default search action
Ram Krishnan
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c72]Pankaj Chhetri, Smriti Bhatt, Paras Bhatt, Mohammad Nur Nobi, James O. Benson, Ram Krishnan:
Environment Aware Deep Learning Based Access Control Model. SAT-CPS@CODASPY 2024: 81-89 - [e6]Anna Lisa Ferrara, Ram Krishnan:
Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings. Lecture Notes in Computer Science 14901, Springer 2024, ISBN 978-3-031-65171-7 [contents] - 2023
- [j18]Sagar Samtani, Ziming Zhao, Ram Krishnan:
Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence. Inf. Syst. Frontiers 25(2): 425-429 (2023) - [j17]Randy Klepetko, Ram Krishnan:
Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural Data Order. Inf. Syst. Frontiers 25(2): 613-638 (2023) - [c71]Safwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta:
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. CODASPY 2023: 283-285 - [c70]David Rodriguez, Ram Krishnan:
An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning. DBSec 2023: 302-316 - [c69]David Rodriguez, Ram Krishnan:
A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks. ICISS 2023: 178-196 - [c68]David Rodriguez, Ram Krishnan:
Learnable Image Transformations for Privacy Enhanced Deep Neural Networks. TPS-ISA 2023: 64-73 - 2022
- [j16]David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan, Yufei Huang:
On the role of deep learning model complexity in adversarial robustness for medical images. BMC Medical Informatics Decis. Mak. 22-S(2): 160 (2022) - [c67]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:
Toward Deep Learning Based Access Control. CODASPY 2022: 143-154 - [c66]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Administration of Machine Learning Based Access Control. ESORICS (2) 2022: 189-210 - [c65]Mohammad Nur Nobi, Ram Krishnan, Ravi S. Sandhu:
Adversarial Attacks in Machine Learning Based Access Control. itaDATA 2022: 3-14 - [e5]Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao:
Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings. Communications in Computer and Information Science 1549, Springer 2022, ISBN 978-3-030-97531-9 [contents] - [i10]Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, Ravi S. Sandhu:
Toward Deep Learning Based Access Control. CoRR abs/2203.15124 (2022) - [i9]Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Machine Learning in Access Control: A Taxonomy and Survey. CoRR abs/2207.01739 (2022) - 2021
- [j15]Samir Talegaon, Ram Krishnan:
A Formal Specification of Access Control in Android with URI Permissions. Inf. Syst. Frontiers 23(4): 849-866 (2021) - [j14]Md. Farhan Haque, Ram Krishnan:
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. Inf. Syst. Frontiers 23(4): 883-896 (2021) - [c64]Sherifdeen Lawal, Ram Krishnan:
Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study. BigDataSecurity 2021: 69-74 - [c63]Sherifdeen Lawal, Ram Krishnan:
Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain. COINS 2021: 1-6 - [c62]John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu, Ravi S. Sandhu:
Access Control Policy Generation from User Stories Using Machine Learning. DBSec 2021: 171-188 - [c61]Sherifdeen Lawal, Ram Krishnan:
Attribute-Based Access Control Policy Review in Permissioned Blockchain. SKM 2021: 97-109 - [c60]Randy Klepetko, Ram Krishnan:
Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data. SKM 2021: 130-148 - 2020
- [j13]Sherifdeen Lawal, Ram Krishnan:
Policy Review in Attribute Based Access Control - A Policy Machine Case Study. J. Internet Serv. Inf. Secur. 10(2): 67-81 (2020) - [j12]Samir Talegaon, Ram Krishnan:
Administrative Models for Role Based Access Control in Android. J. Internet Serv. Inf. Secur. 10(3): 31-46 (2020) - [c59]Abdullah S. Al-Alaj, Ram Krishnan, Ravi S. Sandhu:
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions. CIC 2020: 107-116 - [c58]Abdullah S. Al-Alaj, Ravi S. Sandhu, Ram Krishnan:
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions. TPS-ISA 2020: 169-178 - [c57]Samir Talegaon, Ram Krishnan:
Role-Based Access Control Models for Android. TPS-ISA 2020: 179-188 - [i8]Sam Aldrin, Carlos Pignataro, Nagendra Kumar, Ram Krishnan, Anoop Ghanwani:
Service Function Chaining (SFC) Operations, Administration, and Maintenance (OAM) Framework. RFC 8924: 1-20 (2020)
2010 – 2019
- 2019
- [j11]Sebastian A. Nugroho, Ahmad F. Taha, Nikolaos Gatsis, Tyler H. Summers, Ram Krishnan:
Algorithms for joint sensor and control nodes selection in dynamic networks. Autom. 106: 124-133 (2019) - [c56]Abdullah S. Al-Alaj, Ravi S. Sandhu, Ram Krishnan:
A Formal Access Control Model for SE-Floodlight Controller. SDN-NFV@CODASPY 2019: 1-6 - [c55]Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks. DBSec 2019: 381-397 - [c54]Abdullah S. Al-Alaj, Ram Krishnan, Ravi S. Sandhu:
SDN-RBAC: An Access Control Model for SDN Controller Applications. ICCCS 2019: 1-8 - [c53]Randy Klepetko, Ram Krishnan:
Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data. ICCCS 2019: 1-8 - [c52]Shuvra Chakraborty, Ravi S. Sandhu, Ram Krishnan:
On the Feasibility of Attribute-Based Access Control Policy Mining. IRI 2019: 245-252 - [c51]Md. Farhan Haque, Ram Krishnan:
Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence. SKM 2019: 21-37 - [c50]Samir Talegaon, Ram Krishnan:
A Formal Specification of Access Control in Android. SKM 2019: 101-125 - [c49]Shuvra Chakraborty, Ravi S. Sandhu, Ram Krishnan:
On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. SKM 2019: 147-163 - [e4]Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019. ACM 2019, ISBN 978-1-4503-6099-9 [contents] - 2018
- [c48]Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks. IEEE CLOUD 2018: 162-169 - [c47]R. C. Jisha, Ram Krishnan, Varun Vikraman:
Mobile Applications Recommendation Based on User Ratings and Permissions. ICACCI 2018: 1000-1005 - [e3]Ziming Zhao, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita:
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [i7]Sebastian A. Nugroho, Ahmad F. Taha, Nikolaos Gatsis, Tyler H. Summers, Ram Krishnan:
Algorithms for Joint Sensor and Control Nodes Selection in Dynamic Networks. CoRR abs/1811.11792 (2018) - [i6]Anoop Ghanwani, Linda Dunbar, Mike McBride, Vinay Bannai, Ram Krishnan:
A Framework for Multicast in Network Virtualization over Layer 3. RFC 8293: 1-17 (2018) - [i5]Percy Tarapore, Robert Sayko, Greg Shepherd, Toerless Eckert, Ram Krishnan:
Use of Multicast across Inter-domain Peering Points. RFC 8313: 1-44 (2018) - 2017
- [c46]Mahmoud Abdelsalam, Ram Krishnan, Ravi S. Sandhu:
Clustering-Based IaaS Cloud Monitoring. CLOUD 2017: 672-679 - [c45]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Attribute Transformation for Attribute-Based Access Control. ABAC@CODASPY 2017: 1-8 - [c44]Jiwan Ninglekhu, Ram Krishnan:
AARBAC: Attribute-Based Administration of Role-Based Access Control. CIC 2017: 126-135 - [e2]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4910-9 [contents] - [i4]Jiwan Ninglekhu, Ram Krishnan:
Attribute Based Administration of Role Based Access Control : A Detail Description. CoRR abs/1706.03171 (2017) - [i3]Jiwan Ninglekhu, Ram Krishnan:
A Model for Attribute Based Role-Role Assignment (ARRA). CoRR abs/1706.10274 (2017) - 2016
- [j10]Ilsun You, Gansen Zhao, Ram Krishnan:
Special Section on Advanced Technologies for Homeland and Cyber Defense. Intell. Autom. Soft Comput. 22(3): 343-344 (2016) - [j9]Hui Shen, Ram Krishnan, Rocky Slavin, Jianwei Niu:
Sequence Diagram Aided Privacy Policy Specification. IEEE Trans. Dependable Secur. Comput. 13(3): 381-393 (2016) - [c43]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy. ABAC@CODASPY 2016: 1-12 - [c42]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models. DBSec 2016: 122-129 - [c41]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. ICSE 2016: 25-36 - [c40]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
PVDetector: a detector of privacy-policy violations for Android apps. MOBILESoft 2016: 299-300 - [c39]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. ISC 2016: 218-230 - [c38]Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan:
An Attribute-Based Protection Model for JSON Documents. NSS 2016: 303-317 - [e1]Elisa Bertino, Ravi S. Sandhu, Ram Krishnan:
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4079-3 [contents] - 2015
- [j8]Diego R. López, Ram Krishnan:
The NFVRG Network Function Virtualization Research at the IRTF. J. ICT Stand. 3(1): 57-66 (2015) - [j7]Jiwan Ninglekhu, Ram Krishnan, Eugene John, Manoj Panday:
Securing Implantable Cardioverter Defibrillators Using Smartphones. J. Internet Serv. Inf. Secur. 5(2): 47-64 (2015) - [j6]Carlos Vazquez, Ram Krishnan, Eugene John:
Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(3): 87-110 (2015) - [c37]Dilip Krishnaswamy, Ram Krishnan, Diego R. López, Peter Willis, Asif Qamar:
An open NFV and cloud architectural framework for managing application virality behaviour. CCNC 2015: 746-754 - [c36]Navid Pustchi, Ram Krishnan, Ravi S. Sandhu:
Authorization Federation in IaaS Multi Cloud. SCC@ASIACCS 2015: 63-71 - [c35]Yun Zhang, Ram Krishnan, Ravi S. Sandhu:
Secure Information and Resource Sharing in Cloud. CODASPY 2015: 131-133 - [c34]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service. CODASPY 2015: 183-194 - [c33]Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan:
Integrating Attributes into Role-Based Access Control. DBSec 2015: 242-249 - [c32]Ram Krishnan, Jiwan Ninglekhu:
Smartphone-based secure authenticated session sharing in Internet of Personal Things. MOBMU 2015: 941109 - [c31]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling. SACMAT 2015: 63-74 - [c30]Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan:
Attributes Enhanced Role-Based Access Control Model. TrustBus 2015: 3-17 - [i2]Ram Krishnan, Lucy Yong, Anoop Ghanwani, Ning So, Bhumip Khasnabish:
Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks. RFC 7424: 1-29 (2015) - 2014
- [c29]Yun Zhang, Ram Krishnan, Ravi S. Sandhu:
Secure Information and Resource Sharing in Cloud Infrastructure as a Service. WISCS@CCS 2014: 81-90 - [c28]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
Role and attribute based collaborative administration of intra-tenant cloud IaaS. CollaborateCom 2014: 261-274 - [c27]Ram Krishnan, Dilip Krishnaswamy, Dave McDysan:
Behavioral Security Threat Detection Strategies for Data Center Switches and Routers. ICDCS Workshops 2014: 82-87 - [c26]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. NSS 2014: 41-53 - [c25]Dilip Krishnaswamy, Asif Qamar, Ram Krishnan, Krishnakumar Rajagopal, Naveen Narayan, Kamal Bijlani, Kannan M. Moudgalya:
Bringing Knowledge to the Edge with Jnana Edge and Buddhi Edge: Architecture, Implementation, and Future Directions. T4E 2014: 48-51 - 2013
- [j5]Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi S. Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino:
Collaboration in Multicloud Computing Environments: Framework and Security Issues. Computer 46(2): 76-84 (2013) - [c24]Philip W. L. Fong, Pooya Mehregan, Ram Krishnan:
Relational abstraction in community-based secure collaboration. CCS 2013: 585-598 - [c23]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
A framework for risk-aware role based access control. CNS 2013: 462-469 - [c22]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
Reachability analysis for role-based administration of attributes. Digital Identity Management 2013: 73-84 - [c21]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Towards an Attribute Based Constraints Specification Language. SocialCom 2013: 108-113 - 2012
- [c20]Khalid Zaman Bijon, Tahmina Ahmed, Ravi S. Sandhu, Ram Krishnan:
A lattice interpretation of group-centric collaboration with expedient insiders. CollaborateCom 2012: 200-209 - [c19]Khalid Zaman Bijon, Ravi S. Sandhu, Ram Krishnan:
A group-centric model for collaboration with expedient insiders in multilevel systems. CTS 2012: 419-426 - [c18]Xin Jin, Ram Krishnan, Ravi S. Sandhu:
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. DBSec 2012: 41-55 - [c17]Tugba Erpek, Karl Steadman, Ram Krishnan, Qiao Chen:
LTE signal classification and center frequency detection without Priori information. DySPAN 2012: 299-304 - [c16]Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu:
Risk-Aware RBAC Sessions. ICISS 2012: 59-74 - [c15]Xin Jin, Ravi S. Sandhu, Ram Krishnan:
RABAC: Role-Centric Attribute-Based Access Control. MMM-ACNS 2012: 84-96 - [c14]Ram Krishnan, Dilip Krishnaswamy, Asif Qamar, Kamal Bijlani, Kannan M. Moudgalya:
BuddhiEdge: Taking Education to the Edge. T4E 2012: 235-236 - 2011
- [j4]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Group-Centric Secure Information-Sharing Models for Isolated Groups. ACM Trans. Inf. Syst. Secur. 14(3): 23:1-23:29 (2011) - [c13]Ravi S. Sandhu, Khalid Zaman Bijon, Xin Jin, Ram Krishnan:
RT-based administrative models for community cyber security information sharing. CollaborateCom 2011: 473-478 - [c12]Ram Krishnan, Ravi S. Sandhu:
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. ICISS 2011: 102-115 - 2010
- [c11]Ravi S. Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff, Josh Zachry:
Towards a discipline of mission-aware cloud computing. CCSW 2010: 13-18 - [c10]Ravi S. Sandhu, Ram Krishnan, G. B. White:
Towards Secure Information Sharing models for community Cyber Security. CollaborateCom 2010: 1-6 - [c9]Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William H. Winsborough:
Group-Centric Models for Secure and Agile Information Sharing. MMM-ACNS 2010: 55-69
2000 – 2009
- 2009
- [c8]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
A conceptual framework for Group-Centric secure information sharing. AsiaCCS 2009: 384-387 - [c7]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Towards a framework for group-centric secure collaboration. CollaborateCom 2009: 1-10 - [c6]Ram Krishnan, Ravi S. Sandhu:
A Hybrid Enforcement Model for Group-centric Secure Information Sharing. CSE (3) 2009: 189-194 - [c5]Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Foundations for group-centric secure information sharing models. SACMAT 2009: 115-124 - 2008
- [c4]Ram Krishnan, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough:
Stale-safe security properties for group-based secure information sharing. FMSE 2008: 53-62 - 2007
- [c3]Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan:
PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150 - 2002
- [i1]Francois Le Faucheur, Liwen Wu, Bruce Davie, Shahram Davari, Pasi Vaananen, Ram Krishnan, Pierrick Cheval, Juha Heinänen:
Multi-Protocol Label Switching (MPLS) Support of Differentiated Services. RFC 3270: 1-64 (2002)
1990 – 1999
- 1997
- [j3]Ram Krishnan:
Rate-based control schemes for ABR traffic - Design principles and performance comparison. Comput. Networks ISDN Syst. 29(5): 583-593 (1997) - 1993
- [j2]Nicholas F. Maxemchuk, Ram Krishnan:
A Comparison of Linear and Mesh Topologies - DQDB and the Manhattan Street Network. IEEE J. Sel. Areas Commun. 11(8): 1278-1289 (1993) - [j1]Ram Krishnan, Nicholas F. Maxemchuk:
Life beyond linear topologies [MANs]. IEEE Netw. 7(2): 48-54 (1993) - [c2]Ram Krishnan, John A. Silvester:
Choice of Allocation Granularity in Multipath Source Routing Schemes. INFOCOM 1993: 322-329 - [c1]Ram Krishnan, Nicholas F. Maxemchuk:
Is There Life beyond Linear Topologies? A Comparison of DQDB and Manhattan Street Network. INFOCOM 1993: 690-698
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint