default search action
Pontus Johnson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j33]Wojciech Widel, Simon Hacks, Mathias Ekstedt, Pontus Johnson, Robert Lagerström:
The meta attack language - a formal description. Comput. Secur. 130: 103284 (2023) - [j32]Viktor Engström, Pontus Johnson, Robert Lagerström, Erik Ringdahl, Max Wällstedt:
Automated Security Assessments of Amazon Web Services Environments. ACM Trans. Priv. Secur. 26(2): 20:1-20:31 (2023) - 2022
- [j31]Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström:
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures. Comput. Secur. 117: 102705 (2022) - 2021
- [j30]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research communities in cyber security: A comprehensive literature review. Comput. Sci. Rev. 42: 100431 (2021) - 2018
- [j29]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis. IEEE Trans. Dependable Secur. Comput. 15(6): 1002-1015 (2018) - 2017
- [j28]Robert Lagerström, Pontus Johnson, Mathias Ekstedt, Ulrik Franke, Khurram Shahzad:
Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL): Iteratively Developed using Multiple Case Studies. Complex Syst. Informatics Model. Q. 11: 38-68 (2017) - [j27]Johan Ullberg, Pontus Johnson:
Empirical assessment of the accuracy of an interoperability prediction language. Inf. Syst. Frontiers 19(4): 819-833 (2017) - 2016
- [j26]Pontus Johnson, Dan Gorton, Robert Lagerström, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. Comput. Secur. 62: 278-295 (2016) - [j25]Pia Närman, Pontus Johnson, Liv Gingnell:
Using enterprise architecture to analyse how organisational structure impact motivation and learning. Enterp. Inf. Syst. 10(5): 523-562 (2016) - [j24]Pontus Johnson, Mathias Ekstedt:
The Tarpit - A general theory of software engineering. Inf. Softw. Technol. 70: 181-203 (2016) - 2015
- [j23]Pontus Johnson, Mathias Ekstedt, Michael Goedicke, Ivar Jacobson:
Towards general theories of software engineering. Sci. Comput. Program. 101: 1-5 (2015) - 2014
- [j22]Pontus Johnson, Maria-Eugenia Iacob, Margus Välja, Marten van Sinderen, Christer Magnusson, Tobias Ladhe:
A method for predicting the probability of business network profitability. Inf. Syst. E Bus. Manag. 12(4): 567-593 (2014) - [j21]Pontus Johnson, Johan Ullberg, Markus Buschle, Ulrik Franke, Khurram Shahzad:
An architecture modeling framework for probabilistic prediction. Inf. Syst. E Bus. Manag. 12(4): 595-622 (2014) - [j20]Paul Ralph, Iaakov Exman, Pan Wei Ng, Pontus Johnson, Michael Goedicke, Alper Tolga Kocatas, Kate Liu Yan:
How to Develop a General Theory of Software Engineering: Report on the GTSE 2014 Workshop. ACM SIGSOFT Softw. Eng. Notes 39(6): 23-25 (2014) - [j19]Ulrik Franke, Pontus Johnson, Johan König:
An architecture framework for enterprise IT service availability analysis. Softw. Syst. Model. 13(4): 1417-1445 (2014) - 2013
- [j18]Marten van Sinderen, Pontus Johnson, Guy Doumeingts:
Computer in Industry Special Issue on "Interoperability and Future Internet for Next-Generation Enterprises" Editorial and state of the art. Comput. Ind. 64(8): 881-886 (2013) - [j17]Paul Ralph, Pontus Johnson, Howell R. Jordan:
Report on the first SEMAT workshop on general theory of software engineering (GTSE 2012). ACM SIGSOFT Softw. Eng. Notes 38(2): 26-28 (2013) - [j16]Pontus Johnson, Paul Ralph, Michael Goedicke, Pan Wei Ng, Klaas-Jan Stol, Kari Smolander, Iaakov Exman, Dewayne E. Perry:
Report on the Second SEMAT Workshop on General Theory of Software Engineering (GTSE 2013). ACM SIGSOFT Softw. Eng. Notes 38(5): 47-50 (2013) - 2012
- [j15]Johan Ullberg, Pontus Johnson, Markus Buschle:
A language for interoperability modeling and prediction. Comput. Ind. 63(8): 766-774 (2012) - [j14]Per Närman, Hannes Holm, David Höök, Nicholas Honeth, Pontus Johnson:
Using enterprise architecture and technology adoption models to predict application usage. J. Syst. Softw. 85(8): 1953-1967 (2012) - [j13]Pontus Johnson, Mathias Ekstedt, Ivar Jacobson:
Where's the Theory for Software Engineering? IEEE Softw. 29(5): 96 (2012) - [j12]Ulrik Franke, Pontus Johnson, Johan König, Liv Marcks von Würtemberg:
Availability of enterprise IT systems: an expert-based Bayesian framework. Softw. Qual. J. 20(2): 369-394 (2012) - 2011
- [j11]Per Närman, Hannes Holm, Pontus Johnson, Johan König, Moustafa Chenine, Mathias Ekstedt:
Data accuracy assessment using enterprise architecture. Enterp. Inf. Syst. 5(1): 37-58 (2011) - 2010
- [j10]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
A probabilistic relational model for security risk analysis. Comput. Secur. 29(6): 659-679 (2010) - [j9]Mårten Simonsson, Pontus Johnson, Mathias Ekstedt:
The Effect of IT Governance Maturity on IT Governance Performance. Inf. Syst. Manag. 27(1): 10-24 (2010) - [j8]Robert Lagerström, Pontus Johnson, David Höök:
Architecture analysis of enterprise systems modifiability - Models, analysis, and validation. J. Syst. Softw. 83(8): 1387-1403 (2010) - [j7]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Architecture analysis of enterprise systems modifiability: a metamodel for software change cost estimation. Softw. Qual. J. 18(4): 437-468 (2010) - 2009
- [j6]Robert Lagerström, Ulrik Franke, Pontus Johnson, Johan Ullberg:
A method for creating entreprise architecture metamodels applied to systems modifiability. Int. J. Comput. Sci. Appl. 6(5): 89-120 (2009) - 2008
- [j5]Pontus Johnson, Erik Johansson:
Assessment of business process information security. Int. J. Bus. Process. Integr. Manag. 3(2): 118-130 (2008) - [j4]Marten van Sinderen, Pontus Johnson, Lea Kutvonen:
Report on the IFIP WG5.8 international workshop on enterprise interoperability (IWEI 2008). SIGMOD Rec. 37(4): 112-114 (2008) - 2007
- [j3]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Enterprise architecture analysis with extended influence diagrams. Inf. Syst. Frontiers 9(2-3): 163-180 (2007) - [j2]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Extended Influence Diagrams for System Quality Analysis. J. Softw. 2(3): 30-42 (2007) - 2006
- [j1]Åsa Lindström, Pontus Johnson, Erik Johansson, Mathias Ekstedt, Mårten Simonsson:
A survey on CIO concerns-do enterprise architecture frameworks support them? Inf. Syst. Frontiers 8(2): 81-90 (2006)
Conference and Workshop Papers
- 2024
- [c69]Jakob Nyberg, Pontus Johnson:
Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning. CSR 2024: 282-289 - [c68]Simon G. E. Gökstorp, Jakob Nyberg, Yeongwoo Kim, Pontus Johnson, György Dán:
Anomaly Detection in Security Logs using Sequence Modeling. NOMS 2024: 1-9 - 2022
- [c67]Jakob Nyberg, Pontus Johnson, András Méhes:
Cyber threat response using reinforcement learning in graph-based attack simulations. NOMS 2022: 1-4 - 2020
- [c66]Sotirios Katsikeas, Simon Hacks, Pontus Johnson, Mathias Ekstedt, Robert Lagerström, Joar Jacobsson, Max Wällstedt, Per Eliasson:
An Attack Simulation Language for the IT Domain. GraMSec@CSF 2020: 67-86 - 2019
- [c65]Sotirios Katsikeas, Pontus Johnson, Simon Hacks, Robert Lagerström:
Probabilistic Modeling and Simulation of Vehicular Cyber Attacks: An Application of the Meta Attack Language. ICISSP 2019: 175-182 - 2018
- [c64]Pontus Johnson, Robert Lagerström, Mathias Ekstedt:
A Meta Language for Threat Modeling and Attack Simulations. ARES 2018: 38:1-38:8 - 2017
- [c63]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Automatic Design of Secure Enterprise Architecture: Work in Progress Paper. EDOC Workshops 2017: 65-70 - [c62]Alexandre Vernotte, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis. EDOC Workshops 2017: 127-136 - 2016
- [c61]Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström:
pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. ARES 2016: 278-283 - [c60]Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Automatic Probabilistic Enterprise IT Architecture Modeling: A Dynamic Bayesian Networks Approach. EDOC Workshops 2016: 1-8 - [c59]Pia Närman, Pontus Johnson:
Analyzing Coordination and Flexibility in Organizations Using Enterprise Architecture. EDOC Workshops 2016: 1-8 - [c58]Pontus Johnson, Robert Lagerström, Mathias Ekstedt, Ulrik Franke:
Modeling and analyzing systems-of-systems in the multi-attribute prediction language (MAPL). SESoS@ICSE 2016: 1-7 - [c57]Pontus Johnson, Alexandre Vernotte, Dan Gorton, Mathias Ekstedt, Robert Lagerström:
Quantitative Information Security Risk Estimation Using Probabilistic Attack Graphs. RISK 2016: 37-52 - 2015
- [c56]Mathias Ekstedt, Pontus Johnson, Robert Lagerström, Dan Gorton, Joakim Nydren, Khurram Shahzad:
Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management. EDOC Workshops 2015: 152-155 - [c55]Margus Välja, Matus Korman, Khurram Shahzad, Pontus Johnson:
Integrated Metamodel for Security Analysis. HICSS 2015: 5192-5200 - [c54]Pontus Johnson, Mathias Ekstedt:
Exploring Theory of Cognition for General Theory of Software Engineering. GTSE@ICSE 2015: 15-24 - [c53]Robert Lagerström, Pontus Johnson, Mathias Ekstedt:
Search-Based Design of Large Software Systems-of-Systems. SESoS@ICSE 2015: 44-47 - 2013
- [c52]Markus Buschle, Pontus Johnson, Khurram Shahzad:
The Enterprise Architecture Analysis Tool - Support for the Predictive, Probabilistic Architecture Modeling Framework. AMCIS 2013 - [c51]Margus Välja, Magnus Österlind, Maria-Eugenia Iacob, Marten van Sinderen, Pontus Johnson:
Modeling and Prediction of Monetary and Non-monetary Business Values. EDOC 2013: 153-158 - [c50]Magnus Österlind, Pontus Johnson, Kiran Karnati, Robert Lagerström, Margus Välja:
Enterprise Architecture Evaluation Using Utility Theory. EDOC Workshops 2013: 347-351 - [c49]Pontus Johnson, Ivar Jacobson, Michael Goedicke, Mira Kajko-Mattsson:
2nd SEMAT workshop on a general theory of software engineering (GTSE 2013). ICSE 2013: 1525-1526 - [c48]Pontus Johnson, Johan Ullberg, Markus Buschle, Ulrik Franke, Khurram Shahzad:
P2AMF: Predictive, Probabilistic Architecture Modeling Framework. IWEI 2013: 104-117 - [c47]Pontus Johnson, Maria-Eugenia Iacob, Margus Välja, Marten van Sinderen, Christer Magnusson, Tobias Ladhe:
Business Model Risk Analysis: Predicting the Probability of Business Network Profitability. IWEI 2013: 118-130 - 2012
- [c46]Johan Ullberg, Pontus Johnson:
Predicting Interoperability in an Environmental Assurance System. I-ESA 2012: 25-35 - [c45]Ivar Jacobson, Ian Spence, Pontus Johnson, Mira Kajko-Mattsson:
Re-founding software engineering - SEMAT at the age of three (keynote abstract). ASE 2012: 15-19 - 2011
- [c44]Sabine Buckl, Markus Buschle, Pontus Johnson, Florian Matthes, Christian M. Schweda:
A Meta-language for Enterprise Architecture Analysis. BMMDS/EMMSAD 2011: 511-525 - [c43]Johan Ullberg, Pontus Johnson, Markus Buschle:
A Modeling Language for Interoperability Assessments. IWEI 2011: 61-74 - 2010
- [c42]Per Närman, Markus Buschle, Johan König, Pontus Johnson:
Hybrid Probabilistic Relational Models for System Quality Analysis. EDOC 2010: 57-66 - [c41]Johan Ullberg, Ulrik Franke, Markus Buschle, Pontus Johnson:
A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL. I-ESA 2010: 81-90 - 2009
- [c40]Ulrik Franke, Pontus Johnson, Evelina Ericsson, Waldo Rocha Flores, Kun Zhu:
Enterprise Architecture Analysis using Fault Trees and MODAF. CAiSE Forum 2009 - [c39]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis. CSMR 2009: 241-246 - [c38]Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle:
A Tool for Enterprise Architecture Analysis of Maintainability. CSMR 2009: 327-328 - [c37]Pia Gustafsson, David Höök, Ulrik Franke, Pontus Johnson:
Modeling the IT Impact on Organizational Structure. EDOC 2009: 14-23 - [c36]Per Närman, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine, Johan König:
Enterprise Architecture Analysis for Data Accuracy Assessments. EDOC 2009: 24-33 - [c35]Ulrik Franke, Pontus Johnson:
An Enterprise Architecture framework for application consolidation in the Swedish Armed Forces. EDOCW 2009: 264-273 - [c34]Ulrik Franke, Johan Ullberg, Teodor Sommestad, Robert Lagerström, Pontus Johnson:
Decision support oriented Enterprise Architecture metamodel management using classification trees. EDOCW 2009: 328-335 - [c33]Stephan Aier, Sabine Buckl, Ulrik Franke, Bettina Gleichauf, Pontus Johnson, Per Närman, Christian M. Schweda, Johan Ullberg:
A Survival Analysis of Application Life Spans based on Enterprise Architecture Models. EMISA 2009: 141-154 - [c32]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models. HICSS 2009: 1-10 - [c31]Johan Ullberg, David Chen, Pontus Johnson:
Barriers to Enterprise Interoperability. IWEI 2009: 13-24 - [c30]Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König:
A formal method for cost and accuracy trade-off analysis in software assessment measures. RCIS 2009: 295-302 - [c29]Robert Lagerström, Pontus Johnson, David Höök:
An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis. Software Engineering (Workshops) 2009: 43-54 - [c28]Adrian Kallgren, Johan Ullberg, Pontus Johnson:
A Method for Constructing a Company Specific Enterprise Architecture Model Framework. SNPD 2009: 346-351 - [c27]Ulrik Franke, Waldo Rocha Flores, Pontus Johnson:
Enterprise architecture dependency analysis using fault trees and Bayesian networks. SpringSim 2009 - 2008
- [c26]Mårten Simonsson, Robert Lagerström, Pontus Johnson:
A Bayesian network for IT governance performance prediction. ICEC 2008: 1:1-1:8 - [c25]Johan Ullberg, Robert Lagerström, Pontus Johnson:
A Framework for Service Interoperability Analysis using Enterprise Architecture Models. IEEE SCC (2) 2008: 99-107 - [c24]Robert Lagerström, Moustafa Chenine, Pontus Johnson, Ulrik Franke:
Probabilistic Metamodel Merging. CAiSE Forum 2008: 25-28 - [c23]Mårten Simonsson, Pontus Johnson, Mathias Ekstedt:
The IT Organization Modeling and Assessment Tool for IT Governance Decision Support. CAiSE 2008: 258-261 - [c22]Robert Lagerström, Pontus Johnson:
Using Architectural Models to Predict the Maintainability of Enterprise Systems. CSMR 2008: 248-252 - [c21]Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine:
Using Enterprise Architecture Models for System Quality Analysis. EDOC 2008: 14-23 - [c20]Teodor Sommestad, Mathias Ekstedt, Pontus Johnson:
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis. EDOC 2008: 349-355 - [c19]Mårten Simonsson, Pontus Johnson:
The IT Organization Modeling and Assessment Tool: Correlating IT Governance Maturity with the Effect of IT. HICSS 2008: 431 - [c18]Stephan Aier, Pontus Johnson, Joachim Schelp:
Introduction: Third Workshop on Trends in Enterprise Architecture Research (TEAR 2008). ICSOC Workshops 2008: 313-315 - [c17]Johan Ullberg, Robert Lagerström, Pontus Johnson:
Enterprise Architecture: A Service Interoperability Analysis Framework. IESA 2008: 611-623 - [c16]Pia Gustafsson, Ulrik Franke, David Höök, Pontus Johnson:
Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams. PoEM 2008: 138-152 - [c15]Mårten Simonsson, Robert Lagerström, Pontus Johnson:
The Linear Conditional Probability Matrix Generator for IT Governance Performance Prediction. MSVVEIS 2008: 170-179 - [c14]Per Närman, Pontus Johnson, Robert Lagerström, Ulrik Franke, Mathias Ekstedt:
Data Collection Prioritization for System Quality Analysis. SQM@CSMR 2008: 29-42 - 2007
- [c13]Mårten Simonsson, Pontus Johnson, Hanna Wijkström:
Model-Based IT Governance Maturity Assessments with Cobit. ECIS 2007: 1276-1287 - [c12]Per Närman, Pontus Johnson, Lars Nordström:
Enterprise Architecture: A Framework Supporting System Quality Analysis. EDOC 2007: 130-141 - [c11]Pontus Johnson, Erik Johansson, Teodor Sommestad, Johan Ullberg:
A Tool for Enterprise Architecture Analysis. EDOC 2007: 142-156 - [c10]Pontus Johnson, Mathias Ekstedt:
In Search of a Unified Theory of Software Engineering. ICSEA 2007: 1 - [c9]Robert Lagerström, Pontus Johnson, Per Närman:
Extended Influence Diagram Generation. IESA 2007: 599-602 - 2006
- [c8]Pontus Johnson, Robert Lagerström, Per Närman, Mårten Simonsson:
Extended Influence Diagrams for Enterprise Architecture Analysis. EDOC 2006: 3-12 - [c7]Erik Johansson, Mathias Ekstedt, Pontus Johnson:
Assessment of Enterprise Information Security - The Importance of Information Search Cost. HICSS 2006 - [c6]Pontus Johnson, Lars Nordström, Robert Lagerström:
Formalizing Analysis of Enterprise Architecture. I-ESA 2006: 35-44 - 2005
- [c5]Erik Johansson, Pontus Johnson:
Assessment of Enterprise Information Security - The Importance of Prioritization. EDOC 2005: 207-218 - [c4]Mårten Simonsson, Åsa Lindström, Pontus Johnson, Lars Nordström, John Grundbäck, Olof Wijnbladh:
Scenario-based Evaluation of Enterprise - a Top-Down Approach for Chief Information Officer Decision Making. ICEIS (1) 2005: 130-137 - 2004
- [c3]Mathias Ekstedt, Pontus Johnson, Åsa Lindström, Magnus Gammelgård, Erik Johansson, Leonel Plazaola, Enrique Silva, Joakim Liliesköld:
Consistent Enterprise Software System Architecture for the CIO - A Utility-Cost Based Approach. HICSS 2004 - 2001
- [c2]Jonas Andersson, Pontus Johnson:
Architectural Integration Styles for Large-Scale Enterprise Software Systems. EDOC 2001: 224-236 - 2000
- [c1]Jonas Andersson, Pontus Johnson:
IT Infrastructure Architectures for Electric Utilities - A Comparative Analysis of Description Techniques. HICSS 2000
Editorship
- 2014
- [e3]Pontus Johnson, Michael Goedicke, Ivar Jacobson:
Proceedings of the 3rd SEMAT Workshop on General Theories of Software Engineering, GTSE 2014, Hyderabad, India, June 2, 2014. ACM 2014, ISBN 978-1-4503-2850-0 [contents] - 2012
- [e2]Marten van Sinderen, Pontus Johnson, Xiaofei Xu, Guy Doumeingts:
Enterprise Interoperability - 4th International IFIP Working Conference, IWEI 2012, Harbin, China, September 6-7, 2012. Proceedings. Lecture Notes in Business Information Processing 122, Springer 2012, ISBN 978-3-642-33067-4 [contents] - 2011
- [e1]Marten van Sinderen, Pontus Johnson:
Enterprise Interoperability - Third International IFIP Working Conference, IWEI 2011, Stockholm, Sweden, March 23-24, 2011. Proceedings. Lecture Notes in Business Information Processing 76, Springer 2011, ISBN 978-3-642-19679-9 [contents]
Informal and Other Publications
- 2024
- [i6]Jakob Nyberg, Pontus Johnson:
Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning. CoRR abs/2407.05775 (2024) - 2023
- [i5]Jakob Nyberg, Pontus Johnson:
Training Automated Defense Strategies Using Graph-based Cyber Attack Simulations. CoRR abs/2304.11084 (2023) - [i4]Pontus Johnson, Mathias Ekstedt:
Towards a Graph Neural Network-Based Approach for Estimating Hidden States in Cyber Attack Simulations. CoRR abs/2312.05666 (2023) - 2021
- [i3]Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, Robert Lagerström:
Research Communities in cyber security: A Comprehensive Literature Review. CoRR abs/2104.13196 (2021) - [i2]Pontus Johnson:
Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine. CoRR abs/2105.02124 (2021) - 2018
- [i1]Pontus Johnson, Paul Ralph, Mathias Ekstedt, Iaakov Exman, Michael Goedicke:
Consensus in Software Engineering: A Cognitive Mapping Study. CoRR abs/1802.06319 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint