, Susanne Wetzel:
Privacy-preserving conditional random selection. PST 2015: 44-53 - [c35]Marián Kühnel, Manfred Smieschek, Ulrike Meyer:
Fast Identification of Obfuscation and Mobile Advertising in Mobile Malware. TrustCom/BigDataSE/ISPA (1) 2015: 214-221 - 2014
- [c34]Fabian Förg, Daniel A. Mayer, Susanne Wetzel, Stefan Wüller, Ulrike Meyer:
A secure two-party bartering protocol using privacy-preserving interval operations. PST 2014: 57-66 - [c33]Marián Kühnel, Ulrike Meyer:
Highly Space Efficient Blacklisting. SOCO-CISIS-ICEUTE 2014: 483-493 - 2013
- [c32]Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Reconciliation Protocols: From Theory to Practice. Number Theory and Cryptography 2013: 183-210 - [c31]Johannes Krude, Ulrike Meyer:
A versatile code execution isolation framework with security first. CCSW 2013: 1-10 - [c30]Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:
Design and implementation of privacy-preserving reconciliation protocols. EDBT/ICDT Workshops 2013: 121-130 - [c29]Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model. DPM/SETOP 2013: 178-193 - [c28]Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets. GI-Jahrestagung 2013: 131-133 - [c27]Christoph Quix, Johannes Barnickel, Sandra Geisler, Marwan Hassani, Saim Kim, Xiang Li, Andreas Lorenz, Till Quadflieg, Thomas Gries, Matthias Jarke, Steffen Leonhardt, Ulrike Meyer, Thomas Seidl:
HealthNet: A System for Mobile and Wearable Health Information Management. IMMoA 2013: 36-43 - [c26]Marián Kühnel, Ulrike Meyer:
4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks. ISC 2013: 113-129 - [c25]André Egners, Patrick Herrmann, Tobias Jarmuzek, Ulrike Meyer:
Experiences from security research using a Wireless Mesh Network testbed. LCN 2013: 340-343 - [c24]Georg Wicherski, Florian Weingarten, Ulrike Meyer:
IP agnostic real-time traffic filtering and host identification using TCP timestamps. LCN 2013: 647-654 - [c23]Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. NSS 2013: 493-506 - [c22]André Egners, Ulrike Meyer:
Secure roaming and infrastructure sharing for multi-operator WMNs. SAC 2013: 1800-1807 - [c21]André Egners, Patrick Herrmann, Ulrike Meyer:
Secure and efficient handover protocols for WMNs. WOWMOM 2013: 1-7 - [i4]Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel:
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version). IACR Cryptol. ePrint Arch. 2013: 655 (2013) - 2012
- [c20]André Egners, Dominic Gatzen, Andriy Panchenko, Ulrike Meyer:
Introducing SOR: SSH-based Onion Routing. AINA Workshops 2012: 280-286 - [c19]Johannes Gilger, Johannes Barnickel, Ulrike Meyer:
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. ISC 2012: 338-353 - [c18]Daniel A. Mayer, Orie Steele, Susanne Wetzel, Ulrike Meyer:
CaPTIF: Comprehensive Performance TestIng Framework. ICTSS 2012: 55-70 - [c17]Johannes Barnickel, Jian Wang, Ulrike Meyer:
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode. TrustCom 2012: 17-24 - [c16]André Egners, Ulrike Meyer, Björn Marschollek:
Messing with Android's Permission Model. TrustCom 2012: 505-514 - [c15]André Egners, Hendrik Fabelje, Ulrike Meyer:
FSASD: A framework for establishing security associations for sequentially deployed WMN. WOWMOM 2012: 1-7 - 2011
- [c14]Daniel A. Mayer, Dominik Teubert, Susanne Wetzel, Ulrike Meyer:
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets. CODASPY 2011: 109-120 - [c13]Johannes Barnickel, Ulrike Meyer:
Security and privacy for WLAN roaming with per-connection tariff negotiation. LCN 2011: 424-431 - [i3]Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version). IACR Cryptol. ePrint Arch. 2011: 200 (2011) - 2010
- [j3]George B. Huitema, Ralph Kühne, Ulrike Meyer, Henk Ensing, Alf Zugenmaier, Alain Bibas, Olavi Karasti, Frens Jan Rumph, Johanneke Siljee:
Compensation: Architecture for supporting dynamicity and negotiation in accounting, charging and billing. Comput. Commun. 33(15): 1823-1833 (2010) - [c12]Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. ISC 2010: 136-151 - [c11]André Egners, Ulrike Meyer:
Wireless Mesh Network security: State of affairs. LCN 2010: 997-1004 - [c10]Michael Braun, Ulrike Meyer, Susanne Wetzel:
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures. WISTP 2010: 122-137 - [c9]Johannes Barnickel, Hakan Karahan, Ulrike Meyer:
Security and privacy for mobile electronic health monitoring and recording systems. WOWMOM 2010: 1-6 - [i2]Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis:
New Advances on Privacy-Preserving Policy Reconciliation. IACR Cryptol. ePrint Arch. 2010: 64 (2010) - [i1]Jouni Korhonen, Julien Bournelle, Kuntal Chowdhury, Ahmad Muhanna, Ulrike Meyer:
Diameter Proxy Mobile IPv6: Mobile Access Gateway and Local Mobility Anchor Interaction with Diameter Server. RFC 5779: 1-20 (2010)
2000 – 2009
- 2009
- [j2]Jing Shao, Dihui Lai, Ulrike Meyer, Harald Luksch, Ralf Wessel:
Generating oscillatory bursts from a network of regular spiking neurons without inhibition. J. Comput. Neurosci. 27(3): 591-606 (2009) - [c8]Johannes Barnickel, Ulrike Meyer:
SecSyWiSe: A secure time synchronization scheme in wireless sensor networks. ICUMT 2009: 1-8 - 2008
- [j1]Ulrike Meyer, Jing Shao, Saurish Chakrabarty, Sebastian F. Brandt, Harald Luksch, Ralf Wessel:
Distributed delays stabilize neural feedback systems. Biol. Cybern. 99(1): 79-87 (2008) - 2007
- [c7]Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis:
Distributed Privacy-Preserving Policy Reconciliation. ICC 2007: 1342-1349 - [c6]Jonathan Voris, Sotiris Ioannidis, Susanne Wetzel, Ulrike Meyer:
Performance Evaluation of Privacy-Preserving Policy Reconciliation Protocols. POLICY 2007: 221-228 - 2006
- [c5]Ulrike Meyer, Susanne Wetzel:
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover. PerCom Workshops 2006: 277-282 - [c4]Jared Cordasco, Ulrike Meyer, Susanne Wetzel:
Implementation and Performance Evaluation of EAP-TLS-KS. SecureComm 2006: 1-12 - 2005
- [c3]Ulrike Meyer, Jared Cordasco, Susanne Wetzel:
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs. WMASH 2005: 1-13 - 2004
- [c2]Ulrike Meyer, Susanne Wetzel:
On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. PIMRC 2004: 2876-2883 - [c1]Ulrike Meyer, Susanne Wetzel:
A man-in-the-middle attack on UMTS. Workshop on Wireless Security 2004: 90-97
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint