default search action
Miguel Correia 0001
Person information
- affiliation: University of Lisbon, Instituto Superior Técnico, Portugal
Other persons with the same name
- Miguel Correia 0002 (aka: Miguel V. Correia 0002, Miguel Velhote Correia, Miguel Fernando Paiva Velhote Correia) — University of Porto, Faculty of Engineering / INESC-TEC, Portugal
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Rafael Belchior, Jan Süßenguth, Qi Feng, Thomas Hardjono, André Vasconcelos, Miguel Correia:
A Brief History of Blockchain Interoperability. Commun. ACM 67(10): 62-69 (2024) - [j56]Rafael Belchior, Limaris Torres, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia:
BUNGEE: Dependable Blockchain Views for Interoperability. Distributed Ledger Technol. Res. Pract. 3(1): 7:1-7:25 (2024) - [j55]Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia:
Editorial: Special issue on software protection and attacks. J. Inf. Secur. Appl. 86: 103889 (2024) - [j54]Rafael Belchior, Peter Somogyvari, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia:
Hephaestus: Modeling, Analysis, and Performance Evaluation of Cross-Chain Transactions. IEEE Trans. Reliab. 73(2): 1132-1146 (2024) - [c134]Shankar Subramanian, André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia:
Benchmarking Blockchain Bridge Aggregators. Blockchain 2024: 37-45 - [c133]João F. Santos, Miguel P. Correia, Tiago R. Dias:
Blockchain-based Rental Documentation Management with Audit Support. BRAINS 2024: 1-10 - [c132]André Augusto, Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Multi-Party Cross-Chain Asset Transfers. ICBC 2024: 259-263 - [c131]Sebastião Sotto-Mayor, Rafael Belchior, Miguel Correia, André Vasconcelos:
An Enterprise Architecture Approach to Semantic Blockchain Interoperability. ICEIS (2) 2024: 614-621 - [c130]André Augusto, Rafael Belchior, Miguel Correia, André Vasconcelos, Luyao Zhang, Thomas Hardjono:
SoK: Security and Privacy of Blockchain Interoperability. SP 2024: 3840-3865 - [e4]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i16]Miguel Correia, Alceu Bissoto, Carlos Santiago, Catarina Barata:
XAI for Skin Cancer Detection with Prototypes and Non-Expert Supervision. CoRR abs/2402.01410 (2024) - [i15]André S. Proença, Tiago R. Dias, Miguel P. Correia:
Blockchain Based Residential Smart Rent. CoRR abs/2402.05737 (2024) - [i14]João F. Santos, Miguel P. Correia, Tiago R. Dias:
Blockchain-based Rental Documentation Management with Audit Support. CoRR abs/2402.06704 (2024) - [i13]João Romeiras Amado, Francisco Pereira, David Pissarra, Salvatore Signorello, Miguel Correia, Fernando M. V. Ramos:
Peregrine: ML-based Malicious Traffic Detection for Terabit Networks. CoRR abs/2403.18788 (2024) - [i12]André Augusto, Rafael Belchior, Jonas Pfannschmidt, André Vasconcelos, Miguel Correia:
XChainWatcher: Monitoring and Identifying Attacks in Cross-Chain Bridges. CoRR abs/2410.02029 (2024) - 2023
- [j53]Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia:
Synthesis of Fault-Tolerant Reliable Broadcast Algorithms With Reinforcement Learning. IEEE Access 11: 62394-62408 (2023) - [j52]David R. Matos, Miguel L. Pardal, António Rito Silva, Miguel Correia:
μVerum: Intrusion Recovery for Microservice Applications. IEEE Access 11: 78457-78470 (2023) - [j51]Ricardo Moura, Ricardo Lopes, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: using multiple and diverse ciphers for stronger secure channels. Comput. Secur. 132: 103342 (2023) - [j50]Rafael Belchior, Luke Riley, Thomas Hardjono, André Vasconcelos, Miguel Correia:
Do You Need a Distributed Ledger Technology Interoperability Solution? Distributed Ledger Technol. Res. Pract. 2(1): 1:1-1:37 (2023) - [j49]Miguel Correia, Wellington Oliveira, José Cecílio:
Monintainer: An orchestration-independent extensible container-based monitoring solution for large clusters. J. Syst. Archit. 145: 103035 (2023) - [j48]Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia:
MIRES: Intrusion Recovery for Applications Based on Backend-As-a-Service. IEEE Trans. Cloud Comput. 11(2): 2011-2027 (2023) - [j47]David R. Matos, Miguel L. Pardal, Miguel Correia:
Sanare: Pluggable Intrusion Recovery for Web Applications. IEEE Trans. Dependable Secur. Comput. 20(1): 590-605 (2023) - [c129]Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues:
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge. CCS 2023: 3018-3032 - [c128]Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia:
Automatic Generation of Distributed Algorithms with Generative AI. DSN-S 2023: 127-131 - [c127]Felix Monteiro, Miguel Correia:
Decentralised Autonomous Organisations for Public Procurement. EASE 2023: 378-385 - [c126]André Augusto, Rafael Belchior, Imre Kocsis, László Gönczy, André Vasconcelos, Miguel Correia:
CBDC Bridging between Hyperledger Fabric and Permissioned EVM-based Blockchains. ICBC 2023: 1-9 - [c125]Carlos Santiago, Miguel Correia, Maria Rita Verdelho, Alceu Bissoto, Catarina Barata:
Global and Local Explanations for Skin Cancer Diagnosis Using Prototypes. ISIC/Care-AI/MedAGI/DeCaF@MICCAI 2023: 47-56 - [c124]Cláudio Correia, Rita Prates, Miguel Correia, Luís E. T. Rodrigues:
PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems. PRDC 2023: 111-122 - [c123]Daniel Andrade, João Nuno Silva, Miguel Correia:
I Can't Escape Myself: Cloud Inter-Processor Attestation and Sealing using Intel SGX. PRDC 2023: 198-208 - [c122]Rodrigo Silva, Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues:
Deduplication vs Privacy Tradeoffs in Cloud Storage. SAC 2023: 143-151 - [c121]João Romeiras Amado, Francisco Chamiça Pereira, Salvatore Signorello, Miguel Correia, Fernando M. V. Ramos:
Poster: In-Network ML Feature Computation for Malicious Traffic Detection. SIGCOMM 2023: 1105-1107 - [c120]Hélio Borges, Daniel Andrade, João Nuno Silva, Miguel Correia:
TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses. TrustCom 2023: 712-721 - [i11]Cláudio Correia, Miguel Correia, Luís E. T. Rodrigues:
Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version). CoRR abs/2308.03402 (2023) - [i10]Alysson Bessani, Miguel Correia, Tobias Distler, Rüdiger Kapitza, Paulo Esteves Veríssimo, Jiangshan Yu:
Vivisecting the Dissection: On the Role of Trusted Components in BFT Protocols. CoRR abs/2312.05714 (2023) - 2022
- [j46]Daniel Andrade, João Silva, Miguel Correia:
SRX-Secure Data Backup and Recovery for SGX Applications. IEEE Access 10: 35901-35918 (2022) - [j45]Rafael Belchior, Sérgio Guerreiro, André Vasconcelos, Miguel Correia:
A survey on business process view integration: past, present and future applications to blockchain. Bus. Process. Manag. J. 28(3): 713-739 (2022) - [j44]Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia:
A Survey on Blockchain Interoperability: Past, Present, and Future Trends. ACM Comput. Surv. 54(8): 168:1-168:41 (2022) - [j43]Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Hermes: Fault-tolerant middleware for blockchain interoperability. Future Gener. Comput. Syst. 129: 236-251 (2022) - [j42]Cláudio Correia, Miguel Correia, Luís Rodrigues:
Omega: A Secure Event Ordering Service for the Edge. IEEE Trans. Dependable Secur. Comput. 19(5): 2952-2964 (2022) - [j41]Ibéria Medeiros, Nuno Neves, Miguel Correia:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. IEEE Trans. Reliab. 71(2): 1033-1056 (2022) - [c119]Filipe Apolinário, João Guiomar, Éric Hervé, Sven Hrastnik, Nelson Escravana, Miguel L. Pardal, Miguel Correia:
ComSEC: Secure Communications for Baggage Handling Systems. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 329-345 - [c118]Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal, Miguel Correia:
FingerCI: generating specifications for critical infrastructures. SAC 2022: 183-186 - [c117]Vasco Guita, Daniel Andrade, João Nuno Silva, Miguel Correia:
Anonymous Trusted Data Relocation for TEEs. SEC 2022: 449-466 - [i9]Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel Correia:
Learning to generate Reliable Broadcast Algorithms. CoRR abs/2208.00525 (2022) - 2021
- [j40]Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. J. Inf. Secur. Appl. 59: 102826 (2021) - [c116]Rafael Belchior, André Vasconcelos, Miguel Correia, Thomas Hardjono:
Enabling Cross-Jurisdiction Digital Asset Transfer. SCC 2021: 431-436 - [c115]Pedro Marques, Luis Dias, Miguel Correia:
CyberVTI: Cyber Visualization Tool for Intrusion Detection. NCA 2021: 1-9 - [c114]Mihail Brinza, Miguel Correia, João Pereira:
Virtual Static Security Analyzer for Web Applications. TrustCom 2021: 840-848 - [i8]Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. IACR Cryptol. ePrint Arch. 2021: 666 (2021) - 2020
- [j39]Sérgio Guerreiro, Diogo Silva, Tiago Rosado, André Vasconcelos, Miguel Correia, Pedro Sousa:
Decentralized Business Process Control using Blockchain An experience report from two applications: Food Supply Chain and Car Registration. Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. 15: 15:1-15:41 (2020) - [j38]Ray Neiheiser, Luciana Rech, Manuel Bravo, Luís E. T. Rodrigues, Miguel Correia:
Fireplug: Efficient and Robust Geo-Replication of Graph Databases. IEEE Trans. Parallel Distributed Syst. 31(8): 1942-1953 (2020) - [c113]Diogo Serranito, André Vasconcelos, Sérgio Guerreiro, Miguel Correia:
Blockchain Ecosystem for Verifiable Qualifications. BRAINS 2020: 192-199 - [c112]Cláudio Correia, Miguel Correia, Luís Rodrigues:
Omega: a Secure Event Ordering Service for the Edge. DSN 2020: 489-501 - [c111]Rafael Belchior, Miguel Correia, André Vasconcelos:
Towards Secure, Decentralized, and Automatic Audits With Blockchain. ECIS 2020 - [c110]João Romeiras Amado, Salvatore Signorello, Miguel Correia, Fernando M. V. Ramos:
Poster: Speeding Up Network Intrusion Detection. ICNP 2020: 1-2 - [c109]Alexandra Figueiredo, Tatjana Lide, Miguel Correia:
Multi-Language Web Vulnerability Detection. ISSRE Workshops 2020: 153-154 - [c108]Diogo Vaz, David R. Matos, Miguel L. Pardal, Miguel P. Correia:
MIRES: Recovering Mobile Applications based on Backend-as-a-Service from Cyber Attacks. MobiQuitous 2020: 262-272 - [c107]Luís Dias, Simão Valente, Miguel Correia:
Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DynIDS. NCA 2020: 1-10 - [c106]Alexandra Figueiredo, Tatjana Lide, David R. Matos, Miguel Correia:
MERLIN: Multi-Language Web Vulnerability Detection. NCA 2020: 1-9 - [c105]Fábio Gomes, Miguel Correia:
Cryptojacking Detection with CPU Usage Metrics. NCA 2020: 1-10 - [c104]Gilberto Gomes, Luís Dias, Miguel Correia:
CryingJackpot: Network Flows and Performance Counters against Cryptojacking. NCA 2020: 1-10 - [c103]Arnaldo Gouveia, Miguel Correia:
Towards Quantum-Enhanced Machine Learning for Network Intrusion Detection. NCA 2020: 1-8 - [c102]Filipe F. Martins, David R. Matos, Miguel L. Pardal, Miguel Correia:
Recoverable Token: Recovering from Intrusions against Digital Assets in Ethereum. NCA 2020: 1-9 - [c101]Marcelo Silva, Miguel Matos, Miguel Correia:
P2CSTORE: P2P and Cloud File Storage for Blockchain Applications. NCA 2020: 1-4 - [c100]Ricardo Moura, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: Secure Communication Channels with Cipher Suite Diversity. SEC 2020: 64-77 - [c99]Tiago Fernandes, Luis Dias, Miguel Correia:
C2BID: Cluster Change-Based Intrusion Detection. TrustCom 2020: 310-319 - [c98]Rafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia, André Vasconcelos, Sérgio Guerreiro:
SSIBAC: Self-Sovereign Identity Based Access Control. TrustCom 2020: 1935-1943 - [i7]Rafael Belchior, André Vasconcelos, Sérgio Guerreiro, Miguel Correia:
A Survey on Blockchain Interoperability: Past, Present, and Future Trends. CoRR abs/2005.14282 (2020) - [i6]Rafael Belchior, Sérgio Guerreiro, André Vasconcelos, Miguel Correia:
A Survey on Business Process View Integration. CoRR abs/2011.14465 (2020) - [i5]Ricardo Moura, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: Secure communication channels with cipher suite diversity. IACR Cryptol. ePrint Arch. 2020: 1180 (2020)
2010 – 2019
- 2019
- [j37]Paulo Jorge Costa Nunes, Ibéria Medeiros, José Fonseca, Nuno Neves, Miguel Correia, Marco Vieira:
An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios. Computing 101(2): 161-185 (2019) - [j36]Ibéria Medeiros, Miguel Beatriz, Nuno Neves, Miguel Correia:
SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS. IEEE Trans. Reliab. 68(3): 1168-1188 (2019) - [c97]Carlos Faria, Miguel Correia:
BlockSim: Blockchain Simulator. Blockchain 2019: 439-446 - [c96]Erick Lavoie, Laurie J. Hendren, Frederic Desprez, Miguel Correia:
Pando: Personal Volunteer Computing in Browsers. Middleware 2019: 96-109 - [c95]Luís Dias, Hélder Reia, Rui Neves, Miguel Correia:
OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms. NSS 2019: 199-220 - [c94]Rafael Belchior, Miguel Correia, André Vasconcelos:
JusticeChain: Using Blockchain to Protect Justice Logs. OTM Conferences 2019: 318-325 - [c93]Erick Lavoie, Laurie J. Hendren, Frédéric Desprez, Miguel Correia:
Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. SASO 2019: 117-126 - [i4]Erick Lavoie, Laurie J. Hendren, Frédéric Desprez, Miguel Correia:
Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC. CoRR abs/1904.11402 (2019) - [i3]Ibéria Medeiros, Nuno Neves, Miguel Correia:
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. CoRR abs/1910.06826 (2019) - 2018
- [j35]Paulo Jorge Costa Nunes, Iberia Medeiros, José Fonseca, Nuno Neves, Miguel Correia, Marco Vieira:
Benchmarking Static Analysis Tools for Web Security. IEEE Trans. Reliab. 67(3): 1159-1175 (2018) - [j34]Naércio Magaia, Carlos Borrego, Paulo Rogério Pereira, Miguel Correia:
ePRIVO: An Enhanced PRIvacy-preserVing Opportunistic Routing Protocol for Vehicular Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 67(11): 11154-11168 (2018) - [j33]Naércio Magaia, Zhengguo Sheng, Paulo Rogério Pereira, Miguel Correia:
REPSYS: A Robust and Distributed Incentive Scheme for Collaborative Caching and Dissemination in Content-Centric Cellular-Based Vehicular Delay-Tolerant Networks. IEEE Wirel. Commun. 25(3): 65-71 (2018) - [c92]David R. Matos, Miguel L. Pardal, Pedro Adão, António Rito Silva, Miguel Correia:
Securing Electronic Health Records in the Cloud. P2DS@EuroSys 2018: 1:1-1:6 - [c91]Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICETE (1) 2018: 147-185 - [c90]Ray Neiheiser, Daniel Presser, Luciana Rech, Manuel Bravo, Luís E. T. Rodrigues, Miguel Correia:
Fireplug: Flexible and robust N-version geo-replication of graph databases. ICOIN 2018: 110-115 - [c89]Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICSOFT 2018: 11-49 - [c88]Hylson Vescovi Netto, Aldelir Fernando Luiz, Miguel Correia, Luciana de Oliveira Rech, Caio Pereira Oliveira:
Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes. ISCC 2018: 58-63 - [c87]David R. Matos, Miguel L. Pardal, Georg Carle, Miguel Correia:
RockFS: Cloud-backed File System Resilience to Client-Side Attacks. Middleware 2018: 107-119 - [c86]Nuno O. Duarte, Sileshi Demesie Yalew, Nuno Santos, Miguel Correia:
Leveraging ARM TrustZone and Verifiable Computing to Provide Auditable Mobile Functions. MobiQuitous 2018: 302-311 - [c85]Miguel Guerra, Benjamin Taubmann, Hans P. Reiser, Sileshi Demesie Yalew, Miguel Correia:
Introspection for ARM TrustZone with the ITZ Library. QRS 2018: 123-134 - [c84]Filipe Apolinario, Miguel L. Pardal, Miguel Correia:
S-Audit: Efficient Data Integrity Verification for Cloud Storage. TrustCom/BigDataSE 2018: 465-474 - [c83]Luis Sacramento, Iberia Medeiros, Joao Bota, Miguel Correia:
FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows. TrustCom/BigDataSE 2018: 567-572 - [i2]Erick Lavoie, Laurie J. Hendren, Frederic Desprez, Miguel Correia:
Pando: a Volunteer Computing Platform for the Web. CoRR abs/1803.08426 (2018) - 2017
- [j32]Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia:
On the Design of Resilient Multicloud MapReduce. IEEE Cloud Comput. 4(4): 74-82 (2017) - [j31]Hylson Vescovi Netto, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz, Luciana Moreira Sá de Souza:
State machine replication in containers managed by Kubernetes. J. Syst. Archit. 73: 53-59 (2017) - [c82]Pedro A. R. S. Costa, Fernando M. V. Ramos, Miguel Correia:
Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce. CCGrid 2017: 421-430 - [c81]Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia:
Demonstrating a Tool for Injection Attack Prevention in MySQL. DSN 2017: 551-558 - [c80]Paulo Jorge Costa Nunes, Iberia Medeiros, José Fonseca, Nuno Ferreira Neves, Miguel Correia, Marco Vieira:
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. EDCC 2017: 121-128 - [c79]Arnaldo Gouveia, Miguel Correia:
A Systematic Approach for the Application of Restricted Boltzmann Machines in Network Intrusion Detection. IWANN (1) 2017: 432-446 - [c78]David R. Matos, Miguel L. Pardal, Miguel Correia:
Rectify: black-box intrusion recovery in PaaS clouds. Middleware 2017: 209-221 - [c77]Naércio Magaia, Paulo Rogério Pereira, Miguel Correia:
REPSYS: A Robust and Distributed Reputation System for Delay-Tolerant Networks. MSWiM 2017: 289-293 - [c76]Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid. NCA 2017: 351-358 - [c75]Naércio Magaia, Carlos Borrego, Paulo Pereira, Miguel Correia:
PRIVO: A privacy-preserving opportunistic routing protocol for delay tolerant networks. Networking 2017: 1-9 - [c74]André Joaquim, Miguel L. Pardal, Miguel Correia:
Vulnerability-Tolerant Transport Layer Security. OPODIS 2017: 28:1-28:16 - [c73]Erick Lavoie, Miguel Correia, Laurie J. Hendren:
Xor-Overlay Topology Management beyond Kademlia. SASO 2017: 51-60 - [c72]Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
T2Droid: A TrustZone-Based Dynamic Analyser for Android Applications. TrustCom/BigDataSE/ICESS 2017: 240-247 - [c71]Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
DroidPosture: A trusted posture assessment service for mobile devices. WiMob 2017: 1-8 - [c70]Sileshi Demesie Yalew, Pedro Mendonça, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia:
TruApp: A TrustZone-based authenticity detection service for mobile apps. WiMob 2017: 1-9 - [e3]Aris Gkoulalas-Divanis, Miguel P. Correia, Dimiter R. Avresky:
16th IEEE International Symposium on Network Computing and Applications, NCA 2017, Cambridge, MA, USA, October 30 - November 1, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-1465-5 [contents] - 2016
- [j30]Alysson Bessani, Nuno Ferreira Neves, Paulo Veríssimo, Wagner Saback Dantas, Alexandre Fonseca, Rui Silva, Pedro Luz, Miguel Correia:
JITeR: Just-in-time application-layer routing. Comput. Networks 104: 122-136 (2016) - [j29]Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia:
Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining. IEEE Trans. Reliab. 65(1): 54-69 (2016) - [c69]Paulo R. Pinho Filho, Luciana de Oliveira Rech, Lau Cheuk Lung, Miguel Correia, Lásaro Jonas Camargos:
Priority-Based State Machine Replication with PRaxos. AINA 2016: 540-547 - [c68]Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia:
Medusa: An Efficient Cloud Fault-Tolerant MapReduce. CCGrid 2016: 443-452 - [c67]Iberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia:
Hacking the DBMS to Prevent Injection Attacks. CODASPY 2016: 295-306 - [c66]Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia:
Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report. DSN 2016: 630-637 - [c65]Ibéria Medeiros, Nuno Ferreira Neves, Miguel Correia:
DEKANT: a static analysis tool that learns to detect web application vulnerabilities. ISSTA 2016: 1-11 - [c64]Sileshi Demesie Yalew, Gerald Q. Maguire Jr., Miguel Correia:
Light-SPD: a platform to prototype secure mobile applications. PAMCO@MobiHoc 2016: 11-20 - [c63]Eugenio A. Silva, Miguel Correia:
Leveraging an homomorphic encryption library to implement a coordination service. NCA 2016: 39-42 - [c62]Karan Balu, Miguel L. Pardal, Miguel Correia:
DARSHANA: Detecting route hijacking for communication confidentiality. NCA 2016: 52-59 - [c61]Diogo Raposo, Miguel L. Pardal, Luís E. T. Rodrigues, Miguel Correia:
MACHETE: Multi-path communication for security. NCA 2016: 60-67 - [c60]Arnaldo Gouveia, Miguel Correia:
Feature set tuning in statistical learning network intrusion detection. NCA 2016: 68-75 - [c59]David R. Matos, Miguel Correia:
NoSQL Undo: Recovering NoSQL databases by undoing operations. NCA 2016: 191-198 - [c58]André Joaquim, Miguel L. Pardal, Miguel Correia:
vtTLS: A vulnerability-tolerant communication protocol. NCA 2016: 212-215 - [c57]Christine Blakemore, João Redol, Miguel Correia:
Fingerprinting for Web Applications: From Devices to Related Groups. Trustcom/BigDataSE/ISPA 2016: 144-151 - 2015
- [j28]Naércio Magaia, Alexandre P. Francisco, Paulo Rogério Pereira, Miguel Correia:
Betweenness centrality in Delay Tolerant Networks: A survey. Ad Hoc Networks 33: 284-305 (2015) - [j27]Naércio Magaia, Nuno Horta, Rui Ferreira Neves, Paulo Rogério Pereira, Miguel Correia:
A multi-objective routing algorithm for Wireless Multimedia Sensor Networks. Appl. Soft Comput. 30: 104-112 (2015) - [j26]Hylson Vescovi Netto, Lau Cheuk Lung, Tulio Alberton Ribeiro, Miguel Correia, Aldelir Fernando Luiz:
Anticipating Requests to Improve Performance and Reduce Costs in Cloud Storage. SIGMETRICS Perform. Evaluation Rev. 43(3): 21-24 (2015) - [c56]Daniel Presser, Lau Cheuk Lung, Miguel Correia:
Greft: Arbitrary Fault-Tolerant Distributed Graph Processing. BigData Congress 2015: 452-459 - [c55]Dario Nascimento, Miguel Correia:
Shuttle: Intrusion Recovery for PaaS. ICDCS 2015: 653-663 - [c54]Daniel Gonçalves, Joao Bota, Miguel Correia:
Big Data Analytics for Detecting Host Misbehavior in Large Logs. TrustCom/BigDataSE/ISPA (1) 2015: 238-245 - [i1]Pedro A. R. S. Costa, Xiao Bai, Fernando M. V. Ramos, Miguel Correia:
Medusa: An Efficient Cloud Fault-Tolerant MapReduce. CoRR abs/1511.07185 (2015) - 2014
- [j25]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia:
MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases. SIGMOD Rec. 43(1): 32-38 (2014) - [j24]Miguel Correia, Neeraj Mittal:
Cloud Computing Dependability: Report and Extended Papers of the Second International Workshop on Dependability Issues in Cloud Computing. ACM SIGOPS Oper. Syst. Rev. 48(2): 1-2 (2014) - [c53]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia, Valdir Stumm Junior:
Non-blocking Atomic Commitment with Byzantine Faults. SBRC 2014: 156-164 - [c52]Alysson Neves Bessani, Ricardo Mendes, Tiago Oliveira, Nuno Ferreira Neves, Miguel Correia, Marcelo Pasin, Paulo Veríssimo:
SCFS: A Shared Cloud-backed File System. USENIX ATC 2014: 169-180 - [c51]Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia:
Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. WWW 2014: 63-74 - 2013
- [j23]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
BFT-TO: Intrusion Tolerance with Less Replicas. Comput. J. 56(6): 693-715 (2013) - [j22]Miguel Correia, Neeraj Mittal:
Dependability issues in cloud computing: extended papers from the 1st international workshop on dependability issues in cloud computing - DISCCO. ACM SIGOPS Oper. Syst. Rev. 47(2): 20-22 (2013) - [j21]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Veríssimo:
Efficient Byzantine Fault-Tolerance. IEEE Trans. Computers 62(1): 16-30 (2013) - [j20]Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel P. Correia:
On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Trans. Dependable Secur. Comput. 10(5): 301-313 (2013) - [j19]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia:
Byzantine Fault-Tolerant Consensus in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 12(12): 2441-2454 (2013) - [j18]Alysson Neves Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa:
DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. ACM Trans. Storage 9(4): 12 (2013) - [c50]Miguel Correia:
Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. Euro-Par Workshops 2013: 95-104 - [c49]Naércio Magaia, Paulo Rogério Pereira, Miguel P. Correia:
Selfish and malicious behavior in Delay-Tolerant Networks. Future Network & Mobile Summit 2013: 1-10 - [c48]Iberia Medeiros, Nuno Ferreira Neves, Miguel Correia:
Securing energy metering software with automatic source code correction. INDIN 2013: 701-706 - [c47]Fernando Dettoni, Lau Cheuk Lung, Miguel Correia, Aldelir Fernando Luiz:
Byzantine fault-tolerant state machine replication with twin virtual machines. ISCC 2013: 398-403 - [c46]Alysson Neves Bessani, Marcel Santos, João Felix, Nuno Ferreira Neves, Miguel Correia:
On the Efficiency of Durable State Machine Replication. USENIX ATC 2013: 169-180 - [e2]Miguel Correia, Neeraj Mittal:
Proceedings of the 2nd International Workshop on Dependability Issues in Cloud Computing, DISCCO '13, Braga, Portugal, September 30, 2013. ACM 2013, ISBN 978-1-4503-2248-5 [contents] - 2012
- [j17]Luciana Arantes, Alysson Neves Bessani, Vinicius Vielmo Cogo, Miguel Correia, Pedro Costa, Jonathan Lejeune, M. Piffaretti, Olivier Marin, Marcelo Pasin, Pierre Sens, Fabrício Silva, Julien Sopena:
Vers une plate-forme MapReduce tolérant les fautes byzantines. Tech. Sci. Informatiques 31(8-10): 1079-1099 (2012) - [c45]Miguel Correia, Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Veríssimo:
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. SRDS 2012: 448-453 - [c44]Miguel Correia, Daniel Gómez Ferro, Flavio Paiva Junqueira, Marco Serafini:
Practical Hardening of Crash-Tolerant Systems. USENIX ATC 2012: 453-466 - [e1]Cristian Constantinescu, Miguel P. Correia:
2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0938-7 [contents] - 2011
- [j16]Francisco Rocha, Salvador Abreu, Miguel Correia:
The Final Frontier: Confidentiality and Privacy in the Cloud. Computer 44(9): 44-50 (2011) - [j15]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomization can be a healer: consensus with dynamic omission failures. Distributed Comput. 24(3-4): 165-175 (2011) - [j14]Miguel Correia, Giuliana Santos Veronese, Nuno Ferreira Neves, Paulo Veríssimo:
Byzantine consensus in asynchronous message-passing systems: a survey. Int. J. Crit. Comput. Based Syst. 2(2): 141-161 (2011) - [j13]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
RITAS: Services for Randomized Intrusion Tolerance. IEEE Trans. Dependable Secur. Comput. 8(1): 122-136 (2011) - [c43]Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Miguel Correia:
Byzantine Fault-Tolerant MapReduce: Faults are Not Just Crashes. CloudCom 2011: 32-39 - [c42]Gustavo Nascimento, Miguel Correia:
Anomaly-based intrusion detection in software as a service. DSN Workshops 2011: 19-24 - [c41]Francisco Rocha, Miguel Correia:
Lucy in the sky without diamonds: Stealing confidential data in the cloud. DSN Workshops 2011: 129-134 - [c40]Alysson Neves Bessani, Miguel P. Correia, Bruno Quaresma, Fernando André, Paulo Sousa:
DepSky: dependable and secure storage in a cloud-of-clouds. EuroSys 2011: 31-46 - [c39]Aldelir Fernando Luiz, Lau Cheuk Lung, Miguel Correia:
Byzantine Fault-Tolerant Transaction Processing for Replicated Databases. NCA 2011: 83-90 - [c38]Xavier Vilaça, João Leitão, Miguel Correia, Luís E. T. Rodrigues:
N-party BAR Transfer. OPODIS 2011: 392-408 - 2010
- [j12]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Trans. Parallel Distributed Syst. 21(4): 452-465 (2010) - [j11]João Antunes, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo, Rui Ferreira Neves:
Vulnerability Discovery with Attack Injection. IEEE Trans. Software Eng. 36(3): 357-370 (2010) - [c37]Valdir Stumm Jr., Lau Cheuk Lung, Miguel Correia, Joni da Silva Fraga, Jim Lau:
Intrusion Tolerant Services Through Virtualization: A Shared Memory Approach. AINA 2010: 768-774 - [c36]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia:
Turquois: Byzantine consensus in wireless ad hoc networks. DSN 2010: 537-546 - [c35]Miguel Correia, Partha P. Pal:
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. DSN 2010: 621-622 - [c34]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung:
EBAWA: Efficient Byzantine Agreement for Wide-Area Networks. HASE 2010: 10-19 - [c33]Alysson Neves Bessani, Paulo Sousa, Miguel Correia:
Active Quorum Systems. HotDep 2010 - [c32]Miguel Correia, Giuliana Santos Veronese, Lau Cheuk Lung:
Asynchronous Byzantine consensus with 2f+1 processes. SAC 2010: 475-480
2000 – 2009
- 2009
- [j10]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
An Efficient Byzantine-Resilient Tuple Space. IEEE Trans. Computers 58(8): 1080-1094 (2009) - [j9]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces. IEEE Trans. Parallel Distributed Syst. 20(3): 419-432 (2009) - [c31]Paulo Sousa, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia, Nuno Ferreira Neves:
Intrusion-tolerant self-healing devices for critical infrastructure protection. DSN 2009: 217-222 - [c30]Saurabh Bagchi, Miguel Correia, Partha P. Pal:
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. DSN 2009: 600-601 - [c29]Paulo Veríssimo, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Sousa:
Designing Modular and Redundant Cyber Architectures for Process Control: Lessons learned. HICSS 2009: 1-8 - [c28]Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung:
Spin One's Wheels? Byzantine Fault Tolerance with a Spinning Primary. SRDS 2009: 135-144 - [c27]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures. DISC 2009: 63-77 - 2008
- [j8]Alysson Neves Bessani, Paulo Sousa, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
The Crutial Way of Critical Infrastructure Protection. IEEE Secur. Priv. 6(6): 44-51 (2008) - [j7]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
The CRUTIAL reference critical information infrastructure architecture: a blueprint. Int. J. Syst. Syst. Eng. 1(1/2): 78-95 (2008) - [j6]Miguel Correia, Alysson Neves Bessani, Paulo Veríssimo:
On Byzantine generals with alternative plans. J. Parallel Distributed Comput. 68(9): 1291-1296 (2008) - [c26]Alysson Neves Bessani, Eduardo Adílio Pelinson Alchieri, Miguel Correia, Joni da Silva Fraga:
DepSpace: a byzantine fault-tolerant coordination service. EuroSys 2008: 163-176 - [c25]Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
Finite Memory: A Vulnerability of Intrusion-Tolerant Systems. NCA 2008: 37-44 - 2007
- [j5]Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo:
Worm-IT - A wormhole-based intrusion-tolerant group communication system. J. Syst. Softw. 80(2): 178-197 (2007) - [j4]Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo:
Automated Rule-Based Diagnosis through a Distributed Monitor System. IEEE Trans. Dependable Secur. Comput. 4(4): 266-279 (2007) - [c24]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c23]Fábio Favarim, Joni da Silva Fraga, Lau Cheuk Lung, Miguel Correia, João Felipe Santos:
Exploiting Tuple Spaces to Provide Fault-Tolerant Scheduling on Computational Grids. ISORC 2007: 403-411 - [c22]Fábio Favarim, Joni da Silva Fraga, Lau Cheuk Lung, Miguel Correia:
GRIDTS: A New Approach for Fault-Tolerant Scheduling in Grid Computing. NCA 2007: 187-194 - [c21]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. NCA 2007: 231-238 - [c20]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. PRDC 2007: 357-364 - [c19]Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. PRDC 2007: 373-380 - [c18]Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
On the Effects of Finite Memory on Intrusion-Tolerant Systems. PRDC 2007: 401-404 - [c17]Wagner Saback Dantas, Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia:
Evaluating Byzantine Quorum Systems. SRDS 2007: 253-264 - [c16]Alysson Neves Bessani, Miguel Correia, Henrique Moniz, Nuno Ferreira Neves, Paulo Veríssimo:
When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus. DISC 2007: 480-481 - [c15]Pan Jieke, João Redol, Miguel Correia:
Specification-based Intrusion Detection System for Carrier Ethernet. WEBIST (1) 2007: 426-429 - 2006
- [j3]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
From Consensus to Atomic Broadcast: Time-Free Byzantine-Resistant Protocols without Signatures. Comput. J. 49(1): 82-96 (2006) - [c14]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture. CRITIS 2006: 1-14 - [c13]Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Veríssimo, Rui Ferreira Neves:
Using Attack Injection to Discover New Vulnerabilities. DSN 2006: 457-466 - [c12]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomized Intrusion-Tolerant Asynchronous Services. DSN 2006: 568-577 - [c11]Alysson Neves Bessani, Joni da Silva Fraga, Miguel Correia, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes using Policy-Enforced Tuple Spaces. ICDCS 2006: 35 - [c10]Lau Cheuk Lung, Fábio Favarim, Giuliana Teixeira Santos, Miguel Correia:
An Infrastructure for Adaptive Fault Tolerance on FT-CORBA. ISORC 2006: 504-511 - [c9]Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols. SRDS 2006: 235-244 - [c8]Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Brief Announcement: Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems. DISC 2006: 554-556 - 2005
- [j2]Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo:
Low complexity Byzantine-resilient consensus. Distributed Comput. 17(3): 237-249 (2005) - [j1]Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Solving Vector Consensus with a Wormhole. IEEE Trans. Parallel Distributed Syst. 16(12): 1120-1131 (2005) - 2004
- [c7]Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
How to Tolerate Half Less One Byzantine Nodes in Practical Distributed Systems. SRDS 2004: 174-183 - 2002
- [c6]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Design of a COTSReal-Time Distributed Security Kernel. EDCC 2002: 234-252 - [c5]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia:
Intrusion-Tolerant Architectures: Concepts and Design. WADS 2002: 3-36 - [c4]Miguel Correia, Lau Cheuk Lung, Nuno Ferreira Neves, Paulo Veríssimo:
Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model. SRDS 2002: 2-11 - 2001
- [c3]Miguel Correia, Paulo Veríssimo, Nuno Ferreira Neves:
The Architecture of a Secure Group Communication System Based on Intrusion Tolerance. ICDCS Workshops 2001: 17-24
1990 – 1999
- 1998
- [c2]João Bom, Paulo Marques, Miguel Correia, Paulo Pinto:
Integrated Dymanic QoS Control for Multimedia Applications. Broadband European Networks and Multimedia Services 1998: 384-394 - 1995
- [c1]Miguel Correia, Paulo Pinto:
Low-Level Multimedia Synchronization Algorithms on Broadband Networks. ACM Multimedia 1995: 423-434
Coauthor Index
aka: Alysson Bessani
aka: Ibéria Medeiros
aka: Nuno Ferreira Neves
aka: Paulo Esteves Veríssimo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint