default search action
Luigi Coppolino
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Luigi Coppolino, Alessandro De Crecchio, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Federica Uccello:
Exploiting Data Spaces to Enable Privacy Preserving Data Exchange in the Energy Supply Chain. ITASEC 2024 - [i3]Luigi Coppolino, Salvatore D'Antonio, Davide Iasio, Giovanni Mazzeo, Luigi Romano:
An Experimental Evaluation of TEE technology Evolution: Benchmarking Transparent Approaches based on SGX, SEV, and TDX. CoRR abs/2408.00443 (2024) - 2023
- [c56]Luigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent:
Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart Grids. ARES 2023: 80:1-80:10 - [c55]Luigi Coppolino, Salvatore D'Antonio, Federica Uccello, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis:
Detection of Radio Frequency Interference in Satellite Ground Segments. CSR 2023: 648-653 - [c54]Luigi Coppolino, Giovanni Mazzeo, Luigi Romano:
Awesome Trusted Execution Environment. DSN-S 2023: 5-6 - [c53]Anas Husseis, Jose Luis Flores, Andrej Bregar, Giovanni Mazzeo, Luigi Coppolino:
Enhancing Cybersecurity Proactive Decision-Making Through Attack Tree Analysis and MITRE Framework. ICCST 2023: 1-5 - [c52]Luigi Coppolino, Roberto Nardone, Luigi Romano:
Securing FIWARE with TEE Technology. SoMeT 2023: 149-160 - 2022
- [j26]Luigi Coppolino, Salvatore D'Antonio, Vincenzo Giuliano, Giovanni Mazzeo, Luigi Romano:
A framework for Seveso-compliant cyber-physical security testing in sensitive industrial plants. Comput. Ind. 136: 103589 (2022) - [j25]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
PriSIEM: Enabling privacy-preserving Managed Security Services. J. Netw. Comput. Appl. 203: 103397 (2022) - [j24]Luigi Coppolino, Luigi Sgaglione, Salvatore D'Antonio, Mario Magliulo, Luigi Romano, Roberto Pacelli:
Risk Assessment Driven Use of Advanced SIEM Technology for Cyber Protection of Critical e-Health Processes. SN Comput. Sci. 3(1): 16 (2022) - 2021
- [j23]Flora Amato, Luigi Coppolino, Giovanni Cozzolino, Giovanni Mazzeo, Francesco Moscato, Roberto Nardone:
Enhancing random forest classification with NLP in DAMEH: A system for DAta Management in eHealth Domain. Neurocomputing 444: 79-91 (2021) - [j22]Luigi Coppolino, Luigi Romano, Alessandro Scaletti, Luigi Sgaglione:
Fuzzy set theory-based comparative evaluation of cloud service offerings: an agro-food supply chain case study. Technol. Anal. Strateg. Manag. 33(8): 900-913 (2021) - [j21]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Giovanni Mazzeo, Luigi Romano:
VISE: Combining Intel SGX and Homomorphic Encryption for Cloud Industrial Control Systems. IEEE Trans. Computers 70(5): 711-724 (2021) - [j20]Flora Amato, Luigi Coppolino, Francesco Mercaldo, Francesco Moscato, Roberto Nardone, Antonella Santone:
CAN-Bus Attack Detection With Deep Learning. IEEE Trans. Intell. Transp. Syst. 22(8): 5081-5090 (2021) - [c51]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-Preserving Credit Scoring via Functional Encryption. ICCSA (8) 2021: 31-43 - [c50]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, Elena Spagnuolo:
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study. ISSRE Workshops 2021: 345-352 - [c49]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Paolo Campegiani:
Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing. ITASEC 2021: 298-308 - [i2]Lorenzo Andolfo, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Matthew Ficke, Arne Hollum, Darshan Vaydia:
Privacy-preserving Credit Scoring via Functional Encryption. CoRR abs/2109.10606 (2021) - 2020
- [j19]Flora Amato, Luigi Coppolino, Salvatore D'Antonio, Nicola Mazzocca, Francesco Moscato, Luigi Sgaglione:
An abstract reasoning architecture for privacy policies monitoring. Future Gener. Comput. Syst. 106: 393-400 (2020)
2010 – 2019
- 2019
- [j18]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comparative analysis of emerging approaches for securing java software with Intel SGX. Future Gener. Comput. Syst. 97: 620-633 (2019) - [j17]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Securing the weak link of federated systems via trusted execution: a case study from the eHealth domain. Int. J. Crit. Comput. Based Syst. 9(4): 293-317 (2019) - [j16]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
A comprehensive survey of hardware-assisted security: From the edge to the cloud. Internet Things 6 (2019) - [c48]Sotiris Diamantopoulos, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Dimitris Karamitros, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude Voronkov, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez:
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. EDCC 2019: 73-74 - [c47]Sotiris Diamantopoulos, Dimitris Karamitros, Luigi Romano, Luigi Coppolino, Vassilis Koutkias, Kostas Votis, Oana Stan, Paolo Campegiani, David Mari Martinez, Marco Nalin, Ilaria Baroni, Fabrizio Clemente, Giuliana Faiella, Charis Mesaritakis, Evangelos Grivas, Janne Rasmussen, Jan Petersen, Isaac Cano, Elisa Puigdomènech, Erol Gelenbe, Jos Dumortier, Maja Voss-Knude:
Secure Cross-Border Exchange of Health Related Data: The KONFIDO Approach. IDCS 2019: 318-327 - [c46]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mario Magliulo, Roberto Pacelli:
Protecting Critical Business Processes of Smart Hospitals from Cyber Attacks. SITIS 2019: 363-367 - [c45]Luigi Sgaglione, Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Domenico Cotroneo, Andrea Scognamiglio:
Privacy Preserving Intrusion Detection Via Homomorphic Encryption. WETICE 2019: 321-326 - 2018
- [j15]Mariacarla Staffa, Luigi Sgaglione, Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Erol Gelenbe, Oana Stan, Sergiu Carpov, Evangelos Grivas, Paolo Campegiani, Luigi Castaldo, Konstantinos Votis, Vassilis Koutkias, Ioannis Komnios:
An OpenNCP-based Solution for Secure eHealth Data Exchange. J. Netw. Comput. Appl. 116: 65-85 (2018) - [j14]Pantelis Natsiavas, Janne Rasmussen, Maja Voss-Knude, Konstantinos Votis, Luigi Coppolino, Paolo Campegiani, Isaac Cano, David Marí, Giuliana Faiella, Fabrizio Clemente, Marco Nalin, Evangelos Grivas, Oana Stan, Erol Gelenbe, Jos Dumortier, Jan Petersen, Dimitrios Tzovaras, Luigi Romano, Ioannis Komnios, Vassilis Koutkias:
Comprehensive user requirements engineering methodology for secure and interoperable health data exchange. BMC Medical Informatics Decis. Mak. 18(1): 85:1-85:16 (2018) - [j13]Giovanni Mazzeo, Luigi Coppolino, Salvatore D'Antonio, Claudio Mazzariello, Luigi Romano:
SIL2 assessment of an Active/Standby COTS-based Safety-Related system. Reliab. Eng. Syst. Saf. 176: 125-134 (2018) - [c44]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
How to Protect Public Administration from Cybersecurity Threats: The COMPACT Project. AINA Workshops 2018: 573-578 - [c43]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
Exploiting New CPU Extensions for Secure Exchange of eHealth Data at the EU Level. EDCC 2018: 17-24 - [c42]Mariacarla Staffa, Luigi Coppolino, Luigi Sgaglione, Erol Gelenbe, Ioannis Komnios, Evangelos Grivas, Oana Stan, Luigi Castaldo:
KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System. Euro-CYBERSEC 2018: 11-27 - [c41]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione:
An Approach for Securing Cloud-Based Wide Area Monitoring of Smart Grid Systems. NBiS 2018: 952-959 - [c40]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
An Approach for Securing Critical Applications in Untrusted Clouds. PDP 2018: 436-440 - 2017
- [j12]Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano:
Cloud security: Emerging threats and current solutions. Comput. Electr. Eng. 59: 126-140 (2017) - [j11]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Real-time QoS monitoring from the end user perspective in large scale social networks. Int. J. Comput. Sci. Eng. 14(2): 93-104 (2017) - [c39]Raffaele Martino, Salvatore D'Antonio, Luigi Coppolino, Luigi Romano:
Security in Cross - Border Medical Data Interchange: A Technical Analysis and a Discussion of Possible Improvements. COMPSAC (2) 2017: 317-322 - [c38]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Luigi Sgaglione, Mariacarla Staffa:
Addressing Security Issues in the eHeatlh Domain Relying on SIEM Solutions. COMPSAC (2) 2017: 510-515 - [c37]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Mariacarla Staffa:
KONFIDO Project: A Secure Infrastructure Increasing Interoperability on a Systemic Level Among eHealth Services Across Europe. iThings/GreenCom/CPSCom/SmartData 2017: 342-347 - [c36]Ferdinando Campanile, Luigi Coppolino, Salvatore D'Antonio, Leonid Lev, Giovanni Mazzeo, Luigi Romano, Luigi Sgaglione, Francesco Tessitore:
Cloudifying Critical Applications: A Use Case from the Power Grid Domain. PDP 2017: 363-370 - 2016
- [j10]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
A framework for mastering heterogeneity in multi-layer security information and event correlation. J. Syst. Archit. 62: 78-88 (2016) - 2015
- [j9]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
How to monitor QoS in cloud infrastructures: the QoSMONaaS approach. Int. J. Comput. Sci. Eng. 11(1): 29-45 (2015) - [j8]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures. Int. J. Distributed Sens. Networks 11: 980629:1-980629:16 (2015) - [j7]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer theory to detect account takeovers in mobile money transfer services. J. Ambient Intell. Humaniz. Comput. 6(6): 753-762 (2015) - [j6]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 4-20 (2015) - [c35]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Gaetano Papale, Luigi Sgaglione, Ferdinando Campanile:
Direct Debit Transactions: A Comprehensive Analysis of Emerging Attack Patterns. 3PGCIC 2015: 713-717 - [c34]Luigi Coppolino, Valerio D'Alessandro, Salvatore D'Antonio, Leonid Lev, Luigi Romano:
My Smart Home is Under Attack. CSE 2015: 145-151 - [c33]Fabio Baselice, Luigi Coppolino, Salvatore D'Antonio, Giampaolo Ferraioli, Luigi Sgaglione:
A DBSCAN based approach for jointly segment and classify brain MR images. EMBC 2015: 2993-2996 - [c32]Andre Rein, Roland Rieke, Michael Jäger, Nicolai Kuntze, Luigi Coppolino:
Trust Establishment in Cooperating Cyber-Physical Systems. CyberICS/WOS-CPS@ESORICS 2015: 31-47 - [c31]Gianfranco Cerullo, Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Gaetano Papale, Bruno Ragucci:
Enabling Convergence of Physical and Logical Security Through Intelligent Event Correlation. IDC 2015: 427-437 - [c30]Luigi Coppolino, Salvatore D'Antonio, Carmine Massei, Luigi Romano:
Efficient Supply Chain Management via Federation-Based Integration of Legacy ERP Systems. SoMeT 2015: 378-387 - 2014
- [j5]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Exposing vulnerabilities in electric power grids: An experimental approach. Int. J. Crit. Infrastructure Prot. 7(1): 51-60 (2014) - [c29]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Real-time Security & Dependability monitoring: Make it a bundle. ICCST 2014: 1-6 - [c28]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Carmine Massei, Luigi Romano:
Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study. IDC 2014: 465-474 - [c27]Francesco Buccafurri, Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Gianluca Lax, Antonino Nocera, Luigi Romano:
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks. SAFECOMP 2014: 214-229 - [i1]Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Big Data Analytics for QoS Prediction Through Probabilistic Model Checking. CoRR abs/1405.0327 (2014) - 2013
- [c26]Luigi Coppolino, Salvatore D'Antonio, Alessia Garofalo, Luigi Romano:
Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks. 3PGCIC 2013: 247-254 - [c25]Alessia Garofalo, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio:
A GPS Spoofing Resilient WAMS for Smart Grid. EWDC 2013: 134-147 - [c24]Luigi Coppolino, Salvatore D'Antonio, Luigi Romano, Fotis Aisopos, Konstantinos Tserpes:
Effective QoS Monitoring in Large Scale Social Networks. IDC 2013: 249-259 - [c23]Alessandro Cilardo, Nicola Mazzocca, Luigi Coppolino:
TrustedSIM: Towards Unified Mobile Security. UIC/ATC 2013: 563-568 - 2012
- [j4]Luigi Coppolino, Luigi Romano, Andrea Bondavalli, Alessandro Daidone:
A hidden Markov model based intrusion detection system for wireless sensor networks. Int. J. Crit. Comput. Based Syst. 3(3): 210-228 (2012) - [c22]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Enhancing SIEM Technology to Protect Critical Infrastructures. CRITIS 2012: 10-21 - [c21]Muhammad Afzaal, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
A Resilient Architecture for Forensic Storage of Events in Critical Infrastructures. HASE 2012: 48-55 - [c20]Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber:
Security and Reliability Requirements for Advanced Security Event Management. MMM-ACNS 2012: 171-180 - [c19]Luigi Romano, Salvatore D'Antonio, Valerio Formicola, Luigi Coppolino:
Protecting the WSN Zones of a Critical Infrastructure via Enhanced SIEM Technology. SAFECOMP Workshops 2012: 222-234 - [c18]Ornella Adinolfi, Rosario Cristaldi, Luigi Coppolino, Luigi Romano:
QoS-MONaaS: A Portable Architecture for QoS Monitoring in the Cloud. SITIS 2012: 527-532 - 2011
- [j3]Luigi Coppolino, Luigi Romano, Valerio Vianello:
Security Engineering of SOA Applications Via Reliability Patterns. J. Softw. Eng. Appl. 4(1): 1-8 (2011) - [c17]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Francesco Oliviero, Luigi Romano:
On the Security of the Terminal Operations for Container Shipping in Multimodal Transport: the SIS-TEMA Project. CRiSIS 2011: 94-99 - [c16]Giuseppe Cicotti, Luigi Coppolino, Rosario Cristaldi, Salvatore D'Antonio, Luigi Romano:
QoS Monitoring in a Cloud Services Environment: The SRT-15 Approach. Euro-Par Workshops (1) 2011: 15-24 - [c15]Salvatore D'Antonio, Luigi Coppolino, Ivano Alessandro Elia, Valerio Formicola:
Security issues of a phasor data concentrator for smart grid infrastructure. EWDC 2011: 3-8 - [c14]Massimo Ficco, Alessandro Daidone, Luigi Coppolino, Luigi Romano, Andrea Bondavalli:
An event correlation approach for fault diagnosis in SCADA infrastructures. EWDC 2011: 15-20 - [c13]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
Security Analysis of Smart Grid Data Collection Technologies. SAFECOMP 2011: 143-156 - [c12]Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano:
Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study. SAFECOMP 2011: 199-212 - 2010
- [c11]Luigi Coppolino, Danilo De Mari, Luigi Romano, Valerio Vianello:
SLA compliance monitoring through semantic processing. GRID 2010: 252-258
2000 – 2009
- 2009
- [c10]Luigi Romano, Luigi Coppolino, Ivano Alessandro Elia, Gianluigi Spagnuolo:
A healthcare real-time monitoring system for multiple sensors data collection and correlation. KES IIMSS 2009: 455-464 - [c9]Massimo Ficco, Luigi Coppolino, Luigi Romano:
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks. LADC 2009: 9-16 - [c8]Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano:
From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. SEUS 2009: 192-202 - 2008
- [j2]Ferdinando Campanile, Luigi Coppolino, Salvatore Giordano, Luigi Romano:
A business process monitor for a mobile phone recharging system. J. Syst. Archit. 54(9): 843-848 (2008) - [c7]Alessandro Cilardo, Nicola Mazzocca, Luigi Coppolino:
Virtual Scan Chains for Online Testing of FPGA-based Embedded Systems. DSD 2008: 360-366 - 2007
- [c6]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security. PDP 2007: 381-386 - [c5]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
Performance Evaluation of Security Services: An Experimental Approach. PDP 2007: 387-394 - [c4]Ferdinando Campanile, Alessandro Cilardo, Luigi Coppolino, Luigi Romano:
Adaptable Parsing of Real-Time Data Streams. PDP 2007: 412-418 - [c3]Luigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi:
Web Services workflow reliability estimation through reliability patterns. SecureComm 2007: 107-115 - 2006
- [j1]Alessandro Cilardo, Luigi Coppolino, Nicola Mazzocca, Luigi Romano:
Elliptic Curve Cryptography Engineering. Proc. IEEE 94(2): 395-406 (2006) - [c2]Valentina Casola, Luigi Coppolino, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak:
Design and implementation of TruMan, a Trust Manager Component for Distributed Systems. SecPerU 2006: 34-40 - 2005
- [c1]Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano:
High-Performance and Interoperable Security Services for Mobile Environments. HPCC 2005: 1064-1069
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint