default search action
Julian Jang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c41]Ljiljana Dolamic, Julian Jang-Jaccard, Alain Mermoud, Vincent Lenders:
Automated Identification of Emerging Technologies: Open Data Approach. EEKE/AII@iConference 2024: 24-33 - [c40]Alexander Sternfeld, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud, Julian Jang-Jaccard:
LLM-Resilient Bibliometrics: Factual Consistency Through Entity Triplet Extraction. EEKE/AII@iConference 2024: 85-93 - [c39]Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh, Tansu Alpcan:
A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. IWSEC 2024: 244-254 - [i22]Alessandro Tavazzi, Dimitri Percia David, Julian Jang-Jaccard, Alain Mermoud:
Measuring Technological Convergence in Encryption Technologies with Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex. CoRR abs/2403.01601 (2024) - 2023
- [j29]Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
A Comprehensive Survey of Generative Adversarial Networks (GANs) in Cybersecurity Intrusion Detection. IEEE Access 11: 76071-76094 (2023) - [j28]Taran Cyriac John, Muhammad Shabbir Abbasi, Harith Al-Sahaf, Ian Welch, Julian Jang-Jaccard:
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution. Comput. Secur. 129: 103215 (2023) - [j27]Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard:
Matrix Encryption Walks for Lightweight Cryptography. Cryptogr. 7(3): 41 (2023) - [j26]Lelisa Adeba Jilcha, Deuk-Hun Kim, Julian Jang-Jaccard, Jin Kwak:
Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE). Comput. Syst. Sci. Eng. 46(3): 3261-3284 (2023) - [j25]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dan Dongseong Kim:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. ACM Comput. Surv. 55(5): 107:1-107:37 (2023) - [j24]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware. Future Internet 15(6): 214 (2023) - [j23]Minkyung Lee, Deuk-Hun Kim, Julian Jang-Jaccard, Jin Kwak:
Blended threat prediction based on knowledge graph embedding in the IoBE. ICT Express 9(5): 903-908 (2023) - [j22]Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak:
IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset. J. Big Data 10(1): 15 (2023) - [c38]Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. CSCWD 2023: 423-431 - [i21]Aeryn Dunmore, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Generative Adversarial Networks for Malware Detection: a Survey. CoRR abs/2302.08558 (2023) - [i20]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore:
Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data. CoRR abs/2305.09475 (2023) - [i19]Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe:
Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods. CoRR abs/2306.17190 (2023) - 2022
- [j21]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification. Comput. Secur. 117: 102691 (2022) - [j20]Hooman Alavizadeh, Hootan Alavizadeh, Julian Jang-Jaccard:
Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection. Comput. 11(3): 41 (2022) - [j19]Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina, Jin Kwak:
Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier. Comput. 11(6): 85 (2022) - [j18]Tong Liu, Fariza Sabrina, Julian Jang-Jaccard, Wen Xu, Yuanyuan Wei:
Artificial Intelligence-Enabled DDoS Detection for Blockchain-Based Smart Transport Systems. Sensors 22(1): 32 (2022) - [j17]Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. IEEE Trans. Emerg. Top. Comput. 10(4): 1772-1788 (2022) - [j16]Sibghat Ullah Bazai, Julian Jang-Jaccard, Hooman Alavizadeh:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. ACM Trans. Priv. Secur. 25(1): 5:1-5:25 (2022) - [c37]Yuhua Yin, Julian Jang-Jaccard, Nilufar Baghaei:
PassImg: A Secure Password Generation and Management Scheme without Storing. CSCWD 2022: 341-346 - [i18]Wen Xu, Julian Jang-Jaccard, Tong Liu, Fariza Sabrina:
Training a Bidirectional GAN-based One-Class Classifier for Network Intrusion Detection. CoRR abs/2202.01332 (2022) - [i17]Yuhua Yin, Julian Jang-Jaccard, Wen Xu, Amardeep Singh, Jinting Zhu, Fariza Sabrina, Jin Kwak:
IGRF-RFE: A Hybrid Feature Selection Method for MLP-based Network Intrusion Detection on UNSW-NB15 Dataset. CoRR abs/2203.16365 (2022) - [i16]Amardeep Singh, Julian Jang-Jaccard:
Autoencoder-based Unsupervised Intrusion Detection using Multi-Scale Convolutional Recurrent Networks. CoRR abs/2204.03779 (2022) - [i15]Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic:
LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data. CoRR abs/2204.06701 (2022) - [i14]Jinting Zhu, Julian Jang-Jaccard, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework. CoRR abs/2207.10242 (2022) - [i13]Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak:
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset. CoRR abs/2208.09711 (2022) - 2021
- [j15]Wen Xu, Julian Jang-Jaccard, Amardeep Singh, Yuanyuan Wei, Fariza Sabrina:
Improving Performance of Autoencoder-Based Network Anomaly Detection on NSL-KDD Dataset. IEEE Access 9: 140136-140146 (2021) - [j14]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Amardeep Singh, Wen Xu, Seyit Camtepe:
AE-MLP: A Hybrid Deep Learning Approach for DDoS Detection and Classification. IEEE Access 9: 146810-146821 (2021) - [j13]Hooman Alavizadeh, Jin B. Hong, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Comput. Secur. 102: 102091 (2021) - [j12]Jinting Zhu, Julian Jang-Jaccard, Tong Liu, Jukai Zhou:
Joint Spectral Clustering based on Optimal Graph and Feature Selection. Neural Process. Lett. 53(1): 257-273 (2021) - [j11]Fariza Sabrina, Julian Jang-Jaccard:
Entitlement-Based Access Control for Smart Cities Using Blockchain. Sensors 21(16): 5264 (2021) - [c36]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Timothy R. McIntosh:
MSD-Kmeans: A Hybrid Algorithm for Efficient Detection of Global and Local Outliers. BigDataSE 2021: 87-94 - [i12]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Markov Game Model for AI-based Cyber Security Attack Mitigation. CoRR abs/2107.09258 (2021) - [i11]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Paul A. Watters, Seyit Camtepe:
Task-Aware Meta Learning-based Siamese Neural Network for Classifying Obfuscated Malware. CoRR abs/2110.13409 (2021) - [i10]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dong Seong Kim:
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. CoRR abs/2110.15747 (2021) - [i9]Amardeep Singh, Julian Jang-Jaccard:
Intrusion Detection using Spatial-Temporal features based on Riemannian Manifold. CoRR abs/2111.00626 (2021) - [i8]Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh:
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection. CoRR abs/2111.13978 (2021) - [i7]Jinting Zhu, Julian Jang-Jaccard, Amardeep Singh, Ian Welch, Harith Al-Sahaf, Seyit Camtepe:
A Few-Shot Meta-Learning based Siamese Neural Network using Entropy Features for Ransomware Classification. CoRR abs/2112.00668 (2021) - [i6]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Game-Theoretic Approach for AI-based Botnet Attack Defence. CoRR abs/2112.02223 (2021) - 2020
- [j10]Jinting Zhu, Julian Jang-Jaccard, Paul A. Watters:
Multi-Loss Siamese Neural Network With Batch Normalization Layer for Malware Detection. IEEE Access 8: 171542-171550 (2020) - [j9]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Hooman Alavizadeh:
Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors. IEEE Access 8: 229033-229042 (2020) - [j8]Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard:
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Gener. Comput. Syst. 111: 507-522 (2020) - [c35]Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. TrustCom 2020: 1276-1284 - [i5]Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. CoRR abs/2009.01604 (2020) - [i4]Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. CoRR abs/2009.02030 (2020)
2010 – 2019
- 2019
- [j7]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters, Teo Susnjak:
Masquerade Attacks Against Security Software Exclusion Lists. Aust. J. Intell. Inf. Process. Syst. 16(4): 1-8 (2019) - [c34]L. Jean Camp, Marthie Grobler, Julian Jang-Jaccard, Christian Probst, Karen Renaud, Paul A. Watters:
Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks. HICSS 2019: 1-10 - [c33]Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz:
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. ICISC 2019: 150-164 - [c32]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters, Teo Susnjak:
The Inadequacy of Entropy-Based Ransomware Detection. ICONIP (5) 2019: 181-189 - [c31]Sibghat Ullah Bazai, Julian Jang-Jaccard:
SparkDA: RDD-Based High-Performance Data Anonymization Technique for Spark Platform. NSS 2019: 646-662 - [e1]Julian Jang-Jaccard, Fuchun Guo:
Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11547, Springer 2019, ISBN 978-3-030-21547-7 [contents] - [r1]Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang:
Scalable Big Data Privacy with MapReduce. Encyclopedia of Big Data Technologies 2019 - [i3]Hootan Alavizadeh, Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz:
An Automated Security Analysis Framework and Implementation for Cloud. CoRR abs/1904.01758 (2019) - [i2]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Timothy R. McIntosh:
MSD-Kmeans: A Novel Algorithm for Efficient Detection of Global and Local Outliers. CoRR abs/1910.06588 (2019) - 2018
- [j6]Xuyun Zhang, Julian Jang-Jaccard, Lianyong Qi, Md. Zakirul Alam Bhuiyan, Chang Liu:
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications. Secur. Commun. Networks 2018: 6238607:1-6238607:3 (2018) - [c30]Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim:
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. MTD@CCS 2018: 11-20 - [c29]Timothy R. McIntosh, Julian Jang-Jaccard, Paul A. Watters:
Large Scale Behavioral Analysis of Ransomware Attacks. ICONIP (6) 2018: 217-229 - [c28]Yu Wang, Julian Jang-Jaccard, Mikael Boulic, Robyn Phipps, Chris Chitty, Ryan Weyers, Alfred Moses, Gustavo Olivares, Agate Ponder-Sutton, Chris Cunningham:
Deployment issues for integrated open-source - Based indoor air quality school Monitoring Box (SKOMOBO). SAS 2018: 1-4 - [c27]Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. TrustCom/BigDataSE 2018: 573-578 - 2017
- [c26]Sibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang:
A Privacy Preserving Platform for MapReduce. ATIS 2017: 88-99 - [c25]Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard:
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). ISPEC 2017: 539-548 - [c24]Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen:
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. ISPEC 2017: 860-876 - [c23]Sibghat Ullah Bazai, Julian Jang-Jaccard, Ruili Wang:
Anonymizing k-NN Classification on MapReduce. MONAMI 2017: 364-377 - 2016
- [j5]Julian Jang-Jaccard, Surya Nepal, Branko G. Celler, Bo Yan:
WebRTC-based video conferencing service for telehealth. Computing 98(1-2): 169-193 (2016) - [c22]Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu:
Towards privacy-preserving classification in neural networks. PST 2016: 392-399 - 2014
- [j4]Julian Jang-Jaccard, Surya Nepal:
A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5): 973-993 (2014) - 2013
- [c21]Surya Nepal, Julian Jang-Jaccard, Branko G. Celler, Bo Yan, Leila Alem:
Data architecture for telehealth services research: A case study of home tele-monitoring. CollaborateCom 2013: 458-467 - [c20]Julian Jang-Jaccard, Jane Li, Surya Nepal, Leila Alem:
Security analysis of mobile applications: A case study of a collaboration tool in healthcare. CollaborateCom 2013: 553-562 - 2012
- [j3]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A New Cloud Architecture of Virtual Trusted Platform Modules. IEICE Trans. Inf. Syst. 95-D(6): 1577-1589 (2012) - [j2]John J. Zic, Martin de Groot, Dongxi Liu, Julian Jang, Chen Wang:
Hardware Security Device Facilitated Trusted Energy Services. Mob. Networks Appl. 17(4): 564-577 (2012) - [c19]Julian Jang-Jaccard, Avnish Manraj, Surya Nepal:
Portable key management service for cloud storage. CollaborateCom 2012: 147-156 - 2011
- [j1]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
A mobile and portable trusted computing platform. EURASIP J. Wirel. Commun. Netw. 2011: 75 (2011) - [c18]Julian Jang, Hon Hwang, Surya Nepal:
Biometric Enabled Portable Trusted Computing Platform. TrustCom 2011: 436-442 - 2010
- [c17]John Zic, Julian Jang, Dongxi Liu, Chen Wang, Martin de Groot:
Hardware security device facilitated trusted residential energy services. CollaborateCom 2010: 1-6 - [c16]Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic:
A Cloud Architecture of Virtual Trusted Platform Modules. EUC 2010: 804-811 - [c15]Surya Nepal, John Zic, Dongxi Liu, Julian Jang:
Trusted Computing Platform in Your Pocket. EUC 2010: 812-817 - [c14]Julian Jang, Dongxi Liu, Surya Nepal, John Zic:
User Authentication for Online Applications Using a USB-Based Trust Device. MobiSec 2010: 15-26
2000 – 2009
- 2009
- [c13]Wei Chen, Alan D. Fekete, Paul Greenfield, Julian Jang:
Implementing Isolation for Service-Based Applications. OTM Conferences (1) 2009: 365-372 - 2008
- [c12]Julian Jang, Surya Nepal, John Zic:
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries. CIT 2008: 402-407 - 2007
- [c11]Paul Greenfield, Alan D. Fekete, Julian Jang, Dean Kuo, Surya Nepal:
Isolation Support for Service-based Applications: A Position Paper. CIDR 2007: 314-323 - [c10]Julian Jang, Alan D. Fekete, Paul Greenfield:
Delivering Promises for Web Services Applications. ICWS 2007: 599-606 - [c9]Surya Nepal, John Zic, Julian Jang:
A Policy Based Approach to Managing Shared Data in Dynamic Collaborations. OTM Conferences (2) 2007: 1296-1303 - [c8]Surya Nepal, Julian Jang, John Zic:
Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations. PDCAT 2007: 219-226 - 2006
- [c7]Julian Jang, Alan D. Fekete, Paul Greenfield, Surya Nepal:
An Event-Driven Workflow Engine for Service-based Business Systems. EDOC 2006: 233-242 - [c6]Julian Jang, Surya Nepal, John Zic:
Establishing a Trust Relationship in Cooperative Information Systems. OTM Conferences (1) 2006: 426-443 - [i1]Paul Greenfield, Alan D. Fekete, Julian Jang, Dean Kuo, Surya Nepal:
Isolation Support for Service-based Applications: A Position Paper. CoRR abs/cs/0612113 (2006) - 2005
- [c5]Surya Nepal, Alan D. Fekete, Paul Greenfield, Julian Jang, Dean Kuo, Tony Shi:
A Service-Oriented Workflow Language for Robust Interacting Applications. OTM Conferences (1) 2005: 40-58 - 2003
- [c4]Alan D. Fekete, Paul Greenfield, Dean Kuo, Julian Jang:
Transactions in Loosely Coupled Distributed Systems. ADC 2003: 7-12 - [c3]Dean Kuo, Alan D. Fekete, Paul Greenfield, Julian Jang, Doug Palmer:
Just What Could Possibly Go Wrong In B2B Integration? COMPSAC 2003: 544-549 - [c2]Paul Greenfield, Alan D. Fekete, Julian Jang, Dean Kuo:
Compensation is Not Enough. EDOC 2003: 232-239 - [c1]Julian Jang, Alan D. Fekete, Paul Greenfield, Dean Kuo:
Expressiveness of Workflow Description Languages. ICWS 2003: 104-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint