default search action
Sugata Sanyal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c18]Amrita Bhattacherjee, Sugata Sanyal, Ajith Abraham:
Reducing Time Complexity of Fuzzy C Means Algorithm. IBICA 2021: 332-347 - 2020
- [j21]Imayanmosha Wahlang, Pallabi Sharma, Sugata Sanyal, Goutam Saha, Arnab Kumar Maji:
Deep learning techniques for classification of brain MRI. Int. J. Intell. Syst. Technol. Appl. 19(6): 571-588 (2020)
2010 – 2019
- 2017
- [j20]N. Syed Siraj Ahmed, D. P. Acharjya, Sugata Sanyal:
A framework for phishing attack identification using rough set and formal concept analysis. Int. J. Commun. Networks Distributed Syst. 18(2): 186-212 (2017) - 2015
- [j19]Pawan Lingras, Sugata Sanyal:
Book Review: Big Data Analytics. IEEE Intell. Informatics Bull. 16(1): 28-29 (2015) - [i75]Tuhin Borgohain, Amardeep Borgohain, Rajdeep Borgohain, Sugata Sanyal:
Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment. CoRR abs/1501.00180 (2015) - [i74]Tuhin Borgohain, Uday Kumar, Sugata Sanyal:
Survey of Security and Privacy Issues of Internet of Things. CoRR abs/1501.02211 (2015) - [i73]Amal Saha, Sugata Sanyal:
Review of Considerations for Mobile Device based Secure Access to Financial Services and Risk Handling Strategy for CIOs, CISOs and CTOs. CoRR abs/1502.00724 (2015) - [i72]Tuhin Borgohain, Amardeep Borgohain, Uday Kumar, Sugata Sanyal:
Authentication Systems in Internet of Things. CoRR abs/1502.00870 (2015) - [i71]Subhamoy Chakraborti, Sugata Sanyal:
Heuristic Algorithm using Internet of Things and Mobility for solving demographic issues in Financial Inclusion projects. CoRR abs/1503.00369 (2015) - [i70]Subhamoy Chakraborti, D. P. Acharjya, Sugata Sanyal:
Application Security framework for Mobile App Development in Enterprise setup. CoRR abs/1503.05992 (2015) - [i69]Tuhin Borgohain, Uday Kumar, Sugata Sanyal:
Survey of Operating Systems for the IoT Environment. CoRR abs/1504.02517 (2015) - [i68]Uday Kumar, Tuhin Borgohain, Sugata Sanyal:
Comparative Analysis of Cryptography Library in IoT. CoRR abs/1504.04306 (2015) - [i67]Tuhin Borgohain, Sugata Sanyal:
Technical Analysis of Security Infrastructure in RFID Technology. CoRR abs/1505.00172 (2015) - 2014
- [i66]Sugata Sanyal:
Energy Harvesting in M2M and WSN Space. CoRR abs/1401.4721 (2014) - [i65]Tanmoy Sarkar, Sugata Sanyal:
Reversible and Irreversible Data Hiding Technique. CoRR abs/1405.2684 (2014) - [i64]Tanmoy Sarkar, Sugata Sanyal:
Steganalysis: Detecting LSB Steganographic Techniques. CoRR abs/1405.5119 (2014) - [i63]Tanmoy Sarkar, Sugata Sanyal:
Digital Watermarking Techniques in Spatial and Frequency Domain. CoRR abs/1406.2146 (2014) - [i62]Amal Saha, Sugata Sanyal:
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems. CoRR abs/1411.2939 (2014) - [i61]Amal Saha, Sugata Sanyal:
Application Layer Intrusion Detection with Combination of Explicit-Rule- Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program. CoRR abs/1411.3089 (2014) - [i60]Amal Saha, Sugata Sanyal:
Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments. CoRR abs/1412.2463 (2014) - [i59]Amal Saha, Sugata Sanyal:
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution. CoRR abs/1412.2845 (2014) - 2013
- [j18]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Finding numerical solutions of diophantine equations using ant colony optimization. Appl. Math. Comput. 219(24): 11376-11387 (2013) - [c17]Antonio Hernandez Coarasa, Prusayon Nintanavongsa, Sugata Sanyal, Kaushik R. Chowdhury:
Impact of mobile transmitter sources on radio frequency wireless energy harvesting. ICNC 2013: 573-577 - [i58]Priyanka Naik, Sugata Sanyal:
Increasing Security in Cloud Environment. CoRR abs/1301.0315 (2013) - [i57]Sugata Sanyal, Parthasarathy P. Iyer:
Cloud Computing -- An Approach with Modern Cryptography. CoRR abs/1303.1048 (2013) - [i56]Sugata Sanyal, Parthasarathy P. Iyer:
Inter-Cloud Data Security Strategies. CoRR abs/1303.1417 (2013) - [i55]Sugata Sanyal, Rajdeep Borgohain:
Machine Translation Systems in India. CoRR abs/1304.7728 (2013) - [i54]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Finding Numerical Solutions of Diophantine Equations using Ant Colony Optimization. CoRR abs/1306.0896 (2013) - [i53]Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora, Sudip Sanyal, Sugata Sanyal:
RISM - Reputation Based Intrusion Detection System for Mobile Ad hoc Networks. CoRR abs/1307.7833 (2013) - [i52]Rohit Bhadauria, Rajdeep Borgohain, Abirlal Biswas, Sugata Sanyal:
Secure Authentication of Cloud Data Mining API. CoRR abs/1308.0824 (2013) - [i51]Antonio Hernandez Coarasa, Prusayon Nintanavongsa, Sugata Sanyal, Kaushik R. Chowdhury:
Impact of Mobile Transmitter Sources on Radio Frequency Wireless Energy Harvesting. CoRR abs/1312.0883 (2013) - [i50]Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain, Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S. Dhekne:
Detection and prevention of botnets and malware in an enterprise network. CoRR abs/1312.1629 (2013) - [i49]Mustafa H. Hajeer, Alka Singh, Dipankar Dasgupta, Sugata Sanyal:
Clustering online social network communities using genetic algorithms. CoRR abs/1312.2237 (2013) - 2012
- [j17]Manoj Rameshchandra Thakur, Divye Raj Khilnani, Kushagra Gupta, Sandeep Jain, Vineet Agarwal, Suneeta Sane, Sugata Sanyal, Prabhakar S. Dhekne:
Detection and prevention of botnets and malware in an enterprise network. Int. J. Wirel. Mob. Comput. 5(2): 144-153 (2012) - [j16]Zhihua Cui, Chunxia Yang, Sugata Sanyal:
Training artificial neural networks using APPM. Int. J. Wirel. Mob. Comput. 5(2): 168-174 (2012) - [j15]Ratna Dutta, Sugata Sanyal:
Collusion resistant self-healing key distribution in mobile wireless networks. Int. J. Wirel. Mob. Comput. 5(3): 228-243 (2012) - [j14]Abhishek Gupta, Joy Kuri, Sugata Sanyal:
Performance analysis of deterministic key allocation schemes for wireless sensor networks. Int. J. Wirel. Mob. Comput. 5(3): 271-291 (2012) - [j13]Aniruddha Diwan, Joy Kuri, Sugata Sanyal:
Optimal Allocation of Rates in Guaranteed Service Networks. Informatica (Slovenia) 36(2): 201-212 (2012) - [i48]Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal:
Sleep Deprivation Attack Detection in Wireless Sensor Network. CoRR abs/1203.0231 (2012) - [i47]Rajdeep Borgohain, Moirangthem Tiken Singh, Chandrakant Sakharwade, Sugata Sanyal:
TSET: Token based Secure Electronic Transaction. CoRR abs/1203.5960 (2012) - [i46]Rohit Bhadauria, Sugata Sanyal:
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. CoRR abs/1204.0764 (2012) - [i45]Manoj Rameshchandra Thakur, Sugata Sanyal:
A Multi-Dimensional approach towards Intrusion Detection System. CoRR abs/1205.2340 (2012) - [i44]Sugata Sanyal, Manoj Rameshchandra Thakur:
A Hybrid Approach Towards Intrusion Detection Based on Artificial Immune System and Soft Computing. CoRR abs/1205.4457 (2012) - [i43]Preetida Vinayakray-Jani, Sugata Sanyal:
Proactive TCP mechanism to improve Handover performance in Mobile Satellite and Terrestrial Networks. CoRR abs/1205.6773 (2012) - [i42]K. Ganesh, M. Thrivikraman, Joy Kuri, Haresh Dagale, G. Sudhakar, Sugata Sanyal:
Implementation of a Real Time Passenger Information System. CoRR abs/1206.0447 (2012) - [i41]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Reciprocally induced coevolution: A computational metaphor in Mathematics. CoRR abs/1206.1247 (2012) - [i40]Preetida Vinayakray-Jani, Sugata Sanyal:
Routing Protocols for Mobile and Vehicular Ad-Hoc Networks: A Comparative Analysis. CoRR abs/1206.1918 (2012) - [i39]Harshavardhan Kayarkar, Sugata Sanyal:
A Survey on Various Data Hiding Techniques and their Comparative Analysis. CoRR abs/1206.1957 (2012) - [i38]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
A Connectionist Network Approach to Find Numerical Solutions of Diophantine Equations. CoRR abs/1206.1971 (2012) - [i37]Manoj Rameshchandra Thakur, Sugata Sanyal:
A PAXOS based State Machine Replication System for Anomaly Detection. CoRR abs/1206.2307 (2012) - [i36]Ratna Dutta, Sugata Sanyal:
Collusion resistant self-healing key distribution in mobile wireless networks. CoRR abs/1206.6285 (2012) - [i35]Rajdeep Borgohain, Sugata Sanyal:
Rule Based Expert System for Cerebral Palsy Diagnosis. CoRR abs/1207.0117 (2012) - [i34]Preetida Vinayakray-Jani, Sugata Sanyal:
Security Architecture for Cluster based Ad Hoc Networks. CoRR abs/1207.1701 (2012) - [i33]Rajdeep Borgohain, Sugata Sanyal:
Rule Based Expert System for Diagnosis of Neuromuscular Disorders. CoRR abs/1207.2104 (2012) - [i32]Nitish Balachandran, Sugata Sanyal:
A Review of Techniques to Mitigate Sybil Attacks. CoRR abs/1207.2617 (2012) - [i31]Manoj Rameshchandra Thakur, Sugata Sanyal:
A Heuristic Reputation Based System to Detect Spam activities in a Social Networking Platform, HRSSSNP. CoRR abs/1212.1914 (2012) - [i30]Priyanka Naik, Sugata Sanyal:
Prover and Verifier Based Password Protection: PVBPP. CoRR abs/1212.6059 (2012) - 2011
- [c16]Bidyut Biman Sarkar, Sugata Sanyal, Nabendu Chaki:
Distributed framework for tele health monitoring system. ACWR 2011: 385-390 - [i29]Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal:
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security. CoRR abs/1108.4100 (2011) - [i28]Suman Banik, Bibhash Roy, Parthi Dey, Nabendu Chaki, Sugata Sanyal:
QoS Routing using OLSR with Optimization for Flooding. CoRR abs/1108.4138 (2011) - [i27]Amrita Dey, Nabendu Chaki, Sugata Sanyal:
Modeling Smart Grid using Generalized Stochastic Petri Net. CoRR abs/1108.4139 (2011) - [i26]Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein Johan Knapskog, Sugata Sanyal:
A Multi-Factor Security Protocol for Wireless Payment - Secure Web Authentication using Mobile Devices. CoRR abs/1111.3010 (2011) - [i25]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. CoRR abs/1111.3753 (2011) - [i24]Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay, Sugata Sanyal:
Steganography and Steganalysis: Different Approaches. CoRR abs/1111.3758 (2011) - [i23]Sugata Sanyal, Rangarajan Vasudevan, Ajith Abraham, Marcin Paprzycki:
Grid Security and Integration with Minimal Performance Degradation. CoRR abs/1111.4545 (2011) - [i22]Rangarajan Vasudevan, Sugata Sanyal:
A Novel Multipath Approach to Security in Mobile Ad Hoc Networks (MANETs). CoRR abs/1112.2128 (2011) - 2010
- [j12]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Particle swarm optimisation based Diophantine equation solver. Int. J. Bio Inspired Comput. 2(2): 100-114 (2010) - [j11]Sandipan Dey, Hameed Al-Qaheri, Suneeta Sane, Sugata Sanyal:
A Note on the Bounds for the Generalized Fibonacci-P-Sequence and its Application in Datahiding. Int. J. Comput. Sci. Appl. 7(4): 1-15 (2010) - [j10]Rolly Seth, Rishi Kapoor, Hameed Al-Qaheri, Sugata Sanyal:
Piecemeal Journey to 'HALCYON' World of Computing: From Past Progress to Future Challenges. Informatica (Slovenia) 34(2): 189-198 (2010) - [c15]Chinmay Kumar Nayak, Jayalakshmi Surendran, S. N. Merchant, Uday B. Desai, Sugata Sanyal:
Error concealment of H.264 encoded video through a hybrid scheme. MEDES 2010: 189-195 - [p1]Sugata Sanyal, Ayu Tiwari, Sudip Sanyal:
A Multifactor Secure Authentication System for Wireless Payment. Emergent Web Intelligence 2010: 341-369 - [i21]Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal:
A Novel Scheme for Secured Data Transfer Over Computer Networks. CoRR abs/1002.4530 (2010) - [i20]Rolly Seth, Rishi Kapoor, Hameed Al-Qaheri, Sugata Sanyal:
Piecemeal Journey To 'HALCYON' World Of Pervasive Computing : From past progress to future challenges. CoRR abs/1003.2456 (2010) - [i19]Alok Ojha, Hongmei Deng, Dharma P. Agrawal, Sugata Sanyal:
Forming the COUNCIL Based Clusters in Securing Wireless Ad Hoc Networks. CoRR abs/1003.2614 (2010) - [i18]Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal:
Vcache: Caching Dynamic Documents. CoRR abs/1003.2616 (2010) - [i17]Siby Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Particle Swarm Optimization Based Diophantine Equation Solver. CoRR abs/1003.2724 (2010) - [i16]Hameed Al-Qaheri, Sandipan Dey, Sugata Sanyal:
Hiding Inside HTML and Other Source Codes. CoRR abs/1003.3457 (2010) - [i15]Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, Sugata Sanyal:
Data Hiding Techniques Using Prime and Natural Numbers. CoRR abs/1003.3672 (2010) - [i14]Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Natural Numbers. CoRR abs/1003.3966 (2010) - [i13]Sandipan Dey, Ajith Abraham, Sugata Sanyal:
A Very Simple Approach for 3-D to 2-D Mapping. CoRR abs/1003.4036 (2010) - [i12]Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Prime Numbers. CoRR abs/1003.5509 (2010) - [i11]Sarif Sk. Hassan, Pabitra Pal Choudhury, Sugata Sanyal:
A Spatial Crypto Technique for Secure Data Transmission. CoRR abs/1004.0367 (2010) - [i10]Sandipan Dey, Hameed Al-Qaheri, Sugata Sanyal:
Embedding Secret Data in HTML Web Page. CoRR abs/1004.0459 (2010) - [i9]Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody:
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks. CoRR abs/1005.0109 (2010) - [i8]Jayesh Kataria, Prabhakar S. Dhekne, Sugata Sanyal:
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests. CoRR abs/1005.0139 (2010) - [i7]Sandipan Dey, Hameed Al-Qaheri, Suneeta Sane, Sugata Sanyal:
A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding. CoRR abs/1005.1953 (2010) - [i6]Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sudip Sanyal, Sugata Sanyal:
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks. CoRR abs/1006.1956 (2010) - [i5]Siby Abraham, Imre Kiss, Sugata Sanyal, Mukund A. Sanglikar:
Steepest Ascent Hill Climbing For A Mathematical Problem. CoRR abs/1010.0298 (2010) - [i4]Anjan Kumar Kundu, Bijoy Bandyopadhyay, Sugata Sanyal:
A Microwave Imaging and Enhancement Technique from Noisy Synthetic Data. CoRR abs/1010.0301 (2010) - [i3]Sugata Sanyal, Ajit Shelat, Amit Gupta:
New Frontiers of Network Security: The Threat Within. CoRR abs/1010.1938 (2010)
2000 – 2009
- 2009
- [j9]Koustubh Kulkarni, Sudip Sanyal, Hameed Al-Qaheri, Sugata Sanyal:
Dynamic Reconfiguration of Wireless Sensor Networks. Int. J. Comput. Sci. Appl. 6(4): 16-42 (2009) - 2008
- [j8]Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, Sugata Sanyal:
Hiding Techniques Using Prime and Natural Numbers. J. Digit. Inf. Manag. 6(6): 463-489 (2008) - [c14]Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System. CISIM 2008: 65-70 - 2007
- [j7]Bhavyesh Divecha, Ajith Abraham, Crina Grosan, Sugata Sanyal:
Impact of Node Mobility on MANET Routing Protocols Models. J. Digit. Inf. Manag. 5(1): 19-23 (2007) - [c13]Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Prime Numbers. IAS 2007: 101-108 - [c12]Bhavyesh Divecha, Ajith Abraham, Crina Grosan, Sugata Sanyal:
Analysis of Dynamic Source Routing and Destination-Sequenced Distance-Vector Protocols for Different Mobility Models. Asia International Conference on Modelling and Simulation 2007: 224-229 - [c11]Sandipan Dey, Ajith Abraham, Sugata Sanyal:
An LSB Data Hiding Technique Using Natural Number Decomposition. IIH-MSP 2007: 473-476 - [c10]Arpith C. Jacob, Sugata Sanyal, Marcin Paprzycki, Rajan Arora, Maria Ganzha:
Whole Genome Comparison on a Network of Workstations. ISPDC 2007: 31-36 - [c9]Arpith C. Jacob, Marcin Paprzycki, Maria Ganzha, Sugata Sanyal:
Applying SIMD Approach to Whole Genome Comparison on Commodity Hardware. PPAM 2007: 1220-1229 - 2006
- [j6]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. Comput. Secur. 25(2): 114-120 (2006) - 2005
- [j5]Ajith Abraham, Johnson P. Thomas, Sugata Sanyal, Lakhmi C. Jain:
Information Assurance and Security. J. Univers. Comput. Sci. 11(1): 1-3 (2005) - [j4]Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal:
A Novel Scheme for Secured Data Transfer Over Computer Networks. J. Univers. Comput. Sci. 11(1): 104-121 (2005) - [c8]Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han:
The N/R One Time Password System. ITCC (1) 2005: 733-738 - [c7]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. ITCC (1) 2005: 739-744 - 2004
- [j3]Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal, Ajith Abraham:
A distributed security scheme for ad hoc networks. ACM Crossroads 11(1): 5 (2004) - [j2]Sugata Sanyal, Rangarajan Vasudevan, Ajith Abraham, Marcin Paprzycki:
Grid Security and Integration with Minimal Performance Degradation. J. Digit. Inf. Manag. 2(3): 122-126 (2004) - [c6]Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal:
Jigsaw-based Secure Data Transfer over Computer Networks. ITCC (1) 2004: 2-6 - [c5]Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal:
Adaptive Neuro-Fuzzy Intrusion Detection Systems. ITCC (1) 2004: 70-74 - [c4]Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong Han:
SCIDS: A Soft Computing Intrusion Detection System. IWDC 2004: 252-257 - [c3]Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham:
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. IWDC 2004: 541-542 - [i2]Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal:
Jigsaw-based Security in Data Transfer in Computer Networks. CoRR cs.CR/0405061 (2004) - [i1]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. IACR Cryptol. ePrint Arch. 2004: 136 (2004) - 2003
- [c2]Dharma P. Agrawal, Hongmei Deng, Rajani Poosarla, Sugata Sanyal:
Secure Mobile Computing. IWDC 2003: 265-278 - 2002
- [j1]Arathi Ramani, Salim Vhora, Sugata Sanyal:
The next generation Internet protocol. Informatica (Slovenia) 26(1) (2002) - 2000
- [c1]Jeegar Tilak Shah, Madhav P. Desai, Sugata Sanyal:
Inductance Characterization of Small Interconnects Using Test-Signal Method. VLSI Design 2000: 376-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint