default search action
Anna Sperotto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c71]Ramin Yazdani, Mattijs Jonker, Anna Sperotto:
Swamp of Reflectors: Investigating the Ecosystem of Open DNS Resolvers. PAM (2) 2024: 3-18 - 2023
- [c70]Sousan Tarahomi, Ralph Holz, Anna Sperotto:
Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach. NetSoft 2023: 346-349 - [c69]Etienne Khan, Anna Sperotto, Jeroen van der Ham, Roland van Rijswijk-Deij:
Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers. PAM 2023: 46-68 - [c68]Ramin Yazdani, Yevheniya Nosyk, Ralph Holz, Maciej Korczynski, Mattijs Jonker, Anna Sperotto:
Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute. TMA 2023: 1-10 - 2022
- [j23]Olivier van der Toorn, Moritz Müller, Sara Dickinson, Cristian Hesselman, Anna Sperotto, Roland van Rijswijk-Deij:
Addressing the challenges of modern DNS a comprehensive tutorial. Comput. Sci. Rev. 45: 100469 (2022) - [c67]Olivier van der Toorn, Roland van Rijswijk-Deij, Raffaele Sommese, Anna Sperotto, Mattijs Jonker:
Saving Brian's privacy: the perils of privacy exposure through reverse DNS. IMC 2022: 1-13 - [c66]Raffaele Sommese, kc claffy, Roland van Rijswijk-Deij, Arnab Chattopadhyay, Alberto Dainotti, Anna Sperotto, Mattijs Jonker:
Investigating the impact of DDoS attacks on DNS infrastructure. IMC 2022: 51-64 - [c65]Christian Dietz, Marcel Antzek, Gabi Dreo, Anna Sperotto, Aiko Pras:
DMEF: Dynamic Malware Evaluation Framework. NOMS 2022: 1-7 - [c64]Ramin Yazdani, Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers. PAM 2022: 293-318 - [c63]Ramin Yazdani, Alden Hilton, Jeroen van der Ham, Roland van Rijswijk-Deij, Casey T. Deccio, Anna Sperotto, Mattijs Jonker:
Mirrors in the Sky: On the Potential of Clouds in DNS Reflection-based Denial-of-Service Attacks. RAID 2022: 263-275 - [e4]Roya Ensafi, Andra Lutu, Anna Sperotto, Roland van Rijswijk-Deij:
6th Network Traffic Measurement and Analysis Conference, TMA 2022, Enschede, The Netherlands, June 27-30, 2022. IFIP 2022, ISBN 978-3-903176-47-8 [contents] - [i1]Olivier van der Toorn, Raffaele Sommese, Anna Sperotto, Roland van Rijswijk-Deij, Mattijs Jonker:
Saving Brian's Privacy: the Perils of Privacy Exposure through Reverse DNS. CoRR abs/2202.01160 (2022) - 2021
- [c62]Olivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto:
ANYway: Measuring the Amplification DDoS Potential of Domains. CNSM 2021: 500-508 - [c61]Raffaele Sommese, Gautam Akiwate, Mattijs Jonker, Giovane C. M. Moura, Marco Davids, Roland van Rijswijk-Deij, Geoffrey M. Voelker, Stefan Savage, Kimberly C. Claffy, Anna Sperotto:
Characterization of Anycast Adoption in the DNS Authoritative Infrastructure. TMA 2021 - 2020
- [j22]Chris Misa, Dennis Guse, Oliver Hohlfeld, Ramakrishnan Durairajan, Anna Sperotto, Alberto Dainotti, Reza Rejaie:
Lessons learned organizing the PAM 2020 virtual conference. Comput. Commun. Rev. 50(3): 46-54 (2020) - [j21]Ralph Holz, Marco Mellia, Olivier Bonaventure, Hamed Haddadi, Matthew Caesar, Sergey Gorinsky, Gianni Antichi, Joseph Camp, kc claffy, Bhaskaran Raman, Anna Sperotto, Aline Carneiro Viana, Steve Uhlig:
Update on ACM SIGCOMM CCR reviewing process: towards a more open review process. Comput. Commun. Rev. 50(3): 55-56 (2020) - [j20]Cristian Hesselman, Paola Grosso, Ralph Holz, Fernando Kuipers, Janet Hui Xue, Mattijs Jonker, Joeri de Ruiter, Anna Sperotto, Roland van Rijswijk-Deij, Giovane C. M. Moura, Aiko Pras, Cees de Laat:
A Responsible Internet to Increase Trust in the Digital World. J. Netw. Syst. Manag. 28(4): 882-922 (2020) - [c60]Raffaele Sommese, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
The Forgotten Side of DNS: Orphan and Abandoned Records. EuroS&P Workshops 2020: 538-543 - [c59]Olivier van der Toorn, Roland van Rijswijk-Deij, Tobias Fiebig, Martina Lindorfer, Anna Sperotto:
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records. EuroS&P Workshops 2020: 544-549 - [c58]Ramin Yazdani, Olivier van der Toorn, Anna Sperotto:
A Case of Identity: Detection of Suspicious IDN Homograph Domains Using Active DNS Measurements. EuroS&P Workshops 2020: 559-564 - [c57]Raffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto:
MAnycast2: Using Anycast to Measure Anycast. Internet Measurement Conference 2020: 456-463 - [c56]Christian Dietz, Gabi Dreo, Anna Sperotto, Aiko Pras:
Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD. NOMS 2020: 1-5 - [c55]Mattijs Jonker, Anna Sperotto, Aiko Pras:
DDoS Mitigation: A Measurement-Based Approach. NOMS 2020: 1-6 - [c54]Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Distributed DDoS Defense: A collaborative Approach at Internet Scale. NOMS 2020: 1-6 - [c53]Raffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto:
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency. PAM 2020: 175-189 - [e3]Anna Sperotto, Alberto Dainotti, Burkhard Stiller:
Passive and Active Measurement - 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30-31, 2020, Proceedings. Lecture Notes in Computer Science 12048, Springer 2020, ISBN 978-3-030-44080-0 [contents]Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting.
2010 – 2019
- 2018
- [j19]Rick Hofstede, Aiko Pras, Anna Sperotto, Gabi Dreo Rodosek:
Flow-Based Compromise Detection: Lessons Learned. IEEE Secur. Priv. 16(1): 82-89 (2018) - [c52]Olivier van der Toorn, Anna Sperotto:
Threat Identification Using Active DNS Measurements. AIMS 2018: 1-5 - [c51]Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. Internet Measurement Conference 2018: 457-463 - [c50]Christian Dietz, Raphael Labaca Castro, Jessica Steinberger, Cezary Wilczak, Marcel Antzek, Anna Sperotto, Aiko Pras:
IoT-Botnet Detection and Isolation by Access Routers. NOF 2018: 88-95 - [c49]Jessica Steinberger, Benjamin Kuhnert, Christian Dietz, Lisa Ball, Anna Sperotto, Harald Baier, Aiko Pras, Gabi Dreo:
DDoS defense using MTD and SDN. NOMS 2018: 1-9 - [c48]Olivier van der Toorn, Roland van Rijswijk-Deij, Bart Geesink, Anna Sperotto:
Melting the snow: Using active DNS measurements to detect snowshoe spam domains. NOMS 2018: 1-9 - 2017
- [j18]José Jair Santanna, Ricardo de Oliveira Schmidt, Daphné Tuncer, Anna Sperotto, Lisandro Zambenedetti Granville, Aiko Pras:
Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options? IEEE Commun. Mag. 55(7): 50-56 (2017) - [j17]Rick Hofstede, Mattijs Jonker, Anna Sperotto, Aiko Pras:
Flow-Based Web Application Brute-Force Attack and Compromise Detection. J. Netw. Syst. Manag. 25(4): 735-758 (2017) - [j16]Roland van Rijswijk-Deij, Kaspar Hageman, Anna Sperotto, Aiko Pras:
The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Trans. Netw. 25(2): 738-750 (2017) - [c47]Mattijs Jonker, Anna Sperotto:
Measuring exposure in DDoS protection services. CNSM 2017: 1-9 - [c46]Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. Internet Measurement Conference 2017: 100-113 - [c45]Vaibhav Bajpai, Mirja Kühlewind, Jörg Ott, Jürgen Schönwälder, Anna Sperotto, Brian Trammell:
Challenges with Reproducibility. Reproducibility@SIGCOMM 2017: 1-4 - [c44]Anna Sperotto, Olivier van der Toorn, Roland van Rijswijk-Deij:
TIDE: Threat Identification Using Active DNS Measurements. SIGCOMM Posters and Demos 2017: 65-67 - 2016
- [j15]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE J. Sel. Areas Commun. 34(6): 1877-1888 (2016) - [c43]Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras:
In Whom Do We Trust - Sharing Security Events. AIMS 2016: 111-124 - [c42]Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras:
How to Achieve Early Botnet Detection at the Provider Level? AIMS 2016: 142-146 - [c41]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto:
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC. CNSM 2016: 258-262 - [c40]Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. Internet Measurement Conference 2016: 279-285 - [c39]Aiko Pras, José Jair Santanna, Jessica Steinberger, Anna Sperotto:
DDoS 3.0 - How Terrorists Bring Down the Internet. MMB/DFT 2016: 1-4 - [c38]Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras:
Collaborative DDoS defense using flow-based security event information. NOMS 2016: 516-522 - 2015
- [j14]Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras:
Making the Case for Elliptic Curves in DNSSEC. Comput. Commun. Rev. 45(5): 13-19 (2015) - [j13]Anna Sperotto, Rick Hofstede, Alberto Dainotti, Corinna Schmitt, Gabi Dreo Rodosek:
Special issue on measure, detect and mitigate-challenges and trends in network security. Int. J. Netw. Manag. 25(5): 261-262 (2015) - [j12]Idilio Drago, Rick Hofstede, Ramin Sadre, Anna Sperotto, Aiko Pras:
Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case. J. Netw. Syst. Manag. 23(1): 58-88 (2015) - [j11]Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Jeroen Famaey, Petr Velan, Pavel Celeda:
Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services. J. Netw. Syst. Manag. 23(3): 794-802 (2015) - [j10]Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Hans van den Berg, Aiko Pras:
Impact of Packet Sampling on Link Dimensioning. IEEE Trans. Netw. Serv. Manag. 12(3): 392-405 (2015) - [c37]Wouter Willem de Vries, José Jair Santanna, Anna Sperotto, Aiko Pras:
How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute. AIMS 2015: 113-125 - [c36]Mattijs Jonker, Anna Sperotto:
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking. AIMS 2015: 129-133 - [c35]Luuk Hendriks, Anna Sperotto, Aiko Pras:
Characterizing the IPv6 Security Landscape by Large-Scale Measurements. AIMS 2015: 145-149 - [c34]José Jair Santanna, Roland van Rijswijk-Deij, Rick Hofstede, Anna Sperotto, Mark Wierbosch, Lisandro Zambenedetti Granville, Aiko Pras:
Booters - An analysis of DDoS-as-a-service attacks. IM 2015: 243-251 - [c33]Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier:
How to exchange security events? Overview and evaluation of formats and protocols. IM 2015: 261-269 - [c32]Mattijs Jonker, Rick Hofstede, Anna Sperotto, Aiko Pras:
Unveiling flat traffic on the Internet: An SSH attack case study. IM 2015: 270-278 - [c31]José Jair Santanna, Romain Durban, Anna Sperotto, Aiko Pras:
Inside booters: An analysis on operational databases. IM 2015: 432-440 - [c30]Olivier van der Toorn, Rick Hofstede, Mattijs Jonker, Anna Sperotto:
A first look at HTTP(S) intrusion detection using NetFlow/IPFIX. IM 2015: 862-865 - [c29]Jessica Steinberger, Anna Sperotto, Harald Baier, Aiko Pras:
Collaborative attack mitigation and response: A survey. IM 2015: 910-913 - [c28]Daniel van der Steeg, Rick Hofstede, Anna Sperotto, Aiko Pras:
Real-time DDoS attack detection for Cisco IOS using NetFlow. IM 2015: 972-977 - [c27]Roland van Rijswijk-Deij, Mattijs Jonker, Anna Sperotto, Aiko Pras:
The Internet of Names: A DNS Big Dataset. SIGCOMM 2015: 91-92 - 2014
- [j9]Rick Hofstede, Luuk Hendriks, Anna Sperotto, Aiko Pras:
SSH Compromise Detection using NetFlow/IPFIX. Comput. Commun. Rev. 44(5): 20-26 (2014) - [j8]Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Hans van den Berg, Aiko Pras:
A hybrid procedure for efficient link dimensioning. Comput. Networks 67: 252-269 (2014) - [j7]Rick Hofstede, Pavel Celeda, Brian Trammell, Idilio Drago, Ramin Sadre, Anna Sperotto, Aiko Pras:
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX. IEEE Commun. Surv. Tutorials 16(4): 2037-2064 (2014) - [j6]Ramin Sadre, Anna Sperotto, Rick Hofstede, Nevil Brownlee:
Flow-based Approaches in Network Management: Recent Advances and Future Trends. Int. J. Netw. Manag. 24(4): 219-220 (2014) - [j5]Guillaume Doyen, Martin Waldburger, Anna Sperotto, Pavel Celeda, Juan-Luis Gorricho, Thomas Schaaf, Joan Serrat:
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. J. Netw. Syst. Manag. 22(2): 289-296 (2014) - [c26]José Jair Santanna, Anna Sperotto:
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon. AIMS 2014: 74-78 - [c25]Max Kerkers, José Jair Santanna, Anna Sperotto:
Characterisation of the Kelihos.B Botnet. AIMS 2014: 79-91 - [c24]Morteza Karimzadeh, Anna Sperotto, Aiko Pras:
Software Defined Networking to Improve Mobility Management Performance. AIMS 2014: 118-122 - [c23]Dirk Maan, José Jair Santanna, Anna Sperotto, Pieter-Tjerk de Boer:
Towards Validation of the Internet Census 2012. EUNICE 2014: 85-96 - [c22]Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras:
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. Internet Measurement Conference 2014: 449-460 - [c21]Sven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck:
Ethics in Data Sharing: Developing a Model for Best Practice. IEEE Symposium on Security and Privacy Workshops 2014: 5-9 - [e2]Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller:
Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings. Lecture Notes in Computer Science 8508, Springer 2014, ISBN 978-3-662-43861-9 [contents] - 2013
- [j4]Idilio Drago, Ricardo de Oliveira Schmidt, Rick Hofstede, Anna Sperotto, Morteza Karimzadeh, Boudewijn R. Haverkort, Aiko Pras:
Networking for the Cloud: Challenges and Trends. Prax. Inf.verarb. Kommun. 36(4): 207-214 (2013) - [c20]Wendy Ellens, Piotr Zuraniewski, Anna Sperotto, Harm Schotanus, Michel Mandjes, Erik Meeuwissen:
Flow-Based Detection of DNS Tunnels. AIMS 2013: 124-135 - [c19]Ricardo de Oliveira Schmidt, Ramin Sadre, Anna Sperotto, Aiko Pras:
Lightweight link dimensioning using sFlow sampling. CNSM 2013: 152-155 - [c18]Rick Hofstede, Václav Bartos, Anna Sperotto, Aiko Pras:
Towards real-time intrusion detection for NetFlow and IPFIX. CNSM 2013: 227-234 - [c17]Giovane Cesar Moreira Moura, Anna Sperotto, Ramin Sadre, Aiko Pras:
Evaluating third-party Bad Neighborhood blacklists for Spam detection. IM 2013: 252-259 - [c16]Rick Hofstede, Idilio Drago, Anna Sperotto, Ramin Sadre, Aiko Pras:
Measurement Artifacts in NetFlow Data. PAM 2013: 1-10 - [e1]Guillaume Doyen, Martin Waldburger, Pavel Celeda, Anna Sperotto, Burkhard Stiller:
Emerging Management Mechanisms for the Future Internet - 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings. Lecture Notes in Computer Science 7943, Springer 2013, ISBN 978-3-642-38997-9 [contents] - 2012
- [j3]Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. IEEE Trans. Netw. Serv. Manag. 9(2): 128-141 (2012) - [c15]Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras:
SSHCure: A Flow-Based SSH Intrusion Detection System. AIMS 2012: 86-97 - [c14]Ricardo de Oliveira Schmidt, Anna Sperotto, Ramin Sadre, Aiko Pras:
Towards Bandwidth Estimation Using Flow-Level Measurements. AIMS 2012: 127-138 - [c13]Idilio Drago, Marco Mellia, Maurizio M. Munafò, Anna Sperotto, Ramin Sadre, Aiko Pras:
Inside dropbox: understanding personal cloud storage services. Internet Measurement Conference 2012: 481-494 - [c12]Ramin Sadre, Anna Sperotto, Aiko Pras:
The effects of DDoS attacks on flow monitoring applications. NOMS 2012: 269-277 - [c11]Giovane Cesar Moreira Moura, Ramin Sadre, Anna Sperotto, Aiko Pras:
Internet bad neighborhoods aggregation. NOMS 2012: 343-350 - 2011
- [c10]Rick Hofstede, Idilio Drago, Anna Sperotto, Aiko Pras:
Flow Monitoring Experiences at the Ethernet-Layer. EUNICE 2011: 134-145 - [c9]Anna Sperotto, Aiko Pras:
Flow-based intrusion detection. Integrated Network Management 2011: 958-963 - 2010
- [b1]Anna Sperotto:
Flow-based intrusion detection. University of Twente, Enschede, Netherlands, 2010 - [j2]Anna Sperotto, Gregor Schaffrath, Ramin Sadre, Cristian Morariu, Aiko Pras, Burkhard Stiller:
An Overview of IP Flow-Based Intrusion Detection. IEEE Commun. Surv. Tutorials 12(3): 343-356 (2010) - [c8]Rick Hofstede, Anna Sperotto, Tiago Fioreze, Aiko Pras:
The Network Data Handling War: MySQL vs. NfDump. EUNICE 2010: 167-176
2000 – 2009
- 2009
- [j1]Aiko Pras, Ramin Sadre, Anna Sperotto, Tiago Fioreze, David Hausheer, Jürgen Schönwälder:
Using NetFlow/IPFIX for Network Management. J. Netw. Syst. Manag. 17(4): 482-487 (2009) - [c7]Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Hidden Markov Model Modeling of SSH Brute-Force Attacks. DSOM 2009: 164-176 - [c6]Anna Sperotto, Gert Vliek, Ramin Sadre, Aiko Pras:
Detecting Spam at the Network Level. EUNICE 2009: 208-216 - [c5]Tiago Fioreze, Lisandro Zambenedetti Granville, Aiko Pras, Anna Sperotto, Ramin Sadre:
Self-management of hybrid networks: Can we trust netflow data? Integrated Network Management 2009: 577-584 - [c4]Anna Sperotto, Ramin Sadre, Frank E. van Vliet, Aiko Pras:
A Labeled Data Set for Flow-Based Intrusion Detection. IPOM 2009: 39-50 - 2008
- [c3]Anna Sperotto, Ramin Sadre, Aiko Pras:
Anomaly Characterization in Flow-Based Traffic Time Series. IPOM 2008: 15-27 - 2007
- [c2]Anna Sperotto, Remco van de Meent:
A Survey of the High-Speed Self-learning Intrusion Detection Research Area. AIMS 2007: 196-199 - [c1]Anna Sperotto, Marcello Pelillo:
Szemerédi's Regularity Lemma and Its Applications to Pairwise Clustering and Segmentation. EMMCVPR 2007: 13-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint