


default search action
Ghassan Samara
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Mohammad Aljaidi
, Omprakash Kaiwartya
, Ghassan Samara
, Ayoub Alsarhan
, Mufti Mahmud
, Sami M. Alenezi, Raed Alazaidah, Jaime Lloret
:
Green Communication in IoT for Enabling Next-Generation Wireless Systems. Comput. 13(10): 251 (2024) - [j8]Ghassan Samara
, Wafaa Alzyoud, Mohammad Aljaidi
, Raed Alazaidah
, Mais Haj Qasem, Essam Al Daoud
:
Optimizing Performance in Wireless Sensor Networks through a Multi-Objective Rendezvous Points Selection Algorithm. Int. J. Interact. Mob. Technol. 18(18): 167-183 (2024) - [j7]Mazen Alzyoud
, Najah Al-Shanableh
, Eman Nashnush, Rabah Shboul, Raed Alazaidah
, Ghassan Samara, Safaa Alhusban:
Enhanced Machine Learning Based Network Traffic Detection Model for IoT Network. Int. J. Interact. Mob. Technol. 18(19): 182-198 (2024) - [j6]Qais Al-Na'amneh, Mohammad Aljaidi, Ahmad Nasayreh, Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Ameera Saleh Jaradat, Ayoub Alsarhan, Ghassan Samara:
Enhancing IoT device security: CNN-SVM hybrid approach for real-time detection of DoS and DDoS attacks. J. Intell. Syst. 33(1) (2024) - [j5]Hasan Gharaibeh, Rabia Emhamed Al Mamlook, Ghassan Samara
, Ahmad Nasayreh, Saja Smadi, Khalid M. O. Nahar, Mohammad Aljaidi, Essam Al Daoud, Mohammad A. Gharaibeh, Laith Abualigah:
Arabic sentiment analysis of Monkeypox using deep neural network and optimized hyperparameters of machine learning algorithms. Soc. Netw. Anal. Min. 14(1): 30 (2024) - [j4]Ahmad Nasayreh
, Rabia Emhamed Al Mamlook
, Ghassan Samara
, Hasan Gharaibeh
, Mohammad Aljaidi
, Dalia Alzu'bi
, Essam Al Daoud
, Laith Abualigah
:
Arabic Sentiment Analysis for ChatGPT Using Machine Learning Classification Algorithms: A Hyperparameter Optimization Technique. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(3): 36 (2024) - [c41]Abeer Al-Mohtaseb, Ali Qasim Hanoon, Ghassan Samara, Essam Al Daoud, Omar Alidmat, Radwan Batyha, Mohammad Aljaidi, Raed Alazaidah, Ali Elrashidi:
A Comprehensive Review of VANET Attacks: Predictive Models, Vulnerability Management, and Defense Selection. ACIT 2024: 1-9 - [c40]Mohammad Rasmi Al-Mousa
, Samah Suleiman Al-Zou'bi, Sami Askar, Khaled E. Al-Qawasmi, Ala'a Saeb Al-Sherideh, Ghassan Samara, Rami Almatarneh, Mohammed Khouj, Mahmoud Odeh:
IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey. ACIT 2024: 1-9 - [c39]Mohammad Rasmi Al-Mousa
, Mohammad Abdulqawi, Hazem Jihad Badarneh, Ala'a Al-Shaikh, Mahmoud Asassfeh, Ala'a Saeb Al-Sherideh, Ghassan Samara, Ali Elrashidi, Raed Alazaidah:
A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography. ACIT 2024: 1-8 - [c38]Anas M. Al-Oraiqat
, Oleksandr Drieiev, Ghassan Samara, Sattam Almatarneh
, Karim A. Al-Oraiqat, Hazim Alrawashdeh, Hanna Drieieva, Ali Elrashidi, Yassin M. Y. Hasan:
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection. ACIT 2024: 1-9 - [c37]Ala'a Al-Shaikh, Ashraf Hasan AlAlfi, Esam Y. A. Al-Nsour, Suha Afaneh, Ghassan Samara, Khaled AlQawasmi, Nabeel Al-Milli, Mohammed Khouj, Amer Abu Salem:
Using Artificial Intelligence Techniques in Law Enforcement: A Survey. ACIT 2024: 1-7 - [c36]Ala'a Saeb Al-Sherideh, Samah Suleiman Al-Zou'bi, Fuad Alshraiedeh, Esraa Abu Elsoud, Suha Afaneh, Mohammad Rasmi Al-Mousa
, Raed Alazaidah, Mohammed Khouj, Ghassan Samara:
Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis. ACIT 2024: 1-6 - [c35]Mahmoud AlJamal, Rabee Alqura'n, Mohammad Aljaidi, Osama S. AlJamal, Ayoub Alsarhan, Issa Al-Aiash, Ghassan Samara, Mohammad BaniSalman, Mohammad Khouj:
Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection. ACIT 2024: 1-9 - [c34]Raed Alazaidah, Radwan Batyha, Ghassan Samara, Esraa Al Henawi, Maram Y. Al-Safarini, Ahmad A. Samhan, Ali Elrashidi, Mo'ath Alluwaici, Deana Al-Omari:
Diabetes Prediction Using Machine Learning Techniques: A Case Study from Jordan. ACIT 2024: 1-6 - [c33]Raed Alazaidah, Ola Nasir, Wael Hadi, Ghassan Samara, Essam Al Daoud, Mohammad Aljaidi, Mohammed Talat Khouj, Esraa Abu Elsoud, Haneen Alzoubi:
Multi Label Classification Algorithm Based on Conditional Local Correlations among Labels and Ensemble Learning. ACIT 2024: 1-8 - [c32]Raed Alazaidah, Ghassan Samara, Anwar Katrawi, Wael Hadi, Maram Y. Al-Safarini, Farah Al-Mamoori, Ali Elrashidi, Muhyeeddin Alqaraleh, Haneen Alzoubi:
Prediction of Hypertension Disease Using Machine Learning Techniques: Case Study from Jordan. ACIT 2024: 1-6 - [c31]Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Abdelrahman Alfaqih, Ghassan Samara, Manish Kumar Singla:
Securing Internet of Vehicles IoV Communications: A Biometric and Hash-Key Derivation Function HKDF-Based Approach. ACIT 2024: 1-7 - [c30]Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Ghassan Samara, Manish Kumar Singla, Ahmed BaniMustafa:
Proactive Insider Threat Detection Using Facial and Behavioral Biometrics. ACIT 2024: 1-7 - [c29]Rabee Alqura'n, Mahmoud AlJamal, Mohammad Aljaidi, Mohammad AlJamal, Bashar Khassawneh, Ayoub Alsarhan, Omar Alidmat, Ghassan Samara, Sattam Almatarneh
:
Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined Networks. ACIT 2024: 1-8 - [c28]Rahaf Alsawi, Raed Alazaidah, Ghassan Samara, Haneen Alzoubi, Omar Alidmat, Esraa Abu Elsoud, Mohammed Talat Khouj, Anwar Katrawi, Mo'ath Alluwaici:
Application of Machine Learning in Mental Diseases Diagnosis. ACIT 2024: 1-6 - [c27]Mahmoud Asassfeh, Mohammad Rasmi Al-Mousa
, Waleed Amer, Adai Mohammad Almomani, Ala'a Al-Shaikh, Suha Afaneh, Mohammed Nayef Alrefai, Ali Elrashidi, Ghassan Samara:
Main Confidentiality Challenges in Network Security: A Literature Review. ACIT 2024: 1-9 - [c26]Mahmoud Asassfeh, Mohammad Rasmi Al-Mousa
, Hasan Al-Dweikat, Malak Hamad Al-Mashagbeh, Suha Afaneh, Ghassan Samara, Ali Abu Zaid, Mohammed Khouj, Essam Al Daoud:
An Overview of Tools and Techniques in Network Forensics. ACIT 2024: 1-7 - [c25]Mahmoud Rajallah Asassfeh, Esraa Abu Elsoud, Sultan Mohammed Albilasi, Abdullah Al-Qammaz, Ala'a Al-Shaikh, Suha Afaneh, Ahmad Bany Doumi, Ali Elrashidi, Ghassan Samara:
Cloud Security: Analyzing Threats and Challenges. ACIT 2024: 1-8 - [c24]Hazem Jihad Badarneh, Loai Ahmad Attiany, Mahmoud Asassfeh, Ala'a Al-Shaikh, Suha Afaneh, Mohammed M. Abu Shquier, Nabeel Al-Milli, Ali Elrashidi, Ghassan Samara:
The power of Network Penetration Testing. ACIT 2024: 1-6 - [c23]Ahmed BaniMustafa, Sattam Almatarneh
, Olla Bulkrock, Raed Alazaidah, Hossam Almahasneh, Ghassan Samara:
Investigating Principle Component Analysis Impact on the Performance of Machine Learning Classifiers: A Health Informatics Application. ACIT 2024: 1-6 - [c22]Ola Nasir, Raed Alazaidah, Wael Hadi, Ghassan Samara, Essam Al Daoud, Suhaila Abu Owaida, Ali Elrashidi, Esraa Abu Elsoud, Haneen Alzoubi:
Multi Label Classification Based on Ensemble Learning: Investigative Study. ACIT 2024: 1-8 - [c21]Ghassan Samara, Ala'Mazen Elhilo, Mohammad Aljaidi, Amneh Alamleh, Mohammad Rasmi Al-Mousa
, Radwan Batyha, Raed Alazaidah, Alaa Bani-Bakr, Ali Elrashidi:
Enhancing Convergence Efficiency in Federated Learning Models. ACIT 2024: 1-4 - [c20]Ghassan Samara, Mohammad Abu Fadda, Abeer Al-Mohtaseb, Raed Alazaidah, Alrefai Mohamed N., Mahmoud Odeh, Mohammad Aljaidi, Mohammed Mahmod Shuaib, Mohammad Kanan:
Deep Learning Approaches for Malware Detection in the Industrial Internet of Things: A Comprehensive Analysis. ACIT 2024: 1-7 - [c19]Ghassan Samara, Hussain Mohammed Turki, Mahmoud Odeh, Anas M. Al-Oraiqat
, Mohammad Aljaidi, Raed Alazaidah, Mohammad Rasmi Al-Mousa
, Ahmed BaniMustafa, Mohammad Kanan:
Efficient Road Status Monitoring in Vehicular Ad-Hoc Networks: An Optimization Framework. ACIT 2024: 1-5 - [i33]Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah:
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective. CoRR abs/2402.01655 (2024) - 2023
- [c18]Raed Alazaidah, Mohammad A. Hassan, Lara Al-Rbabah, Ghassan Samara, Marina Yusoff, Ala'a Saeb Al-Sherideh:
Utilizing Machine Learning in Medical Diagnosis: Systematic Review and Empirical Analysis. ACIT 2023: 1-9 - [c17]Hasan Idhaim, Mohammad Aljaidi, Ghassan Samara, Mais Haj Qasem, Ayoub Alsarhan, Muhammad Khalid:
Internal Hidden Processing Model-Based for SELECT Command in Structured Query Language. ACIT 2023: 1-6 - [c16]Abdallah Moubayed, MohammadNoor Injadat, Nouh Alhindawi, Ghassan Samara, Sara Abuasal, Raed Alazaidah:
A Deep Learning Approach Towards Student Performance Prediction in Online Courses: Challenges Based on a Global Perspective. ACIT 2023: 1-6 - [c15]Al Refai Mohammed N., Taani M. K. K., Ahmed Ali Otoom
, Ghassan Samara, Hanandeh E. S, Hayel Khafajeh:
Studying Risks of Hybrid Reengineering on Air-Transportation Systems Management "A Case Study on Jordanian Civil Aviation Regulatory Commission (CARC)". ACIT 2023: 1-8 - [c14]Ghassan Samara, Alaa Elhilo, Mahmoud Rajallah Asassfeh, MohammadNoor Injadat, Mais Haj Qasem, Raed Alazaidah, Mohammad Aljaidi, Nabeel Al-Milli, Adnan A. Hnaif:
Optimizing Road Safety through Intelligent Congestion Management. ACIT 2023: 1-7 - [c13]Essam Al Daoud, Ghassan Samara, Laith Al Daoud, Mohammad Aljaidi:
A Comparative Study of Transformers Embeddings for Question Answering in Arabic Private Documents. BCD 2023: 5-9 - 2022
- [c12]Mohammad Rasmi Al-Mousa
, Qutaiba Al-Zaqebah, Ala'a Saeb Al-Sherideh, Mohammed Alghanim, Ghassan Samara
, Sattam Al-Matarneh
, Mahmoud Asassfeh:
Examining Digital Forensic Evidence for Android Applications. ACIT 2022: 1-8 - [c11]Mohammad Aljaidi, Nauman Aslam, Ghassan Samara
, Sattam Almatarneh
, Khaled E. Al-Qawasmi, Abdullah Al-Qammaz:
EV Charging Station Placement and Sizing Techniques: Survey, Challenges and Directions for Future Work. ACIT 2022: 1-6 - [c10]Sattam Almatarneh
, Israa Abdullah Almatarneh, Ghassan Samara
, Mohammad Aljaidi
, Amneh Alamleh, Aref Abuawad:
Polarity Classification of Hotel Reviews: Lexicon-Based Method. ACIT 2022: 1-4 - [c9]Ghassan Samara
, Ghassan M. Alsayyed, Mohammad Aljaidi, Sattam Almatarneh
, Feras Almashakbah, Firas Omar:
Internet of Robotic Things in Early Childhood Education: Domains and Challenges. ACIT 2022: 1-7 - [c8]Ghassan Samara
, Mohammad Aljaidi, Essam Al Daoud, Maram Y. Al-Safarini
, Ghassan M. Alsayyed, Sattam Almatarneh
:
Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS). ACIT 2022: 1-7 - [c7]Ghassan Samara
, Mohammed Bhaa Eid, Mohammad Aljaidi, Sattam Almatarneh
, Mohammed Rasmi
, Raed Alazaideh, Yasser Al-Lahham:
Vulnerabilities in Vehicular Ad Hoc Networks and Possible Countermeasures. ACIT 2022: 1-5 - [i32]Mohammad A. Hassan, Ghassan Samara, Mohammad Abu Fadda:
IoT Forensic Frameworks (DFIF, IoTDOTS, FSAIoT): A Comprehensive Study. CoRR abs/2203.15705 (2022) - [i31]Ghassan Samara, Mohammad A. Hassan, Munir Al-okour:
Energy Balancing Algorithm for Wireless Sensor Network. CoRR abs/2203.15733 (2022) - [i30]Ghassan Samara, Mohammed Rasmi
, Nael A. Sweerky, Essam Al Daoud, Amer O. Abu Salem:
Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL). CoRR abs/2204.04188 (2022) - [i29]Ghassan Samara, Ruzayn Quaddoura
, Mooad Imad Al-Shalout, Khaled E. Al-Qawasmi, Ghadeer Al Besani:
Internet of Things Protection and Encryption: A Survey. CoRR abs/2204.04189 (2022) - [i28]Ghassan Samara, Abla Hussein, Israa Abdullah Matarneh, Mohammed Alrefai, Maram Y. Al-Safarini:
Internet of Robotic Things: Current Technologies and Applications. CoRR abs/2204.04190 (2022) - 2021
- [c6]Irshad Hussain
, Ghassan Samara
, Ibrar Ullah, Naeem Khan:
Encryption for End-User Privacy: A Cyber-Secure Smart Energy Management System. ACIT 2021: 1-6 - [c5]Ghassan Samara
, Abla Hussein, Israa Abdullah Matarneh, Mohammed Alrefai, Maram Y. Al-Safarini
:
Internet of Robotic Things: Current Technologies and Applications. ACIT 2021: 1-6 - [c4]Ghassan Samara
, Ruzayn Quaddoura, Mooad Imad Al-Shalout, Khaled E. Al-Qawasmi
, Ghadeer Al Besani:
Internet of Things Protection and Encryption: A Survey. ACIT 2021: 1-7 - [c3]Ghassan Samara
, Mohammed Rasmi
, Nael A. Sweerky, Essam Al Daoud, Amer O. Abu Salem:
Improving VANET's Performance by Incorporated Fog-Cloud Layer (FCL). ACIT 2021: 1-5 - [i27]Ghassan Samara
:
Lane prediction optimization in VANET. CoRR abs/2102.00513 (2021) - [i26]Ghassan Samara
:
Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey. CoRR abs/2102.01073 (2021) - [i25]Ghassan Samara
, Mohammad A. Hassan, Yahya Zayed:
An Intelligent Vice Cluster Head Election Protocol in WSN. CoRR abs/2112.01310 (2021) - 2020
- [c2]Ghassan Samara
:
Wireless Sensor Network MAC Energy - efficiency Protocols: A Survey. ACIT 2020: 1-5 - [i24]Ghassan Samara
, Ghadeer Al Besani, Mohammad Alauthman, Mohammad Al Khaldy:
Energy-Efficiency Routing algorithms in Wireless Sensor Networks: a Survey. CoRR abs/2002.07178 (2020) - [i23]Ghassan Samara
, Munir Al-okour:
Optimal Number of Cluster Heads in Wireless Sensors Networks Based on LEACH. CoRR abs/2003.13765 (2020) - [i22]Ghassan Samara:
Intelligent Reputation System for Safety Messages in VANET. CoRR abs/2007.12717 (2020)
2010 – 2019
- 2019
- [i21]Ghassan Samara, Mohammad Aljaidi:
Efficient energy, cost reduction, and QoS based routing protocol for wireless sensor networks. CoRR abs/1903.09636 (2019) - [i20]Ghassan Samara
:
An Improved CF-MAC Protocol for VANET. CoRR abs/1906.11922 (2019) - 2018
- [j3]Ghassan Samara, Mohammad Aljaidi:
Aware-routing protocol using best first search algorithm in wireless sensor. Int. Arab J. Inf. Technol. 15(3A): 592-598 (2018) - [j2]Ghassan Samara
:
An intelligent routing protocol in VANET. Int. J. Ad Hoc Ubiquitous Comput. 29(1/2): 77-84 (2018) - 2017
- [i19]Abla Hussein, Ghassan Samara
:
Mathematical Modeling and Analysis of ZigBee Node Battery Characteristics and Operation. CoRR abs/1712.04186 (2017) - [i18]Ghassan Samara
:
A Practical Approach for Detecting Logical Error in Object Oriented Environment. CoRR abs/1712.04189 (2017) - [i17]Tareq Alhmiedat, Ghassan Samara
:
A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring. CoRR abs/1712.04190 (2017) - [i16]Abla Hussein, Ghassan Samara
:
Coordinator Location Effects in AODV Routing Protocol in ZigBee Mesh Network. CoRR abs/1712.04245 (2017) - [i15]Maimuna Khatari, Ghassan Samara
:
Congestion Control Approach based on Effective Random Early Detection and Fuzzy Logic. CoRR abs/1712.04247 (2017) - [i14]Ghassan Samara
, Yousef Al-Raba'nah:
Security Issues in Vehicular Ad Hoc Networks (VANET): a survey. CoRR abs/1712.04263 (2017) - [i13]Amer O. Abu Salem
, Ghassan Samara
, Tareq Alhmiedat:
Performance Analysis of Dynamic Source Routing Protocol. CoRR abs/1712.04622 (2017) - 2016
- [i12]A. B. M. Shamsuzzaman Sadi, Towfique Anam, Mohamed Abdirazak, Abdillahi Hasan Adnan, Sazid Zaman Khan, Mohamed Mahmudur Rahman, Ghassan Samara
:
Applying Ontological Modeling on Quranic Nature Domain. CoRR abs/1604.03318 (2016) - 2014
- [i11]Ghassan Samara
, Tareq Alhmiedat, Amer O. Abu Salem
:
Dynamic Safety Message Power Control in VANET Using PSO. CoRR abs/1401.2405 (2014) - [i10]Ghassan Samara
, Tareq Alhmiedat:
Intelligent Emergency Message Broadcasting in VANET Using PSO. CoRR abs/1406.7399 (2014) - 2013
- [i9]Ghassan Samara
:
Increasing Network Visibility Using Coded Repetition Beacon Piggybacking. CoRR abs/1301.7170 (2013) - [i8]Tareq Alhmiedat, Ghassan Samara
, Amer O. Abu Salem
:
An Indoor Fingerprinting Localization Approach for ZigBee Wireless Sensor Networks. CoRR abs/1308.1809 (2013) - [i7]Amer O. Abu Salem
, Tareq Alhmiedat, Ghassan Samara
:
Cache Discovery Policies of MANET. CoRR abs/1310.1552 (2013) - [i6]Ghassan Samara
, Amer O. Abu Salem
, Tareq Alhmiedat:
Power Control Protocols in VANET. CoRR abs/1311.2364 (2013) - 2012
- [c1]Ghassan Samara
, Wafaa A. H. Ali Alsalihy:
A new security mechanism for vehicular communication networks. CyberSec 2012: 18-22 - [i5]Ghassan Samara
:
Efficient Certificate Management in VANET. CoRR abs/1206.0305 (2012) - [i4]Ghassan Samara
:
Security Analysis of Vehicular Ad Hoc Networks (VANET). CoRR abs/1206.1337 (2012) - [i3]Ghassan Samara
:
A New Security Mechanism for Vehicular Communication Networks. CoRR abs/1207.0967 (2012) - 2010
- [i2]Ghassan Samara
, Sureswaran Ramadas, Wafaa A. H. Al-Salihy:
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's. CoRR abs/1006.5113 (2010) - [i1]Ghassan Samara
, Sureswaran Ramadas, Wafaa A. H. Al-Salihy:
Safety Message Power Transmission Control for Vehicular Ad hoc Networks. CoRR abs/1007.3058 (2010)
2000 – 2009
- 2006
- [j1]Jalal Kawash, Ahmad El Halabi, Ghassan Samara
:
Utilizing Object Compression for Better J2ME Remote Method Invocation in 2.5G Networks. J. Comput. Inf. Technol. 14(3): 255-264 (2006) - 2005
- [p1]Jalal Kawash, Ghassan Samara, Ahmad El Halabi:
More Efficient Java RMI for GPRS Devices. New Trends in Computer Networks 2005
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-27 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint