default search action
Miss Laiha Mat Kiah
Person information
- affiliation: University of Malaya, Kuala Lumpur, Department of Computer System & Technology
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j68]Atif Mahmood, Miss Laiha Mat Kiah, Zati Hakim Azizul, Saaidal Razalli Azzuhri:
Analysis of Terahertz (THz) Frequency Propagation and Link Design for Federated Learning in 6G Wireless Systems. IEEE Access 12: 23782-23797 (2024) - [j67]Iqra Sadia Rao, Miss Laiha Mat Kiah, M. Muzaffar Hameed, Zain Anwer Memon:
Scalability of blockchain: a comprehensive review and future research direction. Clust. Comput. 27(5): 5547-5570 (2024) - [j66]Nur Ilzam Che mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah:
A systematic literature review on advanced persistent threat behaviors and its detection strategy. J. Cybersecur. 10(1) (2024) - [j65]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Employees' BYOD Security Policy Compliance in the Public Sector. J. Comput. Inf. Syst. 64(1): 62-77 (2024) - [j64]Nik Aqil, Faiz Zaki, Firdaus Afifi, Hazim Hanif, Miss Laiha Mat Kiah, Nor Badrul Anuar:
Improved temporal IoT device identification using robust statistical features. PeerJ Comput. Sci. 10: e2145 (2024) - 2023
- [j63]Farid Binbeshr, Lip Yee Por, Miss Laiha Mat Kiah, A. A. Zaidan, Muhammad Imam:
Secure PIN-Entry Method Using One-Time PIN (OTP). IEEE Access 11: 18121-18133 (2023) - [j62]Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Muhammad Reza Z'aba, Norziana Jamil, Mohd Saufy Rohmad:
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection. IEEE Access 11: 59661-59674 (2023) - [i1]Norah M. Alshahrani, Miss Laiha Mat Kiah, B. B. Zaidan, Abdullah Hussein Alamoodi, Abdu Saif:
A review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations. CoRR abs/2302.08496 (2023) - 2022
- [j61]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Authenticated Encryption Schemes: A Systematic Review. IEEE Access 10: 14739-14766 (2022) - [j60]Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad:
Parallel Sponge-Based Authenticated Encryption With Side-Channel Protection and Adversary-Invisible Nonces. IEEE Access 10: 50819-50838 (2022) - [j59]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Policy Compliance: Risks and Strategies in Organizations. J. Comput. Inf. Syst. 62(1): 61-72 (2022) - [c7]Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah:
Systematic Literature Review of Security Control Assessment Challenges. ICCSCE 2022: 31-36 - 2021
- [j58]Burhan Ul Islam Khan, Farhat Anwar, Rashidah Funke Olanrewaju, Miss Laiha Mat Kiah, Roohie Naaz Mir:
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs. IEEE Access 9: 61778-61792 (2021) - [j57]Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, Malik Arman Morshidi, Farhat Anwar, Miss Laiha Mat Kiah:
A Frictionless and Secure User Authentication in Web-Based Premium Applications. IEEE Access 9: 129240-129255 (2021) - [j56]Farid Binbeshr, Miss Laiha Mat Kiah, Lip Yee Por, Aws Alaa Zaidan:
A systematic review of PIN-entry methods resistant to shoulder-surfing attacks. Comput. Secur. 101: 102116 (2021) - [j55]Atif Mahmood, Miss Laiha Mat Kiah, Saaidal Razalli Azzuhri, Muhammad Mustafa Kamal, Tillal Eldabi, Adnan N. Qureshi, Zati Hakim Azizul, Muhammad Reza Z'aba:
Wireless backhaul network's capacity optimization using time series forecasting approach. J. Ambient Intell. Humaniz. Comput. 12(1): 1407-1418 (2021) - [j54]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. J. Organ. Comput. Electron. Commer. 31(4): 320-342 (2021) - [j53]Ward Ahmed Al-Hussein, Miss Laiha Mat Kiah, Lip Yee Por, B. B. Zaidan:
A systematic review on sensor-based driver behaviour studies: coherent taxonomy, motivations, challenges, recommendations, substantial analysis and future directions. PeerJ Comput. Sci. 7: e632 (2021) - [j52]M. Muzaffar Hameed, Rodina Ahmad, Miss Laiha Mat Kiah, Ghulam Murtaza:
Machine learning-based offline signature verification systems: A systematic review. Signal Process. Image Commun. 93: 116139 (2021) - [c6]Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah:
Information System Audit for Mobile Device Security Assessment. CRC 2021: 1-6 - 2020
- [j51]Atif Mahmood, Miss Laiha Mat Kiah, Muhammad Reza Z'aba, Adnan N. Qureshi, Muhammad Shahreeza Safiruz Kassim, Zati Hakim Azizul, Jagadeesh Kakarla, Iraj Sadegh Amiri, Saaidal Razalli Azzuhri:
Capacity and Frequency Optimization of Wireless Backhaul Network Using Traffic Forecasting. IEEE Access 8: 23264-23276 (2020) - [j50]Sobia Mehrban, Muhammad Adnan Khan, Muhammad Waqas Nadeem, Muzammil Hussain, Mohammad Masroor Ahmed, Owais Hakeem, Shazia Saqib, Miss Laiha Mat Kiah, Fakhar Abbas, Mujtaba Hassan:
Towards Secure FinTech: A Survey, Taxonomy, and Open Research Challenges. IEEE Access 8: 23391-23406 (2020) - [j49]Shaik Shabana Anjum, Rafidah Md Noor, Ismail Ahmedy, Mohammad Hossein Anisi, Saaidal Razalli Azzuhri, Miss Laiha Mat Kiah, Jaime Lloret, Pradeep Kumar:
An Optimal Management Modelling of Energy Harvesting and Transfer for IoT-based RF-enabled Sensor Networks. Ad Hoc Sens. Wirel. Networks 46(1-2): 83-112 (2020) - [j48]Salman Iqbal, Miss Laiha Mat Kiah, Aqeel-ur Rehman, Zahid Abbas, Babak Daghighi:
DM-GKM: A key management scheme for dynamic group based applications. Comput. Networks 182: 107476 (2020) - [j47]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
Compliance with bring your own device security policies in organizations: A systematic literature review. Comput. Secur. 98: 101998 (2020) - [j46]Waqar Khurshid, Imran Ali Khan, Miss Laiha Mat Kiah, Osman Khalid, Sajjad Ahmad Madani:
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb. IEEE Commun. Lett. 24(4): 744-747 (2020) - [j45]Ali Hussain, Miss Laiha Mat Kiah, Nor Badrul Anuar, Rafidah Md Noor, Muneer Ahmad:
Performance and Security Challenges Digital Rights Management (DRM) Approaches Using Fog Computing for Data Provenance: A Survey. J. Medical Imaging Health Informatics 10(10): 2404-2420 (2020) - [j44]Fawad Ali Khan, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Tey Kok Soon, Muneer Ahmad:
Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things. Sensors 20(1): 283 (2020)
2010 – 2019
- 2019
- [j43]Shaik Shabana Anjum, Rafidah Md. Noor, Nasrin Aghamohammadi, Ismail Ahmedy, Miss Laiha Mat Kiah, Nornazlita Hussin, Mohammad Hossein Anisi, Muhammad Ahsan Qureshi:
Modeling Traffic Congestion Based on Air Quality for Greener Environment: An Empirical Study. IEEE Access 7: 57100-57119 (2019) - [j42]Tarak Nandy, Mohd Yamani Idna Bin Idris, Rafidah Md Noor, Miss Laiha Mat Kiah, Sian Lun Lau, Nor Badrul Annuar Juma'at, Ismail Ahmedy, Norjihan Binti Abdul Ghani, Sananda Bhattacharyya:
Review on Security of Internet of Things Authentication Mechanism. IEEE Access 7: 151054-151089 (2019) - [j41]Fawad Ali Khan, Rafidah Md Noor, Miss Laiha Mat Kiah, Noorzaily Mohd Noor, Saleh M. Altowaijri, Atiq Ur Rahman:
QoS Enabled Layered Based Clustering for Reactive Flooding in the Internet of Things. Symmetry 11(5): 634 (2019) - [j40]Mohammed Talal, A. A. Zaidan, B. B. Zaidan, Osamah Shihab Albahri, M. A. Alsalem, Ahmed Shihab Albahri, Abdullah Hussein Alamoodi, Miss Laiha Mat Kiah, F. M. Jumaah, Mussab Alaa:
Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun. Syst. 72(2): 285-337 (2019) - [c5]Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah:
BYOD Security Policy Compliance Framework. PACIS 2019: 162 - 2018
- [j39]Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, Salman Iqbal, Shaukat Iqbal, Mohamed Abdulnabi:
A security framework for mHealth apps on Android platform. Comput. Secur. 75: 191-217 (2018) - [j38]Waqar Khurshid, Miss Laiha Mat Kiah, Imran Ali Khan, Rosli Salleh, Anthony Theodore Chronopoulos, Sajjad Ahmad Madani:
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. IET Networks 7(4): 248-257 (2018) - [j37]Babak Daghighi, Miss Laiha Mat Kiah, Salman Iqbal, Muhammad Habib Ur Rehman, Keith M. Martin:
Host mobility key management in dynamic secure group communication. Wirel. Networks 24(8): 3009-3027 (2018) - 2017
- [j36]Mohamed Abdulnabi, Ahmed Al-Haiqi, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan, Muzammil Hussain:
A distributed framework for health information exchange using smartphone technologies. J. Biomed. Informatics 69: 230-250 (2017) - [j35]Mussab Alaa, A. A. Zaidan, B. B. Zaidan, Mohammed Talal, Miss Laiha Mat Kiah:
A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 97: 48-65 (2017) - 2016
- [j34]Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman Khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. J. Netw. Comput. Appl. 74: 98-120 (2016) - [j33]Mahmoud Reza Saybani, Shahaboddin Shamshirband, Shahram Golzari, Teh Ying Wah, Saeed Aghabozorgi, Miss Laiha Mat Kiah, Valentina Emilia Balas:
RAIRS2 a new expert system for diagnosing tuberculosis with real-world tournament selection mechanism inside artificial immune recognition system. Medical Biol. Eng. Comput. 54(2-3): 385-399 (2016) - [j32]Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi:
The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput. 25: 1-25 (2016) - [j31]Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab, Suleman Khan:
Service delivery models of cloud computing: security issues and open challenges. Secur. Commun. Networks 9(17): 4726-4750 (2016) - 2015
- [j30]Torki A. Altameem, Vlastimir Nikolic, Shahaboddin Shamshirband, Dalibor Petkovic, Hossein Javidnia, Miss Laiha Mat Kiah, Abdullah Gani:
Potential of support vector regression for optimization of lens system. Comput. Aided Des. 62: 57-63 (2015) - [j29]Mahnaz Kazemipoor, Majid Hajifaraji, Che wan Jasimah Bt wan Mohamed Radzi, Shahaboddin Shamshirband, Dalibor Petkovic, Miss Laiha Mat Kiah:
Appraisal of adaptive neuro-fuzzy computing technique for estimating anti-obesity properties of a medicinal plant. Comput. Methods Programs Biomed. 118(1): 69-76 (2015) - [j28]Muzammil Hussain, Ahmed Al-Haiqi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, Nor Badrul Anuar, Mohamed Abdulnabi:
The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations. Comput. Methods Programs Biomed. 122(3): 393-408 (2015) - [j27]Babak Daghighi, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Salman Iqbal, Parvaneh Asghari:
Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Comput. Commun. 72: 1-16 (2015) - [j26]A. A. Zaidan, B. B. Zaidan, Muzammil Hussain, Ahmed Haiqi, Miss Laiha Mat Kiah, Mohamed Abdulnabi:
Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decis. Support Syst. 78: 15-27 (2015) - [j25]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan:
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. J. Grid Comput. 13(4): 651-675 (2015) - [j24]A. A. Zaidan, B. B. Zaidan, Ahmed Al-Haiqi, Miss Laiha Mat Kiah, Muzammil Hussain, Mohamed Abdulnabi:
Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. J. Biomed. Informatics 53: 390-404 (2015) - [j23]A. A. Zaidan, H. Abdul Karim, N. N. Ahmad, B. B. Zaidan, Miss Laiha Mat Kiah:
Robust Pornography Classification Solving the Image Size Variation Problem Based on Multi-Agent Learning. J. Circuits Syst. Comput. 24(2): 1550023:1-1550023:37 (2015) - [j22]Shahaboddin Shamshirband, Babak Daghighi, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel, Ajith Abraham:
Co-FQL: Anomaly detection using cooperative fuzzy Q-learning in network. J. Intell. Fuzzy Syst. 28(3): 1345-1357 (2015) - [j21]Hamdan O. Alanazi, A. A. Zaidan, B. B. Zaidan, Miss Laiha Mat Kiah, S. H. Al-Bakri:
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing. J. Medical Syst. 39(1): 165 (2015) - [j20]Miss Laiha Mat Kiah, Mohamed S. Nabi, B. B. Zaidan, A. A. Zaidan:
Erratum to: An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1. J. Medical Syst. 39(2): 2 (2015) - [j19]B. B. Zaidan, Ahmed Haiqi, A. A. Zaidan, Mohamed Abdulnabi, Miss Laiha Mat Kiah, Hussaen Muzamel:
A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. J. Medical Syst. 39(5): 51 (2015) - [j18]Babak Daghighi, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Muhammad Habib Ur Rehman:
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges. J. Netw. Comput. Appl. 50: 1-14 (2015) - [j17]Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Steven Furnell:
A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44(4): 606-622 (2015) - [j16]Shahaboddin Shamshirband, Milan Gocic, Dalibor Petkovic, Hadi Saboohi, Tutut Herawan, Miss Laiha Mat Kiah, Shatirah Akib:
Soft-Computing Methodologies for Precipitation Estimation: A Case Study. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 8(3): 1353-1358 (2015) - 2014
- [j15]Dalibor Petkovic, Shahaboddin Shamshirband, Javed Iqbal, Nor Badrul Anuar, Nenad D. Pavlovic, Miss Laiha Mat Kiah:
Adaptive neuro-fuzzy prediction of grasping object weight for passively compliant gripper. Appl. Soft Comput. 22: 424-431 (2014) - [j14]Miss Laiha Mat Kiah, Ahmed Haiqi, B. B. Zaidan, A. A. Zaidan:
Open source EMR software: Profiling, insights and hands-on analysis. Comput. Methods Programs Biomed. 117(2): 360-382 (2014) - [j13]Shahaboddin Shamshirband, Ahmed Patel, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ajith Abraham:
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng. Appl. Artif. Intell. 32: 228-241 (2014) - [j12]Afshin Jahangirzadeh, Shahaboddin Shamshirband, Saeed Aghabozorgi, Shatirah Akib, Hossein Basser, Nor Badrul Anuar, Miss Laiha Mat Kiah:
A cooperative expert based support vector regression (Co-ESVR) system to determine collar dimensions around bridge pier. Neurocomputing 140: 172-184 (2014) - [j11]Miss Laiha Mat Kiah, B. B. Zaidan, A. A. Zaidan, Mohamed S. Nabi, Rabiu Ibraheem:
MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network. J. Medical Syst. 38(4): 37 (2014) - [j10]Miss Laiha Mat Kiah, S. H. Al-Bakri, A. A. Zaidan, B. B. Zaidan, Muzammil Hussain:
Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture. J. Medical Syst. 38(10): 133 (2014) - [j9]Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, Al-Sakib Khan Pathan:
Routing protocol design for secure WSN: Review and open research issues. J. Netw. Comput. Appl. 41: 517-530 (2014) - [j8]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Vala Ali Rohani, Dalibor Petkovic, Sanjay Misra, Abdul Nasir Khan:
Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J. Netw. Comput. Appl. 42: 102-117 (2014) - [j7]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband:
Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2): 624-651 (2014) - [j6]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J. Supercomput. 70(2): 946-976 (2014) - 2013
- [j5]Shahaboddin Shamshirband, Nor Badrul Anuar, Miss Laiha Mat Kiah, Ahmed Patel:
An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique. Eng. Appl. Artif. Intell. 26(9): 2105-2127 (2013) - [j4]Abdul Nasir Khan, Miss Laiha Mat Kiah, Samee Ullah Khan, Sajjad Ahmad Madani:
Towards secure mobile cloud computing: A survey. Future Gener. Comput. Syst. 29(5): 1278-1299 (2013) - [j3]Miss Laiha Mat Kiah, Mohamed S. Nabi, B. B. Zaidan, A. A. Zaidan:
An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1. J. Medical Syst. 37(5): 9971 (2013) - [j2]Liana Khamis Qabajeh, Miss Laiha Mat Kiah, Mohammad Moustafa Qabajeh:
A more secure and scalable routing protocol for mobile ad hoc networks. Secur. Commun. Networks 6(3): 286-308 (2013) - [j1]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J. Supercomput. 66(3): 1687-1706 (2013) - [c4]Mohamed S. Nabi, Miss Laiha Mat Kiah, A. A. Zaidan, B. B. Zaidan:
Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records. FGCT 2013: 93-97 - [c3]Ali Feizollah, Shahaboddin Shamshirband, Nor Badrul Anuar, Rosli Salleh, Miss Laiha Mat Kiah:
Anomaly Detection Using Cooperative Fuzzy Logic Controller. FIRA 2013: 220-231
2000 – 2009
- 2007
- [c2]Miss Laiha Mat Kiah, Keith M. Martin:
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. FGCN (1) 2007: 100-107 - 2005
- [c1]Miss Laiha Mat Kiah, Keith M. Martin:
Group Communication: Design Challenges in the Development of Key Management Frameworks in Wireless Mobile Environments. Security and Management 2005: 385-391
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint