default search action
Manoj Misra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
HTTP header based phishing attack detection using machine learning. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j41]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Email bombing attack detection and mitigation using machine learning. Int. J. Inf. Sec. 23(4): 2939-2949 (2024) - 2023
- [j40]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Madhusanka Liyanage:
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices. IEEE Trans. Ind. Informatics 19(2): 1343-1355 (2023) - [j39]Awaneesh Kumar Yadav, An Braeken, Manoj Misra:
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing. J. Supercomput. 79(10): 11261-11299 (2023) - [j38]Awaneesh Kumar Yadav, Shalitha Wijethilaka, An Braeken, Manoj Misra, Madhusanka Liyanage:
An Enhanced Cross-Network-Slice Authentication Protocol for 5G. IEEE Trans. Sustain. Comput. 8(4): 555-573 (2023) - [c57]Awaneesh Kumar Yadav, An Braeken, Manoj Misra, Madhusanka Liyanage:
A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain. CCNC 2023: 1110-1115 - [c56]Awaneesh Kumar Yadav, Manoj Misra, An Braeken, Madhusanka Liyanage:
A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming. TrustCom 2023: 1324-1331 - 2022
- [j37]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, An Braeken, Madhusanka Liyanage:
An improved and provably secure symmetric-key based 5G-AKA Protocol. Comput. Networks 218: 109400 (2022) - [c55]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Kuljeet Kaur, Sahil Garg, Xi Chen:
A Provably Secure ECC-based Multi-factor 5G-AKA Authentication Protocol. GLOBECOM 2022: 516-521 - [c54]Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, Kuljeet Kaur, Sahil Garg, Madhusanka Liyanage:
LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN. ICC 2022: 692-697 - [c53]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. SecureComm 2022: 491-509 - 2021
- [c52]Gaurav Varshney, R. Padmavathi Iyer, Pradeep K. Atrey, Manoj Misra:
Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering. COMSNETS 2021: 1-4 - 2020
- [c51]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics. ICCNS 2020: 109-114 - [c50]Awaneesh Kumar Yadav, Manoj Misra, Madhusanka Liyanage, Gaurav Varshney:
Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs. MASS 2020: 576-584 - [c49]Vishal Arora, Manoj Misra:
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time. STM 2020: 39-54
2010 – 2019
- 2018
- [j36]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks. J. Inf. Secur. Appl. 42: 1-17 (2018) - [j35]Priyanka Singh, Balasubramanian Raman, Manoj Misra:
Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multim. Tools Appl. 77(10): 12581-12605 (2018) - [j34]Priyanka Singh, Balasubramanian Raman, Manoj Misra:
A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares. Signal Process. 142: 301-319 (2018) - [c48]Amik Singh, Mohit Gupta, Manoj Misra:
Parallel progressive sequential pattern (PPSP) mining. CCWC 2018: 294-300 - 2017
- [j33]Govind P. Gupta, Manoj Misra, Kumkum Garg:
Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks. Comput. Electr. Eng. 64: 262-276 (2017) - [j32]Tarun Kulshrestha, Divya Saxena, Rajdeep Niyogi, Vaskar Raychoudhury, Manoj Misra:
SmartITS: Smartphone-based identification and tracking using seamless indoor-outdoor localization. J. Netw. Comput. Appl. 98: 97-113 (2017) - [j31]Priyanka Singh, Balasubramanian Raman, Manoj Misra:
A secure image sharing scheme based on SVD and Fractional Fourier Transform. Signal Process. Image Commun. 57: 46-59 (2017) - [c47]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Detecting Spying and Fraud Browser Extensions: Short Paper. MPS@CCS 2017: 45-52 - [c46]R. Padmavathi Iyer, Pradeep K. Atrey, Gaurav Varshney, Manoj Misra:
Email spoofing detection using volatile memory forensics. CNS 2017: 619-625 - [c45]Tarun Kulshrestha, Divya Saxena, Rajdeep Niyogi, Manoj Misra, Dhaval Patel:
An Improved Smartphone-Based Non-Participatory Crowd Monitoring System in Smart Environments. CSE/EUC (2) 2017: 132-139 - [c44]Rajdeep Niyogi, Manoj Misra, Tarun Kulshrestha, Dhaval Patel:
Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environment. IC3 2017: 1-6 - [c43]Amik Singh, Manoj Misra:
Optimization of Zuker Algorithm on GPUs. PDCAT 2017: 249-254 - 2016
- [j30]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
A phish detector using lightweight search features. Comput. Secur. 62: 213-228 (2016) - [j29]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
A survey and classification of web phishing detection schemes. Secur. Commun. Networks 9(18): 6266-6284 (2016) - [c42]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. ICITST 2016: 365-370 - 2015
- [j28]Govind P. Gupta, Manoj Misra, Kumkum Garg:
An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks. J. Inf. Process. Syst. 11(1): 148 (2015) - [c41]Ramakanth Putta, Manoj Misra, Divye Kapoor:
Smartphone based indoor tracking using magnetic and indoor maps. ISSNIP 2015: 1-6 - 2014
- [j27]Lalit Kumar Awasthi, Manoj Misra, Ramesh Chandra Joshi:
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems. Int. J. Commun. Networks Distributed Syst. 12(4): 356-380 (2014) - [j26]Poonam Gera, Kumkum Garg, Manoj Misra:
Trust-based Multi-Path Routing for Enhancing Data Security in MANETs. Int. J. Netw. Secur. 16(2): 102-111 (2014) - [j25]Govind P. Gupta, Manoj Misra, Kumkum Garg:
Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries. KSII Trans. Internet Inf. Syst. 8(1): 123-144 (2014) - [j24]Govind P. Gupta, Manoj Misra, Kumkum Garg:
Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks. J. Netw. Comput. Appl. 41: 300-311 (2014) - [c40]Radheyshyam Sharma, Manoj Misra, Rajdeep Niyogi:
RaMaN: A dynamic clustering protocol resilient against colluded role-manipulability and node replication attacks. HPCS 2014: 871-876 - 2013
- [j23]Govind P. Gupta, Manoj Misra, Kumkum Garg:
Energy efficient data gathering using prediction-based filtering in wireless sensor networks. Int. J. Inf. Commun. Technol. 5(1): 75-94 (2013) - [c39]Manoj Kumar Gupta, Rajdeep Niyogi, Manoj Misra:
A framework for alignment-free methods to perform similarity analysis of biological sequence. IC3 2013: 337-342 - 2012
- [j22]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack. Int. J. Netw. Secur. 14(2): 61-70 (2012) - [c38]Ajay Chaudhary, Manoj Misra, Anjali Sardana:
An efficient fuzzy controller based technique for network traffic classification to improve QoS. SIN 2012: 95-102 - [c37]Abhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan:
Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context. TrustCom 2012: 1771-1776 - [i5]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. CoRR abs/1203.2399 (2012) - [i4]Brij B. Gupta, Manoj Misra, Ramesh C. Joshi:
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach. CoRR abs/1203.2400 (2012) - [i3]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain. CoRR abs/1204.5590 (2012) - [i2]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network. CoRR abs/1204.5592 (2012) - [i1]Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:
Distributed Denial of Service Prevention Techniques. CoRR abs/1208.3557 (2012) - 2011
- [j21]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 20-35 (2011) - [c36]Govind P. Gupta, Manoj Misra, Kumkum Garg:
An energy balanced mobile agents based data dissemination protocol for wireless sensor networks. ACWR 2011: 89-95 - [c35]Poonam Gera, Kumkum Garg, Manoj Misra:
Opinion Based Trust Evaluation Model in MANETs. IC3 2011: 301-312 - [c34]Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
A cooperative caching strategy in mobile ad hoc networks based on clusters. ICCCS 2011: 17-20 - [c33]Poonam Gera, Kumkum Garg, Manoj Misra:
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs. ICCCS 2011: 50-55 - [c32]Govind P. Gupta, Manoj Misra, Kumkum Garg:
Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networks. ICON 2011: 123-128 - [c31]Poonam Gera, Kumkum Garg, Manoj Misra:
Misbehaving nodes detection through opinion based trust evaluation model in MANETs. ICWET 2011: 264-270 - 2010
- [j20]Teek Parval Sharma, Ramesh C. Joshi, Manoj Misra:
Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 239-264 (2010) - [j19]Ajey Kumar, Anil Kumar Sarje, Manoj Misra:
Prioritised Predicted Region based Cache Replacement Policy for location dependent data in mobile environment. Int. J. Ad Hoc Ubiquitous Comput. 5(1): 56-67 (2010) - [j18]Lalit Kumar Awasthi, Manoj Misra, Ramesh C. Joshi:
A weighted checkpointing protocol for mobile distributed systems. Int. J. Ad Hoc Ubiquitous Comput. 5(3): 137-149 (2010) - [j17]Brij B. Gupta, Ramesh C. Joshi, Manoj Misra:
Estimating strength of DDoS attack using various regression models. Int. J. Multim. Intell. Secur. 1(4): 378-391 (2010) - [j16]Rakesh Kumar, Anil Kumar Sarje, Manoj Misra:
An AODV Based QoS Routing Protocol for Delay Sensitive Applications in Mobile Ad Hoc Networks. J. Digit. Inf. Manag. 8(5): 304-315 (2010) - [c30]Poonam Gera, Kumkum Garg, Manoj Misra:
Trust Based Multi Path DSR Protocol. ARES 2010: 204-209 - [c29]Poonam Gera, Kumkum Garg, Manoj Misra:
Trust based security in MANET routing protocols: a survey. A2CWiC 2010: 47:1-47:7 - [c28]Poonam Gera, Kumkum Garg, Manoj Misra:
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. CNSA 2010: 181-190 - [c27]Poonam Gera, Kumkum Garg, Manoj Misra:
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes. ICWET 2010: 109-114 - [c26]Poonam Gera, Kumkum Garg, Manoj Misra:
Trust based multi-path routing for end to end secure data delivery in manets. SIN 2010: 81-89
2000 – 2009
- 2009
- [j15]Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Concurrency Control for Multilevel Secure Databases. Int. J. Netw. Secur. 9(1): 70-81 (2009) - [j14]Brij B. Gupta, Ramesh Chandra Joshi, Manoj Misra:
Defending against Distributed Denial of Service Attacks: Issues and Challenges. Inf. Secur. J. A Glob. Perspect. 18(5): 224-247 (2009) - [c25]Pankaj Gupta, Tarun Bansal, Manoj Misra:
MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks. NetCoM 2009: 23-27 - 2008
- [j13]Udai Shanker, Manoj Misra, Anil Kumar Sarje:
Distributed real time database systems: background and literature review. Distributed Parallel Databases 23(2): 127-149 (2008) - [j12]Ajey Kumar, Manoj Misra, Anil Kumar Sarje:
A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment. Int. J. Commun. Netw. Syst. Sci. 1(1): 79-94 (2008) - [c24]Pradeep Macharla, Rakesh Kumar, Anil Kumar Sarje, Manoj Misra:
A QoS routing protocol for delay-sensitive applications in mobile ad hoc networks. COMSWARE 2008: 720-727 - [c23]Nidhi Bansal, Teek Parval Sharma, Manoj Misra, Ramesh Chandra Joshi:
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks. ICON 2008: 1-6 - [c22]Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi:
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. ICON 2008: 1-4 - [c21]Teek Parval Sharma, Ramesh Chandra Joshi, Manoj Misra:
Dual radio based cooperative caching for wireless sensor networks. ICON 2008: 1-7 - [c20]Teek Parval Sharma, Ramesh C. Joshi, Manoj Misra:
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. IPCCC 2008: 412-417 - 2007
- [j11]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Supporting cooperative caching in mobile ad hoc networks using clusters. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 58-72 (2007) - [j10]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy efficient cache invalidation in a disconnected wireless mobile environment. Int. J. Ad Hoc Ubiquitous Comput. 2(1/2): 83-91 (2007) - [j9]Rakesh Kumar, Manoj Misra, Anil Kumar Sarje:
A Review of Quality of Service (QoS) Route Provisioning in Mobile Ad Hoc Networks. J. Digit. Inf. Manag. 5(1): 31-45 (2007) - [j8]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Cooperative caching in mobile ad hoc networks based on data utility. Mob. Inf. Syst. 3(1): 19-37 (2007) - [j7]Ruchir Shah, Bharadwaj Veeravalli, Manoj Misra:
On the Design of Adaptive and Decentralized Load Balancing Algorithms with Load Estimation for Computational Grid Environments. IEEE Trans. Parallel Distributed Syst. 18(12): 1675-1686 (2007) - [j6]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Exploiting caching in heterogeneous mobile environment. Wirel. Commun. Mob. Comput. 7(7): 835-848 (2007) - [j5]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters. Wirel. Pers. Commun. 43(1): 41-63 (2007) - [c19]Nimesh Desai, Kumkum Garg, Manoj Misra, Bharadwaj Veeravalli:
Modeling Hierarchical Mobile Agent Security Protocol Using CP Nets. HiPC 2007: 637-649 - [c18]Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Secure Transaction Management Protocols for MLS/DDBMS. ICISS 2007: 219-233 - [c17]Ajey Kumar, Manoj Misra, Anil Kumar Sarje:
A weighted cache replacement policy for location dependent data in mobile environments. SAC 2007: 920-924 - 2006
- [j4]Udai Shanker, Manoj Misra, Anil Kumar Sarje:
SWIFT-A new real time commit protocol. Distributed Parallel Databases 20(1): 29-56 (2006) - [j3]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
A zone co-operation approach for efficient caching in mobile ad hoc networks. Int. J. Commun. Syst. 19(9): 1009-1028 (2006) - [c16]Udai Shanker, Manoj Misra, Anil Kumar Sarje:
OCP: a distributed real time commit protocol. ADC 2006: 193-202 - [c15]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient cooperative caching in ad hoc networks. COMSWARE 2006: 1-8 - [c14]Ruchir Shah, Bharadwaj Veeravalli, Manoj Misra:
Estimation Based Load Balancing Algorithm for Data-Intensive Heterogeneous Grid Environments. HiPC 2006: 72-83 - [c13]Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
A Secure Concurrency Control for MLS/DDBSs. ICDIM 2006: 41-46 - [c12]Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Fairness Strategy for Multilevel Secure Concurrency Control Protocol. ICISS 2006: 71-85 - [c11]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Cache Replacement in Mobile Environment Using Data Profit. ICPADS (1) 2006: 203-212 - [c10]Udai Shanker, Manoj Misra, Anil Kumar Sarje, Rahul Shisondia:
Dependency Sensitive Shadow SWIFT. IDEAS 2006: 273-276 - 2005
- [j2]Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Mobile Environment. J. Digit. Inf. Manag. 3(2): 119-125 (2005) - [c9]Udai Shanker, Manoj Misra, Anil Kumar Sarje:
A New Commit Protocol for Distributed Real-Time Database Systems. Databases and Applications 2005: 122-127 - [c8]Navdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra:
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems. ITCC (1) 2005: 249-254 - [c7]Ranjana Bhadoria, Shukti Das, Manoj Misra, Anil Kumar Sarje:
Performance Comparison of Majority Voting with ROWA Replication Method over PlanetLab. IWDC 2005: 147-152 - [c6]Udai Shanker, Manoj Misra, Anil Kumar Sarje:
A Memory Efficient Fast Distributed Real Time Commit Protocol. IWDC 2005: 500-505 - [c5]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment. IWDC 2005: 536-541 - [c4]Ajey Kumar, Manoj Misra, Anil Kumar Sarje:
Strategies for Cache Invalidation of Location Dependent Data in Mobile Environment. PDPTA 2005: 38-44 - 2004
- [c3]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Broadcast Based Cache Invalidation and Prefetching in Mobile Environment. HiPC 2004: 410-419 - [c2]Narottam Chand, Ramesh C. Joshi, Manoj Misra:
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment. ICDCIT 2004: 85-95 - 2002
- [c1]L. Kumar, Manoj Misra, Isi Mitrani:
Analysis of a Transaction System with Checkpointing, Failures, and Rollback. Computer Performance Evaluation / TOOLS 2002: 279-288
1990 – 1999
- 1999
- [j1]Manoj Misra, Isi Mitrani:
On the Propagation of Updates in Distributed Replicated Systems. Perform. Evaluation 35(3-4): 131-144 (1999) - 1997
- [b1]Manoj Misra:
Performance modelling of replication protocols. Newcastle University, Newcastle upon Tyne, UK, 1997
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint