default search action
Alberto Dainotti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Olivier Bemba, Cecilia Testart, Alberto Dainotti:
Poster: Investigating Autonomous Systems Recurrently Causing Unexplained (Sub)MOAS Events. IMC 2024: 765-766 - [c60]Weili Wu, Zachary S. Bischof, Cecilia Testart, Alberto Dainotti:
Poster: Enhancing Internet Disruption Investigation via Path Monitoring. IMC 2024: 777-778 - [c59]Zahra Yazdani, Paul Pearce, Alberto Dainotti, Cecilia Testart:
Poster: Investigating Network Security Post-Outage: Open Ports Vulnerabilities. IMC 2024: 783-784 - [c58]Thomas Holterbach, Thomas Alfroy, Amreesh Phokeer, Alberto Dainotti, Cristel Pelsser:
A System to Detect Forged-Origin BGP Hijacks. NSDI 2024 - [c57]Manasvini Sethuraman, Zachary S. Bischof, Alberto Dainotti:
Towards Improving Outage Detection with Multiple Probing Protocols. PAM (1) 2024: 189-205 - 2023
- [c56]Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti:
Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. CoNEXT (Companion) 2023: 1-8 - [c55]Daniel Wagner, Sahil Ashish Ranadive, Harm Griffioen, Michalis Kallitsis, Alberto Dainotti, Georgios Smaragdakis, Anja Feldmann:
How to Operate a Meta-Telescope in your Spare Time. IMC 2023: 328-343 - [c54]Zhiyi Chen, Zachary S. Bischof, Cecilia Testart, Alberto Dainotti:
Improving the Inference of Sibling Autonomous Systems. PAM 2023: 345-372 - [c53]Zachary S. Bischof, Kennedy Pitcher, Esteban Carisimo, Amanda Meng, Rafael Bezerra Nunes, Ramakrishna Padmanabhan, Margaret E. Roberts, Alex C. Snoeren, Alberto Dainotti:
Destination Unreachable: Characterizing Internet Outages and Shutdowns. SIGCOMM 2023: 608-621 - [c52]Alexander Marder, Zesen Zhang, Ricky K. P. Mok, Ramakrishna Padmanabhan, Bradley Huffaker, Matthew Luckie, Alberto Dainotti, kc claffy, Alex C. Snoeren, Aaron Schulman:
Access Denied: Assessing Physical Risks to Internet Access Networks. USENIX Security Symposium 2023: 6877-6892 - [i7]Aniket Anand, Michalis Kallitsis, Jackson Sippe, Alberto Dainotti:
Aggressive Internet-Wide Scanners: Network Impact and Longitudinal Characterization. CoRR abs/2305.07193 (2023) - 2022
- [c51]Raffaele Sommese, kc claffy, Roland van Rijswijk-Deij, Arnab Chattopadhyay, Alberto Dainotti, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. IMC 2022: 51-64 - [c50]Scott Anderson, Loqman Salamatian, Zachary S. Bischof, Alberto Dainotti, Paul Barford:
iGDB: connecting the physical and logical layers of the internet. IMC 2022: 433-448 - [c49]Manasvini Sethuraman, Zachary S. Bischof, Alberto Dainotti:
Analysis of IPv4 address space utilization with ANT ISI dataset and censys. IMC 2022: 744-745 - [c48]Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti:
Quantifying Nations' Exposure to Traffic Observation and Selective Tampering. PAM 2022: 645-674 - [c47]Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. USENIX Security Symposium 2022: 431-448 - 2021
- [c46]Eugenio Nerio Nemmi, Francesco Sassi, Massimo La Morgia, Cecilia Testart, Alessandro Mei, Alberto Dainotti:
The parallel lives of autonomous systems: ASN allocations vs. BGP. Internet Measurement Conference 2021: 593-611 - [c45]Esteban Carisimo, Alexander Gamero-Garrido, Alex C. Snoeren, Alberto Dainotti:
Identifying ASes of state-owned internet operators. Internet Measurement Conference 2021: 687-702 - [c44]Ramakrishna Padmanabhan, Arturo Filastò, Maria Xynou, Ram Sundara Raman, Kennedy Middleton, Mingwei Zhang, Douglas Madory, Molly Roberts, Alberto Dainotti:
A multi-perspective view of Internet censorship in Myanmar. FOCI@SIGCOMM 2021: 27-36 - [i6]Raphael Hiesgen, Marcin Nawrocki, Alistair King, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope. CoRR abs/2110.05160 (2021) - [i5]Alexander Gamero-Garrido, Esteban Carisimo, Shuai Hao, Bradley Huffaker, Alex C. Snoeren, Alberto Dainotti:
Quantifying Nations Exposure to Traffic Observation and Selective Tampering. CoRR abs/2110.05772 (2021) - 2020
- [j23]Chris Misa, Dennis Guse, Oliver Hohlfeld, Ramakrishnan Durairajan, Anna Sperotto, Alberto Dainotti, Reza Rejaie:
Lessons learned organizing the PAM 2020 virtual conference. Comput. Commun. Rev. 50(3): 46-54 (2020) - [c43]Ramakrishna Padmanabhan, John P. Rula, Philipp Richter, Stephen D. Strowes, Alberto Dainotti:
DynamIPs: analyzing address assignment practices in IPv4 and IPv6. CoNEXT 2020: 55-70 - [c42]Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c41]Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c40]Pedro de B. Marcos, Lars Prehn, Lucas Leal, Alberto Dainotti, Anja Feldmann, Marinho P. Barcellos:
AS-Path Prepending: there is no rose without a thorn. Internet Measurement Conference 2020: 506-520 - [c39]Cecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, David Clark:
To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today. PAM 2020: 71-87 - [c38]Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189 - [e4]Anna Sperotto, Alberto Dainotti, Burkhard Stiller:
Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings. Lecture Notes in Computer Science 12048, Springer 2020, ISBN 978-3-030-44080-0 [contents]Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting.
2010 – 2019
- 2019
- [j22]Alberto Dainotti, Ralph Holz, Mirja Kühlewind, Andra Lutu, Joel Sommers, Brian Trammell:
Open collaborative hyperpapers: a call to action. Comput. Commun. Rev. 49(1): 31-33 (2019) - [j21]Rui Bian, Shuai Hao, Haining Wang, Amogh Dhamdhere, Alberto Dainotti, Chase Cotton:
Towards passive analysis of anycast in global routing: unintended impact of remote peering. Comput. Commun. Rev. 49(3): 18-25 (2019) - [c37]Cecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, David Clark:
Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table. Internet Measurement Conference 2019: 420-434 - [c36]Thomas Holterbach, Edgar Costa Molero, Maria Apostolaki, Alberto Dainotti, Stefano Vissicchio, Laurent Vanbever:
Blink: Fast Connectivity Recovery Entirely in the Data Plane. NSDI 2019: 161-176 - [c35]Ramakrishna Padmanabhan, Aaron Schulman, Alberto Dainotti, Dave Levin, Neil Spring:
How to Find Correlated Internet Failures. PAM 2019: 210-227 - [c34]Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Mérindol, Alistair King, Alberto Dainotti, Cristel Pelsser:
Chocolatine: Outage Detection for Internet Background Radiation. TMA 2019: 1-8 - [c33]Philipp Winter, Ramakrishna Padmanabhan, Alistair King, Alberto Dainotti:
Geo-locating BGP prefixes. TMA 2019: 9-16 - [c32]Shinyoung Cho, Romain Fontugne, Kenjiro Cho, Alberto Dainotti, Phillipa Gill:
BGP hijacking classification. TMA 2019: 25-32 - [i4]Andreas Guillot, Romain Fontugne, Philipp Winter, Pascal Mérindol, Alistair King, Alberto Dainotti, Cristel Pelsser:
Chocolatine: Outage Detection for Internet Background Radiation. CoRR abs/1906.04426 (2019) - 2018
- [j20]Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas A. Dimitropoulos:
A Survey among Network Operators on BGP Prefix Hijacking. Comput. Commun. Rev. 48(1): 64-69 (2018) - [j19]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking Within a Minute. IEEE/ACM Trans. Netw. 26(6): 2471-2486 (2018) - [c31]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking within a Minute. ANRW 2018: 6 - [c30]Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. Internet Measurement Conference 2018: 457-463 - [c29]Ioana Livadariu, Karyn Benson, Ahmed Elmokashfi, Amogh Dhamdhere, Alberto Dainotti:
Inferring Carrier-Grade NAT Deployment in the Wild. INFOCOM 2018: 2249-2257 - [c28]Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch:
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP. SIGCOMM Posters and Demos 2018: 57-59 - [e3]Xenofontas A. Dimitropoulos, Alberto Dainotti, Laurent Vanbever, Theophilus Benson:
Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2018, Heraklion, Greece, December 04-07, 2018. ACM 2018, ISBN 978-1-4503-6080-7 [contents] - [e2]Pedro Casas, Marco Mellia, Alberto Dainotti, Tanja Zseby:
Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, Big-DAMA@SIGCOMM 2018, Budapest, Hungary, August 20, 2018. ACM 2018, ISBN 978-1-4503-5904-7 [contents] - [i3]Pavlos Sermpezis, Vasileios Kotronis, Petros Gigis, Xenofontas A. Dimitropoulos, Danilo Cicalese, Alistair King, Alberto Dainotti:
ARTEMIS: Neutralizing BGP Hijacking within a Minute. CoRR abs/1801.01085 (2018) - [i2]Pavlos Sermpezis, Vasileios Kotronis, Alberto Dainotti, Xenofontas A. Dimitropoulos:
A Survey among Network Operators on BGP Prefix Hijacking. CoRR abs/1801.02918 (2018) - 2017
- [c27]Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. Internet Measurement Conference 2017: 100-113 - [c26]Thomas Holterbach, Stefano Vissicchio, Alberto Dainotti, Laurent Vanbever:
SWIFT: Predictive Fast Reroute. SIGCOMM 2017: 460-473 - 2016
- [j18]Alberto Dainotti, Ethan Katz-Bassett, Xenofontas A. Dimitropoulos:
The BGP hackathon 2016 report. Comput. Commun. Rev. 46(3): 12:1-12:6 (2016) - [j17]Alberto Dainotti, Karyn Benson, Alistair King, Bradley Huffaker, Eduard Glatz, Xenofontas A. Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren:
Lost in Space: Improving Inference of IPv4 Address Space Utilization. IEEE J. Sel. Areas Commun. 34(6): 1862-1876 (2016) - [c25]Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti:
BGPStream: A Software Framework for Live and Historical BGP Data Analysis. Internet Measurement Conference 2016: 429-444 - 2015
- [j16]Anna Sperotto, Rick Hofstede, Alberto Dainotti, Corinna Schmitt, Gabi Dreo Rodosek:
Special issue on measure, detect and mitigate-challenges and trends in network security. Int. J. Netw. Manag. 25(5): 261-262 (2015) - [j15]Alberto Dainotti, Alistair King, Kimberly C. Claffy, Ferdinando Papale, Antonio Pescapè:
Analysis of a "/0" Stealth Scan From a Botnet. IEEE/ACM Trans. Netw. 23(2): 341-354 (2015) - [c24]Karyn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, Michael G. Kallitsis:
Leveraging Internet Background Radiation for Opportunistic Network Analysis. Internet Measurement Conference 2015: 423-436 - [c23]Elias Raftopoulos, Eduard Glatz, Xenofontas A. Dimitropoulos, Alberto Dainotti:
How Dangerous Is Internet Scanning? - A Measurement Study of the Aftermath of an Internet-Wide Scan. TMA 2015: 158-172 - 2014
- [j14]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(1): 42-49 (2014) - [j13]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael G. Kallitsis, Eduard Glatz, Xenofontas A. Dimitropoulos:
Estimating internet address space usage through passive measurements. Comput. Commun. Rev. 44(2): 99-100 (2014) - [j12]Alistair King, Bradley Huffaker, Alberto Dainotti, kc claffy:
A coordinated view of the temporal evolution of large-scale Internet events. Computing 96(1): 53-65 (2014) - [j11]Walter de Donato, Antonio Pescapè, Alberto Dainotti:
Traffic identification engine: an open platform for traffic classification. IEEE Netw. 28(2): 56-64 (2014) - [j10]Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè:
Analysis of Country-Wide Internet Outages Caused by Censorship. IEEE/ACM Trans. Netw. 22(6): 1964-1977 (2014) - [c22]Lance Alt, Robert Beverly, Alberto Dainotti:
Uncovering network tarpits with degreaser. ACSAC 2014: 156-165 - [e1]Alberto Dainotti, Anirban Mahanti, Steve Uhlig:
Traffic Monitoring and Analysis - 6th International Workshop, TMA 2014, London, UK, April 14, 2014. Proceedings. Lecture Notes in Computer Science 8406, Springer 2014, ISBN 978-3-642-54998-4 [contents] - [i1]Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Eduard Glatz, Xenofontas A. Dimitropoulos, Philipp Richter, Alessandro Finamore, Alex C. Snoeren:
Lost in Space: Improving Inference of IPv4 Address Space Utilization. CoRR abs/1410.6858 (2014) - 2013
- [j9]Giuseppe Aceto, Alberto Dainotti, Walter de Donato, Antonio Pescapè:
TIE: Traffic Identification Engine. Prax. Inf.verarb. Kommun. 36(1): 48 (2013) - [c21]Karyn Benson, Alberto Dainotti, Kimberly C. Claffy, Emile Aben:
Gaining insight into AS-level outages through analysis of Internet Background Radiation. INFOCOM Workshops 2013: 447-452 - [c20]Karyn Benson, Alberto Dainotti, kc claffy, Emile Aben:
Gaining insight into AS-level outages through analysis of Internet background radiation. INFOCOM 2013: 3471-3476 - [p1]Silvio Valenti, Dario Rossi, Alberto Dainotti, Antonio Pescapè, Alessandro Finamore, Marco Mellia:
Reviewing Traffic Classification. Data Traffic Monitoring and Analysis 2013: 123-147 - 2012
- [j8]Alberto Dainotti, Roman Amman, Emile Aben, Kimberly C. Claffy:
Extracting benefit from harm: using malware pollution to analyze the impact of political and geophysical events on the internet. Comput. Commun. Rev. 42(1): 31-39 (2012) - [j7]Alessio Botta, Alberto Dainotti, Antonio Pescapè:
A tool for the generation of realistic network workload for emerging networking scenarios. Comput. Networks 56(15): 3531-3547 (2012) - [j6]Alberto Dainotti, Antonio Pescapè, Kimberly C. Claffy:
Issues and future directions in traffic classification. IEEE Netw. 26(1): 35-40 (2012) - [c19]Alberto Dainotti, Alistair King, Kimberly C. Claffy:
Analysis of internet-wide probing using darknets. BADGERS@CCS 2012: 13-14 - [c18]Karyn Benson, Alberto Dainotti, kc claffy, Emile Aben:
Gaining insight into AS-level outages through analysis of internet background radiation. StudentWorkshop@CoNEXT 2012: 63-64 - [c17]Alberto Dainotti, Alistair King, kc claffy, Ferdinando Papale, Antonio Pescapè:
Analysis of a "/0" stealth scan from a botnet. Internet Measurement Conference 2012: 1-14 - 2011
- [c16]Alberto Dainotti, Antonio Pescapè, Hyun-chul Kim:
Traffic Classification through Joint Distributions of Packet-Level Statistics. GLOBECOM 2011: 1-6 - [c15]Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, Antonio Pescapè:
Analysis of country-wide internet outages caused by censorship. Internet Measurement Conference 2011: 1-18 - [c14]Alberto Dainotti, Antonio Pescapè, Carlo Sansone, Antonio Quintavalle:
Using a Behaviour Knowledge Space Approach for Detecting Unknown IP Traffic Flows. MCS 2011: 360-369 - [c13]Alberto Dainotti, Antonio Pescapè, Carlo Sansone:
Early Classification of Network Traffic through Multi-classification. TMA 2011: 122-135 - 2010
- [j5]Alessio Botta, Alberto Dainotti, Antonio Pescapè:
Do you trust your software-based traffic generator? IEEE Commun. Mag. 48(9): 158-165 (2010) - [c12]Alberto Dainotti, Francesco Gargiulo, Ludmila I. Kuncheva, Antonio Pescapè, Carlo Sansone:
Identification of Traffic Flows Hiding behind TCP Port 80. ICC 2010: 1-6 - [c11]Valentín Carela-Español, Pere Barlet-Ros, Marc Solé-Simó, Alberto Dainotti, Walter de Donato, Antonio Pescapè:
K-Dimensional Trees for Continuous Traffic Classification. TMA 2010: 141-154
2000 – 2009
- 2009
- [j4]Thomas Silverston, Olivier Fourmaux, Alessio Botta, Alberto Dainotti, Antonio Pescapè, Giorgio Ventre, Kavé Salamatian:
Traffic analysis of peer-to-peer IPTV communities. Comput. Networks 53(4): 470-484 (2009) - [j3]Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
A cascade architecture for DoS attacks detection based on the wavelet transform. J. Comput. Secur. 17(6): 945-968 (2009) - [c10]Alberto Dainotti, Walter de Donato, Antonio Pescapè:
TIE: A Community-Oriented Traffic Classification Platform. TMA 2009: 64-74 - 2008
- [j2]Alberto Dainotti, Antonio Pescapè, Pierluigi Salvo Rossi, Francesco Palmieri, Giorgio Ventre:
Internet traffic modeling by means of Hidden Markov Models. Comput. Networks 52(14): 2645-2662 (2008) - [c9]Alberto Dainotti, Walter de Donato, Antonio Pescapè, Pierluigi Salvo Rossi:
Classification of Network Traffic via Packet-Level Hidden Markov Models. GLOBECOM 2008: 2138-2142 - 2007
- [j1]Alberto Dainotti, Salvatore Loreto, Antonio Pescapè, Giorgio Ventre:
SCTP performance evaluation over heterogeneous networks. Concurr. Comput. Pract. Exp. 19(8): 1207-1218 (2007) - [c8]Alberto Dainotti, Alessio Botta, Antonio Pescapè:
Do you know what you are generating? CoNEXT 2007: 32 - [c7]Alessio Botta, Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
Reducing Network Traffic Data Sets. ICC 2007: 350-356 - [c6]Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
Worm Traffic Analysis and Characterization. ICC 2007: 1435-1442 - 2006
- [c5]Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
A packet-level characterization of network traffic. CAMAD 2006: 38-45 - [c4]Alberto Dainotti, Alessio Botta, Antonio Pescapè, Giorgio Ventre:
Searching for invariants in network games traffic. CoNEXT 2006: 43 - [c3]Alberto Dainotti, Antonio Pescapè, Pierluigi Salvo Rossi, Giulio Iannello, Francesco Palmieri, Giorgio Ventre:
An HMM Approach to Internet Traffic Modeling. GLOBECOM 2006 - [c2]Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
Wavelet-based Detection of DoS Attacks. GLOBECOM 2006 - 2005
- [c1]Alberto Dainotti, Antonio Pescapè, Giorgio Ventre:
A packet-level traffic model of Starcraft. HOT-P2P 2005: 33-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint