default search action
Shiuh-Pyng Shieh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j65]Jason W. Rupe, Phil Laplante, Shiuhpyng Winston Shieh:
Guest Editorial Celebrating 75 Years of Excellence: The Enduring Legacy and Future Outlook of the IEEE Reliability Society. IEEE Trans. Reliab. 73(1): 3-6 (2024) - [j64]Shiuhpyng Winston Shieh, Jeffrey M. Voas, Phil Laplante, Jason W. Rupe, Christian K. Hansen, Yu-Sung Wu, Yi-Ting Chen, Chi-Yu Li, Kai-Chiang Wu:
Reliability Engineering in a Time of Rapidly Converging Technologies. IEEE Trans. Reliab. 73(1): 73-82 (2024) - [j63]Shanhsin Lee, Mengru Tsai, Shiuhpyng Winston Shieh:
The Game of Spear and Shield in Next Era of Cybersecurity. IEEE Trans. Reliab. 73(1): 85-92 (2024) - [j62]Mengru Tsai, Shanhsin Lee, Shiuhpyng Winston Shieh:
Strategy for Implementing of Zero Trust Architecture. IEEE Trans. Reliab. 73(1): 93-100 (2024) - 2023
- [c37]Shanhsin Lee, Yung-Shiu Chen, Shiuhpyng Winston Shieh:
CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection. DSC 2023: 1-8 - 2022
- [j61]Shiuhpyng Shieh, Shanhsin Lee, Mengru Tsai:
Strategy and Tactics Against Ransomware. Computer 55(5): 85-92 (2022) - [j60]Hsiu-Chuan Huang, Zhi-Kai Zhang, Chung-Kuan Chen, Wei-da Hong, Jui-Chien Jao, Shiuhpyng Shieh:
Adaptive Entry Point Discovery for Web Vulnerability Scanning. J. Inf. Sci. Eng. 38(1): 185-205 (2022) - 2021
- [c36]Shan-Hsin Lee, Shen-Chieh Lan, Hsiu-Chuan Huang, Chia-Wei Hsu, Yung-Shiu Chen, Shiuhpyng Shieh:
EC-Model: An Evolvable Malware Classification Model. DSC 2021: 1-8 - 2020
- [j59]Chi-Yuan Chen, Wei Quan, Nan Cheng, Shui Yu, Jong-Hyouk Lee, Gregorio Martínez Pérez, Hongke Zhang, Shiuhpyng Shieh:
IEEE Access Special Section Editorial: Artificial Intelligence in Cybersecurity. IEEE Access 8: 163329-163333 (2020) - [e2]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents]
2010 – 2019
- 2019
- [c35]Chun-Han Lin, Shan-Hsin Lee, Hsiu-Chuan Huang, Chi-Wei Wang, Chia-Wei Hsu, Shiuh-Pyng Shieh:
DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking. DSC 2019: 1-8 - 2018
- [j58]Chung-Kuan Chen, Zhi-Kai Zhang, Shan-Hsin Lee, Shiuhpyng Shieh:
Penetration Testing in the IoT Age. Computer 51(4): 82-85 (2018) - [c34]Chung-Kuan Chen, Shang-Kuei Chen, Shiuhpyng Winston Shieh:
Mitigating Over-Permissible Transfer for Control Flow Integrity. DSC 2018: 1-8 - [c33]Chung-Kuan Chen, E.-Lin Ho, Shiuhpyng Winston Shieh:
DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks. DSC 2018: 1-2 - [c32]Chia-Wei Hsu, Sheng-Ru Wei, Shiuhpyng Shieh:
Finder: Automatic ICC Data Reconstruction for Long-Term Runtime Semantics. DSC 2018: 1-9 - 2017
- [j57]Hsiu-Chuan Huang, Zhi-Kai Zhang, Hao-Wen Cheng, Shiuhpyng Winston Shieh:
Web Application Security: Threats, Countermeasures, and Pitfalls. Computer 50(6): 81-85 (2017) - [j56]Chia-Wei Hsu, Chia-Huei Chang, Chi-Wei Wang, Shiuhpyng Shieh:
DROIT+: Taint Tracking for Storage Access on Android. J. Inf. Sci. Eng. 33(5): 1237-1254 (2017) - [j55]Chia-Wei Hsu, Shan-Hsin Lee, Shiuhpyng Winston Shieh:
Adaptive Virtual Gestures for GUI Testing on Smartphones. IEEE Softw. 34(5): 22-29 (2017) - [j54]Zong-Xian Shen, Chia-Wei Hsu, Shiuhpyng Winston Shieh:
Security Semantics Modeling with Progressive Distillation. IEEE Trans. Mob. Comput. 16(11): 3196-3208 (2017) - [c31]Chia-Wei Wang, Shiuhpyng Shieh:
VMCloak: Toward a stealthy in-VM agent execution. DSC 2017: 115-122 - [c30]Chong Kuan Chen, Shen-Chieh Lan, Shiuhpyng Winston Shieh:
Shellcode detector for malicious document hunting. DSC 2017: 527-528 - 2016
- [j53]Chi-Wei Wang, Chia-Wei Wang, Shiuhpyng Shieh:
ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction. IEEE Trans. Dependable Secur. Comput. 13(5): 568-581 (2016) - 2015
- [j52]Zhi-Kai Zhang, Michael Cheng Yi Cho, Zong-Yu Wu, Shiuhpyng Winston Shieh:
Identifying and Authenticating IoT Objects in a Natural Context. Computer 48(8): 81-83 (2015) - [j51]Chia-Wei Wang, Michael Cheng Yi Cho, Chi-Wei Wang, Shiuhpyng Winston Shieh:
Combating Software Piracy in Public Clouds. Computer 48(10): 88-91 (2015) - [j50]Chi-Wei Wang, Shiuhpyng Winston Shieh:
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. J. Inf. Sci. Eng. 31(1): 111-129 (2015) - [j49]Chi-Wei Wang, Chong Kuan Chen, Chia-Wei Wang, Shiuhpyng Winston Shieh:
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern. J. Inf. Sci. Eng. 31(2): 455-473 (2015) - [j48]Chi-Wei Wang, Shiuhpyng Winston Shieh:
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations. J. Inf. Sci. Eng. 31(4): 1413-1429 (2015) - [c29]Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh:
Emerging Security Threats and Countermeasures in IoT. AsiaCCS 2015: 1-6 - 2014
- [j47]Michael Cheng Yi Cho, Pokai Chen, Shiuhpyng Winston Shieh:
Dmail: A Globally Authenticated Email Service. Computer 47(5): 88-91 (2014) - [j46]Chi-Wei Wang, Chia-Wei Wang, Chu-An Hsieh, Shiuhpyng Winston Shieh:
Cloudebug: A Programmable Online Malware Testbed. Computer 47(7): 90-92 (2014) - [j45]Michael Cheng Yi Cho, Chia-Wei Hsu, Shiuh-Pyng Shieh, Chi-Wei Wang:
Can Malware Be Exterminated by Better Understanding Its Roots? IT Prof. 16(6): 47-53 (2014) - [j44]Jia-Chun Lin, Shiuhpyng Shieh, Chia-Wei Hsu:
Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability. J. Inf. Sci. Eng. 30(6): 1847-1864 (2014) - [c28]Zhi-Kai Zhang, Michael Cheng Yi Cho, Chia-Wei Wang, Chia-Wei Hsu, Chong Kuan Chen, Shiuhpyng Shieh:
IoT Security: Ongoing Challenges and Research Opportunities. SOCA 2014: 230-234 - [c27]Yen Ju Liu, Chong Kuan Chen, Michael Cheng Yi Cho, Shiuhpyng Shieh:
Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison. SERE 2014: 196-205 - 2013
- [c26]Yin-Chang Sung, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh:
Light-Weight CSRF Protection by Labeling User-Created Contents. SERE 2013: 60-69 - [c25]Chia-Wei Hsu, Fan-Syun Shih, Chi-Wei Wang, Shiuhpyng Winston Shieh:
Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware. SERE 2013: 80-89 - 2012
- [j43]Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur:
A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks. IEEE Trans. Veh. Technol. 61(4): 1907-1924 (2012) - [c24]Yun-Min Cheng, Bing-Han Li, Shiuhpyng Winston Shieh:
Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint. SERE 2012: 187-196 - 2011
- [j42]Yu-Lun Huang, Chih-Ya Shen, Shiuh-Pyng Winston Shieh:
S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks. IEEE Trans. Veh. Technol. 60(9): 4509-4519 (2011) - [c23]Chia-Ming Fan, Shiuhpyng Shieh, Bing-Han Li:
On the security of password-based pairing protocol in Bluetooth. APNOMS 2011: 1-4 - [c22]Bing-Han Li, Shiuhpyng Shieh:
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. SSIRI 2011: 165-173 - 2010
- [j41]Shih-I Huang, Shiuhpyng Shieh:
Authentication and secret search mechanisms for RFID-aware wireless sensor networks. Int. J. Secur. Networks 5(1): 15-25 (2010) - [j40]Ming-Hour Yang, Shiuhpyng Shieh:
Tracing Anonymous Mobile Attackers in Wireless Network. J. Digit. Content Technol. its Appl. 4(4): 161-173 (2010) - [j39]Norman F. Schneidewind, Mark Montrose, Alec Feinberg, Arbi Ghazarian, Jim McLinn, Christian K. Hansen, Phillip A. Laplante, Nihal Sinnadurai, Enrico Zio, Richard C. Linger, W. Eric Wong, Shiuh-Pyng Shieh, Joseph Childs:
IEEE Reliability Society Technical Operations Annual Technical Report for 2010. IEEE Trans. Reliab. 59(3): 449-482 (2010) - [j38]Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar:
Secure encrypted-data aggregation for wireless sensor networks. Wirel. Networks 16(4): 915-927 (2010)
2000 – 2009
- 2009
- [c21]Yu-Lun Huang, Chih-Ya Shen, Shiuhpyng Shieh, Hung-Jui Wang, Cheng-Chun Lin:
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. SSIRI 2009: 243-252 - 2008
- [c20]Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh:
Tracing Mobile Attackers in Wireless Ad-Hoc Network. ICIW 2008: 7-12 - [c19]Warren W. Lin, Shiuhpyng Shieh, Jia-Chun Lin:
A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss. SSIRI 2008: 8-15 - [c18]Che-Cheng Lin, Shiuhpyng Shieh, Jia-Chun Lin:
Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks. SSIRI 2008: 96-102 - [c17]Yu-Lun Huang, J. Doug Tygar, Hsiao-Ying Lin, L. Y. Yeh, Hsin-Yi Tsai, Keith Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, Chia-Wei Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 - 2007
- [c16]Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu:
Keystroke statistical learning model for web authentication. AsiaCCS 2007: 359-361 - [c15]Shih-I Huang, Shiuhpyng Shieh:
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. CIS 2007: 848-852 - 2006
- [j37]Fu-Yuan Lee, Shiuh-Pyng Shieh:
Packet classification using diagonal-based tuple space search. Comput. Networks 50(9): 1406-1423 (2006) - [j36]Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen:
Secure Authentication Protocols Resistant to Guessing Attacks. J. Inf. Sci. Eng. 22(5): 1125-1143 (2006) - [c14]Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin:
Lightweight, pollution-attack resistant multicast authentication scheme. AsiaCCS 2006: 148-156 - [c13]Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh:
An efficient broadcast authentication scheme in wireless sensor networks. AsiaCCS 2006: 311-320 - [c12]Li-Joe Lin, Shiuhpyng Shieh, Tzu-I Yang, Warren W. Lin:
A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network. SMC 2006: 1262-1268 - [e1]Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia:
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM 2006, ISBN 1-59593-272-0 [contents] - 2005
- [j35]Fu-Yuan Lee, Shiuh-Pyng Shieh:
Defending against spoofed DDoS attacks with path fingerprint. Comput. Secur. 24(7): 571-586 (2005) - [j34]Shiuhpyng Shieh, Dan S. Wallach:
Guest Editors' Introduction: Ad Hoc and P2P Security. IEEE Internet Comput. 9(6): 14-15 (2005) - [j33]Shu-Min Cheng, Shiuh-Pyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo:
Designing Authentication Protocols for Third Generation Mobile Communication Systems. J. Inf. Sci. Eng. 21(2): 361-378 (2005) - 2004
- [j32]Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin:
Accelerating network security services with fast packet classification. Comput. Commun. 27(16): 1637-1646 (2004) - [j31]Fu-Yuan Lee, Shiuh-Pyng Shieh:
Scalable and lightweight key distribution for secure group communications. Int. J. Netw. Manag. 14(3): 167-176 (2004) - [j30]Cheng-Fen Lu, Shiuhpyng Shieh:
Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem. J. Inf. Sci. Eng. 20(2): 391-400 (2004) - [j29]Cheng-Fen Lu, Shiuhpyng Shieh:
Efficient Key-Evolving Protocol for the GQ Signature. J. Inf. Sci. Eng. 20(4): 763-769 (2004) - [j28]Shiuh-Pyng Shieh, Wen-Her Yang:
Protecting network users in mobile code systems. J. Parallel Distributed Comput. 64(2): 191-200 (2004) - [j27]Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang:
Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans. Multim. 6(5): 760-769 (2004) - 2003
- [j26]Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang:
Optimal information-dispersal for fault-tolerant communication over a burst-error channel. IEEE Trans. Reliab. 52(3): 354-366 (2003) - 2002
- [c11]Cheng-Fen Lu, Shiuh-Pyng Winston Shieh:
Secure Key-Evolving Protocols for Discrete Logarithm Schemes. CT-RSA 2002: 300-310 - 2001
- [j25]Wen-Her Yang, Kai-Wei Fan, Shiuh-Pyng Shieh:
A secure multicast protocol for the internet's multicast backbone. Int. J. Netw. Manag. 11(2): 129-136 (2001) - [j24]Wen-Her Yang, Shiuh-Pyng Shieh:
Secure key agreement for group communications. Int. J. Netw. Manag. 11(6): 365-374 (2001) - [c10]Jia-Ning Luo, Shiuh-Pyng Shieh:
The multi-layer RSIP framework. ICON 2001: 166-171 - 2000
- [j23]Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho:
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. Comput. Secur. 19(5): 453-465 (2000) - [j22]Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo:
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. IEEE Internet Comput. 4(6): 42-49 (2000) - [j21]Chern-Tang Lin, Shiuh-Pyng Shieh:
Chain authentication in mobile communication systems. Telecommun. Syst. 13(2-4): 213-240 (2000) - [j20]Shiuh-Pyng Shieh, Chern-Tang Lin, Wei-Bon Yang, Hung-Min Sun:
Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Trans. Veh. Technol. 49(4): 1464-1473 (2000) - [c9]Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang:
Practical Key Distribution Schemes for Channel Protection. COMPSAC 2000: 569-574
1990 – 1999
- 1999
- [j19]Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu:
Optimal Assignment of Mobile Agents for Software Authorization and Protection. Comput. Commun. 22(1): 46-55 (1999) - [j18]Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Comput. Commun. 22(2): 193-194 (1999) - [j17]Wen-Her Yang, Shiuh-Pyng Shieh:
Password authentication schemes with smart cards. Comput. Secur. 18(8): 727-733 (1999) - [j16]Shiuh-Pyng Shieh, Chern-Tang Lin:
Auditing User Queries in Dynamic Statistical Databases. Inf. Sci. 113(1-2): 131-146 (1999) - [j15]Shiuh-Pyng Shieh:
Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. J. Inf. Sci. Eng. 15(1): 91-106 (1999) - [j14]Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang:
An Efficient Authentication Protocol for Mobile Networks. J. Inf. Sci. Eng. 15(4): 505-520 (1999) - [j13]Hung-Min Sun, Shiuh-Pyng Shieh:
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. J. Inf. Sci. Eng. 15(5): 679-689 (1999) - [j12]Ing-Jye Shyu, Shiuh-Pyng Shieh:
A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems. Multim. Tools Appl. 8(2): 219-247 (1999) - [j11]Ing-Jye Shyu, Shiuh-Pyng Shieh:
Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers. Multim. Tools Appl. 9(3): 277-294 (1999) - 1998
- [j10]Hung-Min Sun, Shiuh-Pyng Shieh:
Secure broadcasting in large networks. Comput. Commun. 21(3): 279-283 (1998) - [j9]Shiuh-Pyng Shieh, Jun-Nan Chen:
Specification, validation, and verification of time-critical systems. Comput. Commun. 21(5): 460-469 (1998) - [j8]Ing-Jye Shyu, Shiuh-Pyng Shieh:
Balancing workload and recovery load on distributed fault-tolerant VOD systems. IEEE Commun. Lett. 2(10): 288-290 (1998) - [c8]Hung-Min Sun, Shiuh-Pyng Shieh:
On Private-Key Cryptosystems Based on Product Codes. ACISP 1998: 68-79 - 1997
- [j7]Shiuh-Pyng Shieh, Wen-Her Yang, Hung-Min Sun:
An authentication protocol without trusted third party. IEEE Commun. Lett. 1(3): 87-89 (1997) - [j6]Shiuh-Pyng Shieh, Virgil D. Gligor:
On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) - [j5]Shiuh-Pyng Shieh, Fu-Shen Ho:
A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees". IEEE Trans. Parallel Distributed Syst. 8(10): 1084 (1997) - [c7]Hung-Min Sun, Shiuh-Pyng Shieh:
Secret Sharing in Graph-Based Prohibited Structures. INFOCOM 1997: 718-724 - 1996
- [j4]Shiuh-Pyng Shieh, Virgil D. Gligor:
Detecting Illicit Leakage of Information in Operating Systems. J. Comput. Secur. 4(2/3): 123-148 (1996) - [j3]Shiuh-Pyng Shieh, Wen-Her Yang:
An Authentication and Key Distribution System for Open Network Systems. ACM SIGOPS Oper. Syst. Rev. 30(2): 32-41 (1996) - [c6]Hung-Min Sun, Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. CCS 1996: 153-156 - 1995
- [j2]Ing-Jye Shyu, Shiuh-Pyng Shieh:
Virtual Address Translation for Wide-Address Architectures. ACM SIGOPS Oper. Syst. Rev. 29(4): 37-46 (1995) - 1994
- [j1]Hung-Min Sun, Shiuh-Pyng Shieh:
On Dynamic Threshold Schemes. Inf. Process. Lett. 52(4): 201-206 (1994) - [c5]Ming-Ru Jiang, Shiuh-Pyng Shieh, Chang-Long Liu:
Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism. ICPADS 1994: 222-229 - [c4]Hung-Min Sun, Shiuh-Pyng Shieh:
Optimal Information Dispersal for Reliable Communication in Computer Networks. ICPADS 1994: 460-465 - [c3]Shiuh-Pyng Shieh, Hung-Min Sun:
On Constructing Secret Sharing Schemes. INFOCOM 1994: 1288-1292 - 1991
- [c2]Shiuh-Pyng Shieh, Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications. S&P 1991: 327-342 - 1990
- [c1]Shiuh-Pyng Shieh, Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems. S&P 1990: 285-295
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 01:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint