default search action
Mohammed Anbar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Osama M. Dorgham:
Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things. IEEE Access 12: 19860-19871 (2024) - [j62]Nadia Alfriehat, Mohammed Anbar, Shankar Karuppayah, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Alaa M. Momani:
Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy. IEEE Access 12: 31136-31158 (2024) - [j61]Nadia Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah, Tamarah A. Shurbaji, Shankar Karuppayah, Ammar Almomani:
RPL-based attack detection approaches in IoT networks: review and taxonomy. Artif. Intell. Rev. 57(9): 248 (2024) - [j60]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton:
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things. Clust. Comput. 27(9): 12141-12184 (2024) - [j59]Methaq A. Shyaa, Noor Farizah Ibrahim, Zurinahni Zainol, Rosni Abdullah, Mohammed Anbar, Laith Alzubaidi:
Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems. Eng. Appl. Artif. Intell. 137: 109143 (2024) - [j58]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection. EURASIP J. Inf. Secur. 2024(1): 20 (2024) - [j57]Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. Int. J. Inf. Sec. 23(3): 1787-1803 (2024) - [j56]Ghada Al-Mukhaini, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Ammar Al Momani:
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101866 (2024) - [j55]Dima Kasasbeh, Mohammed Anbar:
Optimized reversible data hiding technique based on multidirectional prediction error histogram and fluctuation-based adaptation. J. King Saud Univ. Comput. Inf. Sci. 36(6): 102112 (2024) - 2023
- [j54]Mohammad Shahrul Mohd Shah, Yu-Beng Leau, Mohammed Anbar, Ali Abdulqader Bin-Salem:
Security and Integrity Attacks in Named Data Networking: A Survey. IEEE Access 11: 7984-8004 (2023) - [j53]Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, Mohammad Adnan Aladaileh, Shaza Dawood Ahmed Rihan:
Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks. IEEE Access 11: 94081-94093 (2023) - [j52]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Abdullah Ahmed Bahashwan, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh, Ghada Al-Mukhaini:
A systematic literature review on attacks defense mechanisms in RPL-based 6LoWPAN of Internet of Things. Internet Things 22: 100741 (2023) - [j51]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Taief Alaa Alamiedy:
Deep learning approach for detecting router advertisement flooding-based DDoS attacks. J. Ambient Intell. Humaniz. Comput. 14(6): 7281-7295 (2023) - [j50]Methaq A. Shyaa, Zurinahni Zainol, Rosni Abdullah, Mohammed Anbar, Laith Alzubaidi, José Santamaría:
Enhanced Intrusion Detection with Data Stream Classification and Concept Drift Guided by the Incremental Learning Genetic Programming Combiner. Sensors 23(7): 3736 (2023) - [j49]Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah:
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking. Sensors 23(9): 4441 (2023) - [j48]Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan:
Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks. Sensors 23(12): 5644 (2023) - [j47]Basim Ahmad Alabsi, Mohammed Anbar, Shaza Dawood Ahmed Rihan:
CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks. Sensors 23(14): 6507 (2023) - [j46]Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi:
Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models. Sensors 23(17): 7342 (2023) - [j45]Shaza Dawood Ahmed Rihan, Mohammed Anbar, Basim Ahmad Alabsi:
Meta-Learner-Based Approach for Detecting Attacks on Internet of Things Networks. Sensors 23(19): 8191 (2023) - [j44]Amran Mansoor, Mohammed Anbar, Abdullah Ahmed Bahashwan, Basim Ahmad Alabsi, Shaza Dawood Ahmed Rihan:
Deep Learning-Based Approach for Detecting DDoS Attack on Software-Defined Networking Controller. Syst. 11(6): 296 (2023) - [c18]Shady Hamouda, Mohammed Anbar, Omar E. Elejla:
Normalization and Denormalization for a Document-Oriented Data. ICAART (3) 2023: 972-979 - 2022
- [j43]Mohammad Shahrul Mohd Shah, Yu-Beng Leau, Zhiwei Yan, Mohammed Anbar:
Hierarchical Naming Scheme in Named Data Networking for Internet of Things: A Review and Future Security Challenges. IEEE Access 10: 19958-19970 (2022) - [j42]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Peterson Bernabe Cruspe, Ahmed K. Al-Ani, Shankar Karuppayah:
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review. IEEE Access 10: 71632-71655 (2022) - [j41]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum. IEEE Access 10: 118043-118057 (2022) - [j40]Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam, Iznan Husainy Hasbullah:
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. Comput. Syst. Sci. Eng. 40(1): 87-112 (2022) - [j39]Ali Abdulqader Bin-Salem, Tat Chee Wan, Hamad Naeem, Mohammed Anbar, Sabri M. Hanshi, Abdellah Redjaimia:
Efficient models for enhancing the link adaptation performance of LTE/LTE-A networks. EURASIP J. Wirel. Commun. Netw. 2022(1): 10 (2022) - [j38]Qusay M. Alzubi, Mohammed Anbar, Yousef K. Sanjalawe, Mohammed Azmi Al-Betar, Rosni Abdullah:
Intrusion detection system based on hybridizing a modified binary grey wolf optimization and particle swarm optimization. Expert Syst. Appl. 204: 117597 (2022) - [j37]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 22(5): 1696 (2022) - [j36]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Iznan Husainy Hasbullah, Ziyad R. Alashhab:
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. Sensors 22(9): 3400 (2022) - [j35]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet. Symmetry 14(12): 2483 (2022) - [j34]Omar E. Elejla, Mohammed Anbar, Shady Hamouda, Bahari Belaton, Taief Alaa Alamiedy, Iznan Husainy Hasbullah:
Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection. Symmetry 14(12): 2556 (2022) - [i1]Mahmood Alzubaidi, Marco Agus, Khalid Alyafei, Khaled A. Al-Thelaya, Uzair Shah, Alaa A. Abd-Alrazaq, Mohammed Anbar, Zafar Iqbal, Mowafa S. Househ:
Towards deep observation: A systematic survey on artificial intelligence techniques to monitor fetus via Ultrasound Images. CoRR abs/2201.07935 (2022) - 2021
- [j33]Abdullah Ahmed Bahashwan, Mohammed Anbar, Iznan Husainy Hasbullah, Ziyad R. Alashhab, Ali Abdulqader Bin-Salem:
Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP). IEEE Access 9: 45512-45526 (2021) - [j32]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Access 9: 113226-113238 (2021) - [j31]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, Iznan Husainy Hasbullah:
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 9: 121522-121531 (2021) - [j30]Ayman Ghaben, Mohammed Anbar, Iznan Husainy Hasbullah, Shankar Karuppayah:
Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms. IEEE Access 9: 123012-123028 (2021) - [j29]Yousef K. Sanjalawe, Mohammed Anbar, Salam Al-Emari:
COVID-19 Automatic Detection Using Deep Learning. Comput. Syst. Sci. Eng. 39(1): 15-35 (2021) - [j28]Kamal Alieyan, Ammar Almomani, Mohammed Anbar, Mohammad Alauthman, Rosni Abdullah, Brij B. Gupta:
DNS rule-based schema to botnet detection. Enterp. Inf. Syst. 15(4): 545-564 (2021) - [j27]Saif Al-mashhadi, Mohammed Anbar, Iznan Husainy Hasbullah, Taief Alaa Alamiedy:
Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic. PeerJ Comput. Sci. 7: e640 (2021) - [j26]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 21(24): 8206 (2021) - [c17]Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. ACeS 2021: 340-360 - [c16]Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). ACeS 2021: 401-416 - [c15]Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah:
Securing Software Defined Networking Using Intrusion Detection System - A Review. ACeS 2021: 417-446 - [c14]Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam:
Intrusion Detection Systems in Fog Computing - A Review. ACeS 2021: 481-504 - [e3]Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam:
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers. Communications in Computer and Information Science 1347, Springer 2021, ISBN 978-981-33-6834-7 [contents] - [e2]Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar:
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science 1487, Springer 2021, ISBN 978-981-16-8058-8 [contents] - 2020
- [j25]Baidaa Hamza Khudayer, Mohammed Anbar, Sabri M. Hanshi, Tat Chee Wan:
Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-Hoc Networks. IEEE Access 8: 24019-24032 (2020) - [j24]Ahmed K. Al-Ani, Mohammed Anbar, Ayman Al-Ani, Dyala R. Ibrahim:
Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network. IEEE Access 8: 27122-27138 (2020) - [j23]Mohammad Adnan Aladaileh, Mohammed Anbar, Iznan Husainy Hasbullah, Yung-Wey Chong, Yousef K. Sanjalawe:
Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review. IEEE Access 8: 143985-143995 (2020) - [j22]Mahmood Al Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, Selvakumar Manickam, Sabri M. Hanshi:
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks. IEEE Access 8: 144957-144968 (2020) - [j21]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ali A. Yassin:
VPPCS: VANET-Based Privacy-Preserving Communication Scheme. IEEE Access 8: 150914-150928 (2020) - [j20]Mahmood Al Shareeda, Mohammed Anbar, Murtadha A. Alazzawi, Selvakumar Manickam, Ahmed Shakir Al-Hiti:
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network. IEEE Access 8: 170507-170518 (2020) - [j19]Mohammad Tayyab, Bahari Belaton, Mohammed Anbar:
ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review. IEEE Access 8: 170529-170547 (2020) - [j18]Taief Alaa Alamiedy, Mohammed Anbar, Zakaria N. M. Alqattan, Qusay M. Alzubi:
Anomaly-based intrusion detection system using multi-objective grey wolf optimisation algorithm. J. Ambient Intell. Humaniz. Comput. 11(9): 3735-3756 (2020) - [j17]Qusay M. Alzubi, Mohammed Anbar, Zakaria N. M. Alqattan, Mohammed Azmi Al-Betar, Rosni Abdullah:
Intrusion detection system based on a modified binary grey wolf optimisation. Neural Comput. Appl. 32(10): 6125-6137 (2020) - [j16]Sultan Alanazi, Mohammed Anbar, Shouki A. Ebad, Shankar Karuppayah, Hadeer A. Al-Ani:
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry 12(9): 1544 (2020) - [j15]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network. Symmetry 12(10): 1687 (2020) - [c13]Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam:
A Labeled Transactions-Based Dataset on the Ethereum Network. ACeS 2020: 61-79 - [c12]Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar:
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. ACeS 2020: 479-491 - [c11]Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar:
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. ACeS 2020: 550-573 - [c10]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti:
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. ACeS 2020: 588-603 - [e1]Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam:
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers. Communications in Computer and Information Science 1132, Springer 2020, ISBN 978-981-15-2692-3 [contents]
2010 – 2019
- 2019
- [j14]Ayman Al-Ani, Mohammed Anbar, Iznan Husainy Hasbullah, Rosni Abdullah, Ahmed K. Al-Ani:
Authentication and Privacy Approach for DHCPv6. IEEE Access 7: 73144-73156 (2019) - [j13]Basim Ahmad Alabsi, Mohammed Anbar, Selvakumar Manickam, Omar E. Elejla:
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation. IET Circuits Devices Syst. 13(6): 748-755 (2019) - [j12]Mohammed Al-Shalabi, Mohammed Anbar, Tat Chee Wan, Zakaria N. M. Alqattan:
Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm. Inf. Sci. 500: 259-273 (2019) - [j11]Omar E. Elejla, Mohammed Anbar, Bahari Belaton, Shady Hamouda:
Labeled flow-based dataset of ICMPv6-based DDoS attacks. Neural Comput. Appl. 31(8): 3629-3646 (2019) - [j10]Manmeet Mahinderjit Singh, Lee Wern Shen, Mohammed Anbar:
Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS). Symmetry 11(9): 1118 (2019) - [c9]Abdullah Ahmed Bahashwan, Mohammed Anbar, Sabri M. Hanshi:
Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms. ACeS 2019: 153-167 - [c8]Alhamza Munther, Imad J. Mohammed, Mohammed Anbar, Anwer Mustafa Hilal:
Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification. ACeS 2019: 168-181 - [c7]Shady Hamouda, Zurinahni Zainol, Mohammed Anbar:
A Flexible Schema for Document Oriented Database (SDOD). KEOD 2019: 413-419 - [c6]Abdullah Ahmed Bahashwan, Mohammed Anbar, Nibras Abdullah:
New Architecture Design of Cloud Computing Using Software Defined Networking and Network Function Virtualization Technology. IRICT 2019: 705-713 - 2018
- [j9]Mohammed Anbar, Rosni Abdullah, Bassam Naji Al-Tamimi, Amir Hussain:
A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks. Cogn. Comput. 10(2): 201-214 (2018) - [j8]Mahmood Alzubaidi, Mohammed Anbar, Yung-Wey Chong, Shadi Al-Sarawi:
Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network. J. Commun. 13(5): 198-208 (2018) - [j7]Ahmed K. Al-Ani, Mohammed Anbar, Selvakumar Manickam, Ayman Al-Ani:
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network. J. Commun. 13(6): 317-324 (2018) - [j6]Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Ahmad Alnajjar:
Intrusion Detection Systems of ICMPv6-based DDoS attacks. Neural Comput. Appl. 30(1): 45-56 (2018) - [j5]Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam:
Rule-based detection technique for ICMPv6 anomalous behaviour. Neural Comput. Appl. 30(12): 3815-3824 (2018) - [c5]Kamal Alieyan, Mohammed Anbar, Ammar Almomani, Rosni Abdullah, Mohammad Alauthman:
Botnets Detecting Attack Based on DNS Features. ACIT 2018: 1-4 - 2017
- [j4]Mohammed Anbar, Rosni Abdullah, Alhamza Munther, Mohammed Azmi Al-Betar, Redhwan M. A. Saad:
NADTW: new approach for detecting TCP worm. Neural Comput. Appl. 28(S-1): 525-538 (2017) - [c4]Omar E. Elejla, Bahari Belaton, Mohammed Anbar, Basem O. Alijla:
IPv6 OS Fingerprinting Methods: Review. IVIC 2017: 661-668 - 2016
- [c3]Kamal Alieyan, Mohammed M. Kadhum, Mohammed Anbar, Shafiq Ul Rehman, Naser K. A. Alajmi:
An overview of DDoS attacks based on DNS. ICTC 2016: 276-280 - [c2]Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla:
Comparative performance analysis of classification algorithms for intrusion detection system. PST 2016: 282-288 - 2015
- [j3]Hala Albaroodi, Selvakumar Manickam, Mohammed Anbar:
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift). J. Comput. Sci. 11(3): 590-597 (2015) - 2014
- [j2]Mohammed Jamil Elhalabi, Selvakumar Manickam, Loai Bani Melhim, Mohammed Anbar, Huda Alhalabi:
A Review of Peer-to-Peer Botnet Detection Techniques. J. Comput. Sci. 10(1): 169-177 (2014) - 2012
- [j1]Mohammed Anbar, Ahmed Manasrah, Selvakumar Manickam:
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS). Int. J. Comput. Math. 89(15): 1952-1969 (2012) - 2011
- [c1]Mohammed Anbar, Ahmed Manasrah:
An Investigation Towards Worms Detection Approaches over Network. UKSim 2011: 266-269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint