


default search action
Andrew P. Martin
Person information
- affiliation: University of Oxford, UK
- affiliation: University of Queensland, Department of Computer Science
Other persons with the same name
- Andrew Martin — disambiguation page
- Andrew Martin 0001 — University of Warwick, Business School, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Steve Moyle, Andrew P. Martin, Nicholas Allott:
XAI Human-Machine collaboration applied to network security. Frontiers Comput. Sci. 6 (2024) - [c72]Steven Furnell
, Xavier Carpent
, Andrew Martin
:
Assessing the Cross-Disciplinary Accessibility of CyBOK. World Conference on Information Security Education 2024: 165-179 - [i15]Vadim Safronov, Ionut Bostan, Nicholas Allott, Andrew Martin:
How Memory-Safe is IoT? Assessing the Impact of Memory-Protection Solutions for Securing Wireless Gateways. CoRR abs/2411.01377 (2024) - 2023
- [c71]George Chalhoub
, Andrew Martin
:
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. EuroUSEC 2023: 277-295 - 2022
- [j24]Yudhistira Nugraha
, Andrew Martin
:
Cybersecurity service level agreements: understanding government data confidentiality requirements. J. Cybersecur. 8(1) (2022) - [c70]Anjuli R. K. Shere, Jason R. C. Nurse, Andrew Martin:
Threats to Journalists from the Consumer Internet of Things. Cyber Science 2022: 303-326 - [c69]Kubilay Ahmet Küçük
, Steve Moyle
, Andrew Martin
, Alexandru Mereacre
, Nicholas Allott
:
SoK: How Not to Architect Your Next-Generation TEE Malware? HASP@MICRO 2022: 35-44 - [c68]Andikan Otung
, Andrew P. Martin:
Towards Comparative Evaluation of DDoS Defences. SIN 2022: 1-10 - [i14]Kubilay Ahmet Küçük, Steve Moyle, Andrew Martin, Alexandru Mereacre, Nicholas Allott:
SoK: How Not to Architect Your Next-Generation TEE Malware? CoRR abs/2210.06792 (2022) - 2021
- [j23]Yudhistira Nugraha, Andrew Martin
:
Towards a framework for trustworthy data security level agreement in cloud procurement. Comput. Secur. 106: 102266 (2021) - [i13]Kubilay Ahmet Küçük
, Andrew Martin:
CRC: Fully General Model of Confidential Remote Computing. CoRR abs/2104.03868 (2021) - 2020
- [j22]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin
:
Exploring HTTPS security inconsistencies: A cross-regional perspective. Comput. Secur. 97: 101975 (2020) - [c67]Andikan Otung
, Andrew P. Martin:
Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation Architecture. ICISSP 2020: 619-630 - [i12]Eman Salem Alashwali, Pawel Szalachowski, Andrew P. Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. CoRR abs/2010.10170 (2020) - [i11]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective. IACR Cryptol. ePrint Arch. 2020: 79 (2020)
2010 – 2019
- 2019
- [j21]Olusola Akinrolabu
, Jason R. C. Nurse, Andrew P. Martin, Steve New:
Cyber risk assessment in cloud provider environments: Current models and future needs. Comput. Secur. 87 (2019) - [j20]Olusola Akinrolabu
, Steve New
, Andrew Martin
:
CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers. Comput. 8(3): 66 (2019) - [j19]Pardeep Kumar
, Yun Lin
, Guangdong Bai
, Andrew Paverd
, Jin Song Dong, Andrew P. Martin
:
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues. IEEE Commun. Surv. Tutorials 21(3): 2886-2927 (2019) - [j18]Kubilay Ahmet Küçük
, David Grawrock, Andrew Martin:
Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves. EURASIP J. Inf. Secur. 2019: 14 (2019) - [j17]Pardeep Kumar
, Andrei V. Gurtov
, Mangal Sain
, Andrew P. Martin
, Phuong Hoai Ha
:
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks. IEEE Trans. Smart Grid 10(4): 4349-4359 (2019) - [c66]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? ARES 2019: 23:1-23:7 - [c65]Olusola Akinrolabu, Steve New
, Andrew Martin:
Assessing the Security Risks of Multicloud SaaS Applications: A Real-World Case Study. CSCloud/EdgeCom 2019: 81-88 - [c64]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. SecureComm (1) 2019: 341-364 - [i10]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? CoRR abs/1906.06505 (2019) - [i9]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. CoRR abs/1907.00231 (2019) - [i8]Zhaoming Yin, Anbang Ruan, Ming Wei, Huafeng Li, Kai Yuan, Junqing Wang, Yahui Wang, Ming Ni, Andrew P. Martin:
StreamNet: A DAG System with Streaming Graph Computing. CoRR abs/1908.06405 (2019) - [i7]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Towards Forward Secure Internet Traffic. IACR Cryptol. ePrint Arch. 2019: 821 (2019) - [i6]Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Does "www." Mean Better Transport Layer Security? IACR Cryptol. ePrint Arch. 2019: 941 (2019) - 2018
- [j16]Olusola Akinrolabu, Steve New, Andrew Martin:
Cyber Supply Chain Risks in Cloud Computing - Bridging the Risk Assessment Gap. Open J. Cloud Comput. 5(1): 1-19 (2018) - [c63]Olusola Akinrolabu, Steve New, Andrew Martin:
CSCCRA: A Novel Quantitative Risk Assessment Model for Cloud Service Providers. EMCIS 2018: 177-184 - 2017
- [j15]Ahmad Atamli-Reineh, Andrew Paverd
, Giuseppe Petracca, Andrew P. Martin:
A framework for application partitioning using trusted execution environments. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j14]Wattana Viriyasitavat
, Andrew Martin:
The reviews and analysis of the state-of-the-art service workflow specification languages. J. Ind. Inf. Integr. 8: 1-7 (2017) - [j13]Anbang Ruan, Andrew P. Martin:
RepCloud: Attesting to Cloud Service Dependency. IEEE Trans. Serv. Comput. 10(5): 675-688 (2017) - [c62]Yudhistira Nugraha
, Andrew Martin:
Towards the Classification of Confidentiality Capabilities in Trustworthy Service Level Agreements. IC2E 2017: 304-310 - [c61]Yudhistira Nugraha
, Andrew Martin:
Investigating Security Capabilities in Service Level Agreements as Trust-Enhancing Instruments. IFIPTM 2017: 57-75 - [c60]Ranjbar A. Balisane, Ravishankar Borgaonkar, Ahmad Atamli-Reineh, Andrew Martin:
Architectures for Enhancing Authentication Privacy and Security using Trusted Computing. SysTEX@SOSP 2017: 10:1-10:7 - [c59]Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert:
White-Stingray: Evaluating IMSI Catchers Detection Applications. WOOT 2017 - [i5]Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A case study using SGX. CoRR abs/1706.03006 (2017) - 2016
- [c58]Anbang Ruan, Ming Wei, Andrew P. Martin, David Blundell
, David Wallom
:
Breaking Down the Monarchy: Achieving Trustworthy and Open Cloud Ecosystem Governance with Separation-of-Powers. CLOUD 2016: 505-512 - [c57]Jason R. C. Nurse, Ahmad Atamli, Andrew P. Martin:
Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home. HCI (20) 2016: 255-267 - [c56]Kubilay Ahmet Küçük
, Andrew Paverd
, Andrew Martin, N. Asokan
, Andrew Simpson
, Robin Ankele:
Exploring the use of Intel SGX for Secure Many-Party Applications. SysTEX@Middleware 2016: 5:1-5:6 - [c55]Ahmad Atamli-Reineh, Ravishankar Borgaonkar, Ranjbar A. Balisane, Giuseppe Petracca, Andrew P. Martin:
Analysis of Trusted Execution Environment usage in Samsung KNOX. SysTEX@Middleware 2016: 7:1-7:6 - [c54]Robin Ankele, Kubilay Ahmet Küçük
, Andrew Martin, Andrew Simpson
, Andrew Paverd
:
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 414-422 - [i4]Ahmad Atamli-Reineh, Andrew J. Paverd, Andrew P. Martin:
Trustworthy and Secure Service-Oriented Architecture for the Internet of Things. CoRR abs/1606.01671 (2016) - [i3]Ahmad Atamli-Reineh, Giuseppe Petracca, Janne Uusilehto, Andrew P. Martin:
Enabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices. CoRR abs/1606.02995 (2016) - 2015
- [c53]Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew P. Martin:
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach. CLOUD 2015: 556-563 - [c52]Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh
, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. CSCloud 2015: 382-389 - [c51]Deepak K. Tosh
, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, Andrew P. Martin
:
An evolutionary game-theoretic framework for cyber-threat information sharing. ICC 2015: 7341-7346 - [c50]Andrew C. Simpson
, Andrew P. Martin
, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c49]Ahmad Atamli-Reineh, Andrew P. Martin:
Securing Application with Software Partitioning: A Case Study Using SGX. SecureComm 2015: 605-621 - [c48]Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, Kevin A. Kwiat:
On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. UCC 2015: 217-226 - [i2]Nalin Asanka Gamagedara Arachchilage, Andrew P. Martin:
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation. CoRR abs/1511.04541 (2015) - [i1]Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew P. Martin:
Developing a Trust Domain Taxonomy for Securely Sharing Information Among Others. CoRR abs/1512.06307 (2015) - 2014
- [c47]Guangdong Bai
, Jianan Hao, Jianliang Wu, Yang Liu
, Zhenkai Liang
, Andrew P. Martin
:
TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms. FM 2014: 110-126 - [c46]Nalin Asanka Gamagedara Arachchilage, Andrew P. Martin:
A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation. HAISA 2014: 53-68 - [c45]Anbang Ruan, Andrew P. Martin:
NeuronVisor: Defining a Fine-Grained Cloud Root-of-Trust. INTRUST 2014: 184-200 - [c44]Ahmad Atamli, Andrew P. Martin
:
Threat-Based Security Analysis for the Internet of Things. SIoT 2014: 35-43 - [c43]Andrew J. Paverd
, Andrew P. Martin
, Ian Brown:
Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing. SmartGridComm 2014: 872-877 - [c42]Andrew J. Paverd
, Andrew P. Martin
, Ian Brown:
Security and Privacy in Smart Grid Demand Response Systems. SmartGridSec 2014: 1-15 - [c41]Justin King-Lacroix, Andrew P. Martin
:
KEDS: Decentralised Network Security for the Smart Home Environment. SmartGridSec 2014: 63-78 - [e3]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - 2013
- [c40]Nalin Asanka Gamagedara Arachchilage
, Cornelius Namiluko, Andrew P. Martin
:
A taxonomy for securely sharing information among others in a trust domain. ICITST 2013: 296-304 - 2012
- [j12]Wattana Viriyasitavat
, Andrew P. Martin
:
A Survey of Trust in Workflows and Relevant Contexts. IEEE Commun. Surv. Tutorials 14(3): 911-940 (2012) - [j11]Wattana Viriyasitavat
, Li Da Xu, Andrew P. Martin
:
SWSpec: The Requirements Specification Language in Service Workflow Environments. IEEE Trans. Ind. Informatics 8(3): 631-638 (2012) - [j10]Li Da Xu, Wattana Viriyasitavat
, Puripant Ruchikachorn, Andrew P. Martin
:
Using Propositional Logic for Requirements Verification of Service Workflow. IEEE Trans. Ind. Informatics 8(3): 639-646 (2012) - [c39]John Lyle, Shamal Faily, Ivan Flechais, André Paul, Ayse Göker
, Hans I. Myrhaug, Heiko Desruelle, Andrew P. Martin
:
On the Design and Development of webinos: A Distributed Mobile Application Middleware. DAIS 2012: 140-147 - [c38]Anbang Ruan, Andrew P. Martin
:
TMR: Towards a Trusted MapReduce Infrastructure. SERVICES 2012: 141-148 - [c37]Andrew J. Paverd
, Andrew P. Martin
:
Hardware Security for Device Authentication in the Smart Grid. SmartGridSec 2012: 72-84 - [c36]Andrew P. Martin, John Lyle, Cornelius Namiluko:
Provenance as a Security Control. TaPP 2012 - [c35]Cornelius Namiluko, Andrew P. Martin
:
Provenance-Based Model for Verifying Trust-Properties. TRUST 2012: 255-272 - [c34]David Wallom
, Matteo Turilli
, Andrew P. Martin
, Anbang Ruan, Gareth A. Taylor
, Nigel Hargreaves, Alan McMoran:
myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management. WICSA/ECSA Companion Volume 2012: 82-83 - 2011
- [j9]Steve Bannerman
, Andrew P. Martin
:
A multiple comparative study of test-with development product changes and their effects on team speed and product quality. Empir. Softw. Eng. 16(2): 177-210 (2011) - [j8]Jun Ho Huh, John Lyle, Cornelius Namiluko, Andrew P. Martin
:
Managing application whitelists in trusted distributed systems. Future Gener. Comput. Syst. 27(2): 211-226 (2011) - [j7]Imad M. Abbadi, Andrew P. Martin
:
Trust in the Cloud. Inf. Secur. Tech. Rep. 16(3-4): 108-114 (2011) - [c33]Anbang Ruan, Andrew P. Martin
:
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems. STC@CCS 2011: 3-14 - [c32]Jun Ho Huh, Hyoungshick Kim, John Lyle, Andrew P. Martin
:
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting. STC@CCS 2011: 31-36 - [c31]David Wallom
, Matteo Turilli
, Andrew P. Martin
, Anbang Ruan, Gareth A. Taylor
, Nigel Hargreaves, Alan McMoran:
myTrustedCloud: Trusted Cloud Infrastructure for Security-critical Computation and Data Managment. CloudCom 2011: 247-254 - [c30]Wattana Viriyasitavat, Andrew P. Martin:
Formalizing Trust Requirements and Specification in Service Workflow Environments. ICEIS (3) 2011: 196-206 - [c29]Imad M. Abbadi, Cornelius Namiluko, Andrew P. Martin:
Insiders analysis in Cloud computing focusing on home healthcare system. ICITST 2011: 350-357 - [c28]Cornelius Namiluko, Jun Ho Huh, Andrew P. Martin:
Verifying Trustworthiness of Virtual Appliances in Collaborative Environments. TRUST 2011: 1-15 - [c27]Imad M. Abbadi, Muntaha Alawneh, Andrew P. Martin
:
Secure Virtual Layer Management in Clouds. TrustCom 2011: 99-110 - [p1]Jun Ho Huh, Andrew P. Martin:
Trustworthy Distributed Systems Through Integrity-Reporting. Guide to e-Science 2011: 265-297 - 2010
- [j6]Chunqing Chen, Jin Song Dong, Jun Sun
, Andrew P. Martin
:
A verification system for interval-based specification languages. ACM Trans. Softw. Eng. Methodol. 19(4): 13:1-13:36 (2010) - [c26]Andrew P. Martin
, Jim Davies
, Steve Harris
:
Towards a Framework for Security in eScience. eScience 2010: 230-237 - [c25]Wattana Viriyasitavat
, Andrew P. Martin
:
Formal Trust Specification in Service Workflows. EUC 2010: 703-710 - [c24]Cornelius Namiluko, Andrew P. Martin
:
An Abstract Model of a Trusted Platform. INTRUST 2010: 47-66 - [c23]John Lyle, Andrew P. Martin:
Trusted Computing and Provenance: Better Together. TaPP 2010 - [c22]John Lyle, Andrew P. Martin
:
Engineering Attestable Services. TRUST 2010: 257-264
2000 – 2009
- 2009
- [c21]John Lyle, Andrew P. Martin
:
On the Feasibility of Remote Attestation for Web Services. CSE (3) 2009: 283-288 - [c20]Jun Ho Huh, Andrew P. Martin
:
Towards a Trustable Virtual Organisation. ISPA 2009: 425-431 - [e2]Liqun Chen, Chris J. Mitchell
, Andrew P. Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2 [contents] - 2007
- [j5]Andrew P. Martin
, Po-Wah Yau:
Grid security: Next steps. Inf. Secur. Tech. Rep. 12(3): 113-122 (2007) - 2006
- [c19]Andrew Cooper, Andrew P. Martin
:
Towards a Secure, Tamper-Proof Grid Platform. CCGRID 2006: 373-380 - [c18]Andrew Cooper, Andrew P. Martin
:
Towards an open, trusted digital rights management platform. Digital Rights Management Workshop 2006: 79-88 - [c17]David Spence, Neil Geddes, Jens Jensen, Andrew Richards, Matthew Viljoen, Andrew P. Martin
, Matthew J. Dovey, Mark Norman, Kang Tang, Anne E. Trefethen, David Wallom
, Rob Allan, David Meredith:
ShibGrid: Shibboleth Access for the UK National Grid Service. e-Science 2006: 75 - [c16]Wenbo Mao, Andrew P. Martin
, Hai Jin, Huanguo Zhang:
Innovations for Grid Security from Trusted Computing. Security Protocols Workshop 2006: 132-149 - [e1]Alvaro Arenas, Jin Song Dong, Andrew Martin, Brian Matthews:
Proceedings of the International Workshop on Web Languages and Formal Methods, WLFM@FM 2005, Newcastle upon Tyne, UK, July 19, 2005. Electronic Notes in Theoretical Computer Science 151(2), Elsevier 2006 [contents] - 2005
- [j4]Howard Chivers, Andrew P. Martin
:
Editorial. Softw. Pract. Exp. 35(9): 799-800 (2005) - [c15]Alvaro E. Arenas, Jin Song Dong, Andrew P. Martin
, Brian Matthews
:
Preface. WLFM@FM 2005: 1 - [c14]Lee Momtahan, Andrew P. Martin
, A. W. Roscoe:
A Taxonomy of Web Services Using CSP. WLFM@FM 2005: 71-87 - 2004
- [c13]Jim Davies, Andrew Simpson
, Andrew P. Martin:
Teaching Formal Methods in Context. TFM 2004: 185-202 - [c12]Dave Stainforth, Andrew P. Martin, Andrew Simpson
, Carl Christensen, Jamie Kettleborough, Tolu Aina, Myles Allen:
Security Principles for Public-Resource Modeling Research. WETICE 2004: 319-324 - 2003
- [c11]Andrew P. Martin
, Andrew Simpson
:
Generalising the Z Schema Calculus: Database Schemas and Beyond. APSEC 2003: 28-37 - [c10]Andrew Simpson
, Andrew P. Martin
, Jeremy Gibbons, Jim Davies, Steve McKeever:
On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects. ICSE 2003: 628-633 - [c9]Mark Utting
, Ian Toyn, Jing Sun, Andrew P. Martin
, Jin Song Dong, Nicholas Daley, David W. Currie:
ZML: XML Support for Standard Z. ZB 2003: 437-456 - 2002
- [c8]Lee Momtahan, Andrew P. Martin
:
e-Science Experiences: Software Engineering Practice and the EU DataGrid. APSEC 2002: 269-275 - [c7]Dave Stainforth, Jamie Kettleborough, Andrew P. Martin, Andrew Simpson, R. Gillis, A. Akkas, R. Gault, Mat Collins, David Gavaghan, Myles Allen:
Climateprediction.net: Design Principles for Publicresource Modeling Research. IASTED PDCS 2002: 32-38 - 2001
- [c6]Andrew P. Martin
, Colin J. Fidge
:
Lifting in Z. CATS 2001: 197-219 - 2000
- [j3]Andrew P. Martin:
Relating Z and First-Order Logic. Formal Aspects Comput. 12(3): 199-209 (2000) - [j2]S. M. Brien, Andrew P. Martin
:
A Calculus for Schemas in Z. J. Symb. Comput. 30(1): 63-91 (2000)
1990 – 1999
- 1999
- [c5]Andrew P. Martin:
Relating Z and First-Order Logic. World Congress on Formal Methods 1999: 1266-1280 - 1998
- [c4]Colin J. Fidge, Ian J. Hayes
, Andrew P. Martin, Axel Wabenhorst:
A Set-Theoretic Model for Real-Time Specification and Reasoning. MPC 1998: 188-206 - 1997
- [c3]Owen Traynor, Daniel Hazel, Peter Kearney, Andrew P. Martin, Ray Nickson, Luke Wildman:
The Cogito Development System. AMAST 1997: 586-591 - [c2]Jon G. Hall, Andrew P. Martin:
W Reconstructed. ZUM 1997: 115-134 - 1996
- [j1]Andrew P. Martin, Paul H. B. Gardiner, Jim Woodcock
:
A Tactic Calculus-Abridged Version. Formal Aspects Comput. 8(4): 479-489 (1996) - 1993
- [c1]Andrew P. Martin:
Encoding W: A Logic for Z in 2OBJ. FME 1993: 462-481
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint