default search action
Richard A. Kemmerer
Person information
- affiliation: University of California, Santa Barbara, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c71]Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. ACSAC 2015: 41-50 - [c70]Benjamin Caillat, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Prison: Tracking Process Interactions to Contain Malware. HPCC/CSS/ICESS 2015: 1282-1291 - 2014
- [c69]Maria B. Line, Ali Zand, Gianluca Stringhini, Richard A. Kemmerer:
Targeted Attacks against Industrial Control Systems: Is the Power Industry Prepared? SEGS@CCS 2014: 13-22 - [c68]Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Rippler: Delay injection for service dependency detection. INFOCOM 2014: 2157-2165 - [c67]Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
The Tricks of the Trade: What Makes Spam Campaigns Successful? IEEE Symposium on Security and Privacy Workshops 2014: 77-83 - 2013
- [c66]Kyriakos G. Vamvoudakis, João P. Hespanha, Richard A. Kemmerer, Giovanni Vigna:
Formulating Cyber-Security as Convex Optimization Problems. CPSW@CISS 2013: 85-100 - [c65]Richard A. Kemmerer:
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. NDSS 2013 - 2011
- [j37]Brett Stone-Gross, Marco Cova, Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Analysis of a Botnet Takeover. IEEE Secur. Priv. 9(1): 64-72 (2011) - [j36]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal analysis of an electronic voting system: An experience report. J. Syst. Softw. 84(10): 1618-1637 (2011) - [c64]Greg Banks, Aristide Fattori, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper). DIMVA 2011: 184-193 - [c63]Richard A. Kemmerer:
How to steal a botnet and what can happen when you do. ICSM 2011: 1 - [c62]Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Understanding fraudulent activities in online ad exchanges. Internet Measurement Conference 2011: 279-294 - [c61]Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Dymo: Tracking Dynamic Code Identity. RAID 2011: 21-40 - [c60]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald:
The Underground Economy of Fake Antivirus Software. WEIS 2011 - [c59]Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, Christopher Kruegel, Douglas G. Steigerwald, Giovanni Vigna:
The Underground Economy of Fake Antivirus Software. WEIS (Springer Volume) 2011: 55-78 - 2010
- [j35]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
An Experience in Testing the Security of Real-World Electronic Voting Systems. IEEE Trans. Software Eng. 36(4): 453-473 (2010) - [c58]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal Specification and Analysis of an E-voting System. ARES 2010: 164-171 - [i5]Paul Z. Kolano, Carlo A. Furia, Richard A. Kemmerer, Dino Mandrioli:
Refinement and Verification of Real-Time Systems. CoRR abs/1002.1796 (2010)
2000 – 2009
- 2009
- [j34]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop, March 2nd-6th, 2008. Comput. Sci. Res. Dev. 23(1): 15-25 (2009) - [c57]Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Your botnet is my botnet: analysis of a botnet takeover. CCS 2009: 635-647 - [c56]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal analysis of attacks for e-voting system. CRiSIS 2009: 26-34 - [c55]Richard A. Kemmerer:
How to Steal a Botnet and What Can Happen When You Do. ICICS 2009: 1 - 2008
- [c54]Davide Balzarotti, Greg Banks, Marco Cova, Viktoria Felmetsger, Richard A. Kemmerer, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Are your votes really counted?: testing the security of real-world electronic voting systems. ISSTA 2008: 237-248 - [e3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008. Dagstuhl Seminar Proceedings 08102, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [i4]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel:
08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i3]Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov:
08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Network Attack Detection and Defense 2008 - [i2]Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage:
08102 Outcome Working Group -- Situational Awareness. Network Attack Detection and Defense 2008 - 2007
- [j33]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Using a virtual security testbed for digital forensic reconstruction. J. Comput. Virol. 2(4): 275-289 (2007) - [c53]Richard A. Kemmerer:
So You Think You Can Dance? ACSAC 2007: 3-17 - [c52]Darren Mutz, William K. Robertson, Giovanni Vigna, Richard A. Kemmerer:
Exploiting Execution Context for the Detection of Anomalous System Calls. RAID 2007: 1-20 - 2006
- [c51]André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer:
Digital Forensic Reconstruction and the Virtual Security Testbed ViSe. DIMVA 2006: 144-163 - [c50]Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna:
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. ISC 2006: 343-358 - [c49]William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. NDSS 2006 - [c48]André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Using Hidden Markov Models to Evaluate the Risks of Intrusions. RAID 2006: 145-164 - 2005
- [j32]Richard A. Kemmerer, Giovanni Vigna:
Hi-DRA: Intrusion Detection for Internet Security. Proc. IEEE 93(10): 1848-1857 (2005) - [c47]Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. ASE 2005: 3 - 2004
- [j31]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past pushdown timed automata and safety verification. Theor. Comput. Sci. 313(1): 57-71 (2004) - [j30]Fredrik Valeur, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Trans. Dependable Secur. Comput. 1(3): 146-169 (2004) - [c46]Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. ACSAC 2004: 16-27 - 2003
- [j29]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer:
Generalized discrete timed automata: decidable approximations for safety verificatio. Theor. Comput. Sci. 296(1): 59-74 (2003) - [j28]Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer:
Presburger liveness verification of discrete timed automata. Theor. Comput. Sci. 299(1-3): 413-438 (2003) - [c45]Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer:
A Stateful Intrusion Detection System for World-Wide Web Servers. ACSAC 2003: 34-43 - [c44]Darren Mutz, Giovanni Vigna, Richard A. Kemmerer:
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. ACSAC 2003: 374-383 - [c43]Richard A. Kemmerer:
Cybersecurity. ICSE 2003: 705-717 - [c42]Richard A. Kemmerer, Giovanni Vigna:
Internet Security and Intrusion Detection. ICSE 2003: 748-749 - [c41]Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. ESEC / SIGSOFT FSE 2003: 88-97 - 2002
- [j27]Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer:
STATL: An Attack Language for State-Based Intrusion Detection. J. Comput. Secur. 10(1/2): 71-104 (2002) - [j26]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Counter Machines and Verification Problems. Theor. Comput. Sci. 289(1): 165-189 (2002) - [c40]Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer:
Composable Tools For Network Discovery and Security Analysis. ACSAC 2002: 14-24 - [c39]Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. ACSAC 2002: 109-118 - [c38]Christopher Krügel, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer:
Stateful Intrusion Detection for High-Speed Networks. S&P 2002: 285-293 - 2001
- [c37]Zhe Dang, Oscar H. Ibarra, Richard A. Kemmerer:
Decidable Approximations on Generalized and Parameterized Discrete Timed Automata. COCOON 2001: 529-539 - [c36]Sebastian Fischmeister, Giovanni Vigna, Richard A. Kemmerer:
Evaluating the Security of Three Java-Based Mobile Agent Systems. Mobile Agents 2001: 31-41 - [c35]Giovanni Vigna, Richard A. Kemmerer, Per Blix:
Designing a Web of Highly-Configurable Intrusion Detection Sensors. Recent Advances in Intrusion Detection 2001: 69-84 - [c34]Zhe Dang, Pierluigi San Pietro, Richard A. Kemmerer:
On Presburger Liveness of Discrete Timed Automata. STACS 2001: 132-143 - [c33]Zhe Dang, Tevfik Bultan, Oscar H. Ibarra, Richard A. Kemmerer:
Past Pushdown Timed Automata. CIAA 2001: 74-86 - [p2]André L. M. dos Santos, Giovanni Vigna, Richard A. Kemmerer:
Security Testing of an Online Banking Service. E-Commerce Security and Privacy 2001: 3-15 - 2000
- [j25]Richard A. Kemmerer:
Editorial: New EIC Introduction. IEEE Trans. Software Eng. 26(2): 97 (2000) - [c32]André L. M. dos Santos, Richard A. Kemmerer:
Implementing Security Policies using the Safe Areas of Computation Approach. ACSAC 2000: 90-99 - [c31]Zhe Dang, Oscar H. Ibarra, Tevfik Bultan, Richard A. Kemmerer, Jianwen Su:
Binary Reachability Analysis of Discrete Pushdown Timed Automata. CAV 2000: 69-84 - [c30]Paul Z. Kolano, Richard A. Kemmerer, Dino Mandrioli:
Parallel Refinement Mechanisms for Real-Time Systems. FASE 2000: 35-50 - [c29]Zhe Dang, Richard A. Kemmerer:
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems. ICSE 2000: 345-354 - [c28]Paul Z. Kolano, Richard A. Kemmerer:
Classification schemes to aid in the analysis of real-time systems. ISSTA 2000: 86-95 - [c27]Oscar H. Ibarra, Jianwen Su, Zhe Dang, Tevfik Bultan, Richard A. Kemmerer:
Conter Machines: Decidable Properties and Applications to Verification Problems. MFCS 2000: 426-435
1990 – 1999
- 1999
- [j24]Paul Z. Kolano, Zhe Dang, Richard A. Kemmerer:
The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment. Ann. Softw. Eng. 7: 177-210 (1999) - [j23]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-based Intrusion Detection System. J. Comput. Secur. 7(1): 37-71 (1999) - [j22]Richard A. Kemmerer:
Editor's Note. IEEE Trans. Software Eng. 25(4): 433-434 (1999) - [j21]Richard A. Kemmerer:
Editorial. IEEE Trans. Software Eng. 25(6): 745-746 (1999) - [c26]André L. M. dos Santos, Richard A. Kemmerer:
Safe Areas of Computation for Secure Computing with Insecure Applications. ACSAC 1999: 35-44 - [c25]Zhe Dang, Richard A. Kemmerer:
Using the ASTRAL Model Checker to Analyze Mobile IP. ICSE 1999: 132-142 - [c24]Zhe Dang, Richard A. Kemmerer:
A Symbolic Model Checker for Testing ASTRAL Real-Time Specifications. RTCSA 1999: 174-181 - 1998
- [c23]Giovanni Vigna, Richard A. Kemmerer:
NetSTAT: A Network-Based Intrusion Detection Approach. ACSAC 1998: 25-34 - [c22]Richard G. Hamlet, Richard A. Kemmerer, Edward F. Miller, Debra J. Richardson:
The Most Influential Papers from the ISSTA Research Community (Panel). ISSTA 1998: 49 - [c21]Flavio De Paoli, André L. M. dos Santos, Richard A. Kemmerer:
Web Browsers and Security. Mobile Agents and Security 1998: 235-256 - [e2]Koji Torii, Kokichi Futatsugi, Richard A. Kemmerer:
Forging New Links, Proceedings of the 1998 International Conference on Software Engineering, ICSE 98, Kyoto, Japan, April 19-25, 1998. IEEE Computer Society 1998, ISBN 0-8186-8368-6 [contents] - 1997
- [j20]Alberto Coen-Porisini, Carlo Ghezzi, Richard A. Kemmerer:
Specification of Realtime Systems Using ASTRAL. IEEE Trans. Software Eng. 23(9): 572-598 (1997) - [c20]Richard A. Kemmerer:
Security Issues in Distributed Software. ESEC / SIGSOFT FSE 1997: 52-59 - [c19]Richard A. Kemmerer:
Formally Specifying and Verifying Real-Time Systems. ICFEM 1997: 112-121 - 1996
- [c18]Richard A. Kemmerer, Tad Taylor:
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. ACSAC 1996: 224-235 - [c17]Richard Denney, Richard A. Kemmerer, Nancy G. Leveson, Alberto Savoia:
Why State-of-the-Art is not State-of-the-Practice (Panel Abstract). ISSTA 1996: 293 - 1995
- [j19]Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras:
State Transition Analysis: A Rule-Based Intrusion Detection Approach. IEEE Trans. Software Eng. 21(3): 181-199 (1995) - [c16]Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli:
A Formal Framework for ASTRAL Inter-level Proof Obligations. ESEC 1995: 90-108 - 1994
- [j18]Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptol. 7(2): 79-130 (1994) - [j17]Alberto Coen-Porisini, Richard A. Kemmerer, Dino Mandrioli:
A Formal Framework for ASTRAL Intralevel Proof Obligations. IEEE Trans. Software Eng. 20(8): 548-561 (1994) - [c15]Jeffrey Douglas, Richard A. Kemmerer:
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications. ISSTA 1994: 15-27 - 1993
- [c14]Alberto Coen-Porisini, Richard A. Kemmerer:
The Composability of ASTRAL Realtime Specifications. ISSTA 1993: 128-138 - [p1]Richard A. Kemmerer:
Quality Assurance Working Group. Formal Methods in Systems Engineering 1993: 88-91 - 1992
- [j16]Jonathan D. Reichbach, Richard A. Kemmerer:
SoundWorks: An Object-Oriented Distributed System for Digital Sound. Computer 25(3): 25-37 (1992) - [j15]Richard A. Kemmerer, Carlo Ghezzi:
Guest Editors' Introduction: Specification and Analysis of Real-Time Systems. IEEE Trans. Software Eng. 18(9): 766-767 (1992) - [c13]Phillip A. Porras, Richard A. Kemmerer:
Penetration state transition analysis: A rule-based intrusion detection approach. ACSAC 1992: 220-229 - 1991
- [j14]Richard A. Kemmerer, Phillip A. Porras:
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels. IEEE Trans. Software Eng. 17(11): 1166-1185 (1991) - [c12]Carlo Ghezzi, Richard A. Kemmerer:
ASTRAL: An Assertion Language for Specifying Realtime Systems. ESEC 1991: 122-146 - [c11]Phillip A. Porras, Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. S&P 1991: 36-51 - 1990
- [j13]Richard A. Kemmerer:
Integrating Formal Methods into the Development Process. IEEE Softw. 7(5): 37-50 (1990) - [c10]Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
1980 – 1989
- 1989
- [j12]Richard A. Kemmerer:
Analyzing encryption protocols using formal verification techniques. IEEE J. Sel. Areas Commun. 7(4): 448-457 (1989) - [c9]Richard A. Kemmerer:
Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351 - [c8]Richard A. Kemmerer:
Completely Validated Software. ICSE 1989: 359-360 - [e1]Richard A. Kemmerer:
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, TAV 1989, Key West, Florida, USA, December 13-15, 1989. ACM 1989, ISBN 0-89791-342-6 [contents] - 1987
- [j11]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. IEEE Trans. Software Eng. 13(2): 157-168 (1987) - [c7]Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Authentication Schemes. CRYPTO 1987: 289-305 - [c6]Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240 - [c5]Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols. S&P 1987: 134-139 - 1986
- [j10]Brent Auernheimer, Richard A. Kemmerer:
RT-ASLAN: A Specification Language for Real-Time Systems. IEEE Trans. Software Eng. 12(9): 879-889 (1986) - [c4]J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. S&P 1986: 14-24 - [i1]Richard A. Kemmerer:
Analyzing Encryption Protocols Using Formal Verification Techniques. EUROCRYPT 1986: 48 - 1985
- [j9]J. David Blaine, Richard A. Kemmerer:
Complexity measures for assembly language programs. J. Syst. Softw. 5(3): 229-245 (1985) - [j8]Steven T. Eckmann, Richard A. Kemmerer:
INATEST: an interactive environment for testing formal specifications. ACM SIGSOFT Softw. Eng. Notes 10(4): 17-18 (1985) - [j7]Richard A. Kemmerer:
Overview of foundations. ACM SIGSOFT Softw. Eng. Notes 10(4): 75 (1985) - [j6]Richard A. Kemmerer, Steven T. Eckman:
UNISEX: A UNIX-based Symbolic EXecutor for Pascal. Softw. Pract. Exp. 15(5): 439-458 (1985) - [j5]Richard A. Kemmerer:
Testing Formal Specifications to Detect Design Errors. IEEE Trans. Software Eng. 11(1): 32-43 (1985) - 1983
- [j4]Richard A. Kemmerer:
Shared Resource Matrix Methodology: An Approach to Identifying Storage and Timing Channels. ACM Trans. Comput. Syst. 1(3): 256-277 (1983) - [c3]Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer:
SDC Secure Release Terminal Project. S&P 1983: 113-119 - 1982
- [c2]Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels. S&P 1982: 66-73 - 1981
- [j3]Richard A. Kemmerer:
Status of ongoing security-relevant projects. ACM SIGSOFT Softw. Eng. Notes 6(3): 42-43 (1981) - 1980
- [j2]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131 (1980) - [j1]Daniel M. Berry, Richard A. Kemmerer, Arndt von Staa, Shaula Yemini:
Toward Modular Verifiable Exception Handling. Comput. Lang. 5(2): 77-101 (1980)
1970 – 1979
- 1979
- [c1]Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek:
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract). SOSP 1979: 64-65
Coauthor Index
aka: Christopher Kruegel
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 00:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint