


default search action
Habib Ullah Khan
- > Home > Persons > Habib Ullah Khan
Publications
- 2025
- [j94]Shanza Rasham, Habib Ullah Khan
, Fahad Maqbool
, Muhammad Saad Razzaq
, Sajid Anwar, Muhammad Ilyas:
Structured knowledge creation for Urdu language: A DBpedia approach. Expert Syst. J. Knowl. Eng. 42(1) (2025) - [j93]Rafiq Ahmad Khan
, Habib Ullah Khan
, Hathal Salamah Alwageed
, Hussein Al Hashimi
, Ismail Keshta
:
5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach. IEEE Open J. Commun. Soc. 6: 881-925 (2025) - [j92]Habib Ullah Khan, Anwar Hussain, Shah Nazir, Farhad Ali:
AIoT-enabled service prioritization for mobile nodes using enhanced PMIPv6 extension protocol. Peer Peer Netw. Appl. 18(2): 73 (2025) - 2024
- [j91]Habib Ullah Khan
, Muhammad Zain Malik, Shah Nazir:
Identifying the AI-based solutions proposed for restricting Money Laundering in Financial Sectors: Systematic Mapping. Appl. Artif. Intell. 38(1) (2024) - [j90]Muhammad Adil
, Habib Ullah Khan
, Mohammad Arif
, Mian Shah Nawaz
, Faheem Khan
:
New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation. IEEE Access 12: 82972-82983 (2024) - [j89]Habib Ullah Khan
, Muhammad Abbas, Faheem Khan
, Shah Nazir, Adel Binbusayyis
, Abdulatif Alabdultif, Whangbo Taekeun:
Multi-criteria decision-making methods for the evaluation of the social internet of things for the potential of defining human behaviors. Comput. Hum. Behav. 157: 108230 (2024) - [j88]Habib Ullah Khan
, Muhammad Abbas, Omar Alruwaili, Shah Nazir, Muhammad Hameed Siddiqi, Saad Awadh Alanazi:
Selection of a smart and secure education school system based on the internet of things using entropy and TOPSIS approaches. Comput. Hum. Behav. 159: 108346 (2024) - [j85]Yasir Ali, Habib Ullah Khan, Faheem Khan, Yeon-Kug Moon:
Building integrated assessment model for IoT technology deployment in the Industry 4.0. J. Cloud Comput. 13(1): 155 (2024) - [j84]Sulaiman Khan
, Habib Ullah Khan
, Shah Nazir, Bayan Albahooth, Mohammad Arif:
Users Sentiment Analysis Using Artificial Intelligence-Based FinTech Data Fusion in Financial Organizations. Mob. Networks Appl. 29(2): 477-488 (2024) - [j83]Habib Ullah Khan
, Nasir Ali, Shah Nazir, Abdulatif Alabdulatif, Mohammad Arif:
Multi-Criterial Based Feature Selection for Health Care System. Mob. Networks Appl. 29(2): 489-502 (2024) - [j82]Syed Ale Hassan, Shahzad Akbar, Habib Ullah Khan
:
Detection of central serous retinopathy using deep learning through retinal images. Multim. Tools Appl. 83(7): 21369-21396 (2024) - [j81]Habib Ullah Khan, Muhammad Abbas, Shah Nazir, Faheem Khan, Jamil Hussain
:
Optimizing marine vehicles industry: a hybrid analytical hierarchy process and additive ratio assessment approach for evaluating and selecting IoT-based marine vehicles. PeerJ Comput. Sci. 10: e2308 (2024) - [j80]Habib Ullah Khan
, Farhad Ali, Shah Nazir
:
Systematic analysis of software development in cloud computing perceptions. J. Softw. Evol. Process. 36(2) (2024) - [j79]Muhammad Ilyas, Siffat Ullah Khan
, Habib Ullah Khan
, Nasir Rashid:
Software integration model: An assessment tool for global software development vendors. J. Softw. Evol. Process. 36(4) (2024) - [j78]Habib Ullah Khan
, Anwar Hussain, Faheem Khan
, Faiz Abdullah Alotaibi
, Mrim M. Alnfiai
:
An Optimized Location-Based System for the Improvement of E-Commerce Systems. IEEE Trans. Consumer Electron. 70(2): 4998-5006 (2024) - [j77]Habib Ullah Khan
, Waseem Afsar, Shah Nazir, Asra Noor, Mahwish Kundi, Mashael S. Maashi
, Haya Mesfer Alshahrani:
Revolutionizing software developmental processes by utilizing continuous software approaches. J. Supercomput. 80(7): 9579-9608 (2024) - [j76]Habib Ullah Khan, Nasir Ali, Farhad Ali, Shah Nazir:
Transforming future technology with quantum-based IoT. J. Supercomput. 80(15): 22362-22396 (2024) - 2023
- [j75]Habib Ullah Khan
, Muhammad Zain Malik, Shah Nazir, Faheem Khan
:
Utilizing Bio Metric System for Enhancing Cyber Security in Banking Sector: A Systematic Analysis. IEEE Access 11: 80181-80198 (2023) - [j74]Yasir Ali, Habib Ullah Khan
:
A Survey on harnessing the Applications of Mobile Computing in Healthcare during the COVID-19 Pandemic: Challenges and Solutions. Comput. Networks 224: 109605 (2023) - [j72]Habib Ullah Khan
, Anwar Hussain
, Shah Nazir
, Farhad Ali
, Muhammad Zubair Khan
, Inam Ullah:
A Service-Efficient Proxy Mobile IPv6 Extension for IoT Domain. Inf. 14(8): 459 (2023) - [j71]Sangeen Khan
, Sehat Ullah, Habib Ullah Khan
, Inam Ur Rehman
:
Digital-Twins-Based Internet of Robotic Things for Remote Health Monitoring of COVID-19 Patients. IEEE Internet Things J. 10(18): 16087-16098 (2023) - [j70]Yasir Ali, Habib Ullah Khan
, Muhammad Khalid
:
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review. J. Big Data 10(1): 128 (2023) - [j69]Habib Ullah Khan
, Muhammad Sohail
, Shah Nazir, Tariq Hussain
, Babar Shah
, Farman Ali:
Role of authentication factors in Fin-tech mobile transaction security. J. Big Data 10(1): 138 (2023) - [j68]Abdul Rehman Javed
, Muhammad Usman Sarwar
, Saif ur Rehman, Habib Ullah Khan
, Yasser D. Al-Otaibi, Waleed S. Alnumay
:
PP-SPA: Privacy Preserved Smartphone-Based Personal Assistant to Improve Routine Life Functioning of Cognitive Impaired Individuals. Neural Process. Lett. 55(1): 35-52 (2023) - [j67]Habib Ullah Khan
, Muhammad Sohail
, Farhad Ali, Shah Nazir, Yazeed Yasin Ghadi
, Inam Ullah
:
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Phys. Commun. 59: 102084 (2023) - [j66]Habib Ullah Khan
, Shah Nazir
:
Assessing the Role of AI-Based Smart Sensors in Smart Cities Using AHP and MOORA. Sensors 23(1): 494 (2023) - [j65]Sulaiman Khan
, Shah Nazir
, Habib Ullah Khan
:
Analysis of Cursive Text Recognition Systems: A Systematic Literature Review. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(7): 188:1-188:30 (2023) - 2022
- [j64]Rafiq Ahmad Khan
, Siffat Ullah Khan
, Habib Ullah Khan
, Muhammad Ilyas
:
Systematic Literature Review on Security Risks and its Practices in Secure Software Development. IEEE Access 10: 5456-5481 (2022) - [j63]Habib Ullah Khan
, Muhammad Sohail
, Shah Nazir
:
Features-Based IoT Security Authentication Framework Using Statistical Aggregation, Entropy, and MOORA Approaches. IEEE Access 10: 109326-109339 (2022) - [j62]Shahid Rahman, Jamal Uddin
, Habib Ullah Khan
, Hameed Hussain, Ayaz Ali Khan
, Muhammad Zakarya
:
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method. IEEE Access 10: 124053-124075 (2022) - [j61]Yasir Ali, Habib Ullah Khan
:
GTM approach towards engineering a features-oriented evaluation framework for secure authentication in IIoT environment. Comput. Ind. Eng. 168: 108119 (2022) - [j60]Yasir Ali, Habib Ullah Khan
:
Designing evaluation framework for the empirical assessment of COVID-19 mobile apps in Pakistan. Comput. Electr. Eng. 102: 108260 (2022) - [j59]Abdullah Alqahtani
, Habib Ullah Khan
, Shtwai Alsubai
, Mohemmed Sha
, Ahmad S. Almadhor, Tayyab Iqbal, Sidra Abbas:
An efficient approach for textual data classification using deep learning. Frontiers Comput. Neurosci. 16 (2022) - [j58]Shtwai Alsubai
, Habib Ullah Khan
, Abdullah Alqahtani
, Mohemmed Sha
, Sidra Abbas, Uzma Ghulam Mohammad
:
Ensemble deep learning for brain tumor detection. Frontiers Comput. Neurosci. 16 (2022) - [j57]Habib Ullah Khan
, Joy Agbahakhomon Aruya, Asif Qumer Gill
:
Web 2.0 technologies adoption barriers for external contacts and participation: a case study of federal establishment of Africa. Int. J. Bus. Inf. Syst. 39(2): 278-297 (2022) - [j55]Shah Nazir
, Habib Ullah Khan
, Sara Shahzad
, Iván García-Magariño:
Editorial on decision support system for development of intelligent applications. Soft Comput. 26(20): 10547-10551 (2022) - [c9]Muhammad Zain Malik, Sulaiman Khan
, Habib Ullah Khan
:
Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: A Systemic Literture Review of Busniess Sectors. ICAIC 2022: 1-6 - 2021
- [j54]Majid Hussain, Habib Ullah Khan
, Abdul Wahid Khan
, Siffat Ullah Khan
:
Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management From Vendors' Perspective. IEEE Access 9: 8718-8732 (2021) - [j53]Hanif Ur Rahman
, Mushtaq Raza
, Palwasha Afsar
, Mukhtaj Khan
, Nadeem Iqbal
, Habib Ullah Khan
:
Making the Sourcing Decision of Software Maintenance and Information Technology. IEEE Access 9: 11492-11510 (2021) - [j52]Rafiq Ahmad Khan
, Siffat Ullah Khan
, Habib Ullah Khan
, Muhammad Ilyas
:
Systematic Mapping Study on Security Approaches in Secure Software Engineering. IEEE Access 9: 19139-19160 (2021) - [j51]Sulaiman Khan
, Shah Nazir, Habib Ullah Khan
:
Analysis of Navigation Assistants for Blind and Visually Impaired People: A Systematic Review. IEEE Access 9: 26712-26734 (2021) - [j50]Ghulam Jillani Ansari
, Jamal Hussain Shah
, Mylène C. Q. Farias
, Muhammad Sharif
, Nauman Qadeer
, Habib Ullah Khan
:
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm. IEEE Access 9: 54923-54937 (2021) - [j49]Hanif Ur Rahman
, Mushtaq Raza
, Palwasha Afsar
, Habib Ullah Khan
:
Empirical Investigation of Influencing Factors Regarding Offshore Outsourcing Decision of Application Maintenance. IEEE Access 9: 58589-58608 (2021) - [j48]Saeed Ullah Jan
, Fawad Qayum, Habib Ullah Khan
:
Design and Analysis of Lightweight Authentication Protocol for Securing IoD. IEEE Access 9: 69287-69306 (2021) - [j47]Nasir Rashid
, Siffat Ullah Khan
, Habib Ullah Khan
, Muhammad Ilyas
:
Green-Agile Maturity Model: An Evaluation Framework for Global Software Development Vendors. IEEE Access 9: 71868-71886 (2021) - [j46]Ashfaq Ahmad
, Siffat Ullah Khan
, Habib Ullah Khan
, Ghulam Murtaza Khan
, Muhammad Ilyas
:
Challenges and Practices Identification via a Systematic Literature Review in the Adoption of Green Cloud Computing: Client's Side Approach. IEEE Access 9: 81828-81840 (2021) - [j45]Habib Ullah Khan
, Mahmood Niazi
, Mohamed El-Attar, Naveed Ikram, Siffat Ullah Khan
, Asif Qumer Gill
:
Empirical Investigation of Critical Requirements Engineering Practices for Global Software Development. IEEE Access 9: 93593-93613 (2021) - [j44]Jamshed Ahmad, Abdul Wahid Khan
, Habib Ullah Khan
:
Role of Critical Success Factors in Offshore Quality Requirement Change Management Using SLR. IEEE Access 9: 99680-99698 (2021) - [j43]Saeed Ullah Jan
, Habib Ullah Khan
:
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone. IEEE Access 9: 130247-130263 (2021) - [j40]Yongjun Huang, Shah Nazir
, Jiyu Wu
, Fida Hussain Khoso, Farhad Ali
, Habib Ullah Khan
:
An Efficient Decision Support System for the Selection of Appropriate Crowd in Crowdsourcing. Complex. 2021: 5518878:1-5518878:11 (2021) - [j39]Hao Qinxia
, Shah Nazir
, Ma Li, Habib Ullah Khan
, Wang Lianlian, Sultan Ahmad
:
AI-Enabled Sensing and Decision-Making for IoT Systems. Complex. 2021: 6616279:1-6616279:9 (2021) - [j38]Xin Yang
, Shah Nazir
, Habib Ullah Khan
, Muhammad Shafiq
, Neelam Mukhtar:
Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview. Complex. 2021: 6636898:1-6636898:11 (2021) - [j37]Siffat Ullah Khan
, Habib Ullah Khan
, Naeem Ullah, Rafiq Ahmad Khan
:
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach. Secur. Commun. Networks 2021: 1024139:1-1024139:20 (2021) - [j36]Sulaiman Khan
, Habib Ullah Khan
, Shah Nazir
:
Offline Pashto Characters Dataset for OCR Systems. Secur. Commun. Networks 2021: 3543816:1-3543816:7 (2021) - [j35]Asad Ullah, Jing Wang
, Muhammad Shahid Anwar
, Arshad Ahmad
, Shah Nazir
, Habib Ullah Khan
, Zesong Fei:
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition. Secur. Commun. Networks 2021: 6673992:1-6673992:12 (2021) - [j34]Zitian Liao
, Shah Nazir
, Habib Ullah Khan
, Muhammad Shafiq
:
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions. Secur. Commun. Networks 2021: 6677867:1-6677867:22 (2021) - [j33]Deepak Prashar, Nishant Jha
, Muhammad Shafiq
, Nazir Ahmad, Mamoon Rashid
, Shoeib Amin Banday, Habib Ullah Khan
:
Blockchain-Based Automated System for Identification and Storage of Networks. Secur. Commun. Networks 2021: 6694281:1-6694281:7 (2021) - [j32]Hui Xiao
, Shah Nazir
, Han-ming Li, Habib Ullah Khan
, Chengwei Li:
Decision Support System to Risk Stratification in the Acute Coronary Syndrome Using Fuzzy Logic. Sci. Program. 2021: 6571905:1-6571905:9 (2021) - [j31]Muhammad Shah Jahan
, Habib Ullah Khan
, Shahzad Akbar
, Muhammad Umar Farooq
, Sarah Gul
, Anam Amjad
:
Bidirectional Language Modeling: A Systematic Literature Review. Sci. Program. 2021: 6641832:1-6641832:15 (2021) - [j30]Abdul Rehman Javed, Saif Ur Rehman, Mohib Ullah Khan, Mamoun Alazab, Habib Ullah Khan
:
Betalogger: Smartphone Sensor-based Side-channel Attack Detection and Text Inference Using Language Modeling and Dense MultiLayer Neural Network. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(5): 87:1-87:17 (2021) - [j29]Altaf Hussain
, Tariq Hussain
, Farooq Faisal
, Iqtidar Ali, Irshad Khalil, Shah Nazir, Habib Ullah Khan
:
DLSA: Delay and Link Stability Aware Routing Protocol for Flying Ad-hoc Networks (FANETs). Wirel. Pers. Commun. 121(4): 2609-2634 (2021) - 2020
- [j28]Shah Nazir
, Sulaiman Khan
, Habib Ullah Khan
, Shaukat Ali, Iván García-Magariño, Rodziah Binti Atan
, Muhammad Nawaz:
A Comprehensive Analysis of Healthcare Big Data Management, Analytics and Scientific Programming. IEEE Access 8: 95714-95733 (2020) - [j27]Bin Liao
, Yasir Ali, Shah Nazir
, Long He
, Habib Ullah Khan
:
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEE Access 8: 120331-120350 (2020) - [j26]Muhammad Almas Anjum, Javaria Amin, Muhammad Sharif
, Habib Ullah Khan
, Muhammad Sheraz Arshad Malik
, Seifedine Nimer Kadry
:
Deep Semantic Segmentation and Multi-Class Skin Lesion Classification Based on Convolutional Neural Network. IEEE Access 8: 129668-129678 (2020) - [j25]Muhammad Sharif
, Javaria Amin
, Ayesha Siddiqa
, Habib Ullah Khan
, Muhammad Sheraz Arshad Malik
, Muhammad Almas Anjum, Seifedine Nimer Kadry
:
Recognition of Different Types of Leukocytes Using YOLOv2 and Optimized Bag-of-Features. IEEE Access 8: 167448-167459 (2020) - [j24]Hanif Ur Rahman
, Mushtaq Raza
, Palwasha Afsar
, Habib Ullah Khan
, Shah Nazir
:
Analyzing Factors That Influence Offshore Outsourcing Decision of Application Maintenance. IEEE Access 8: 183913-183926 (2020) - [j23]M. Asif Naeem
, Farhaan Mirza
, Habib Ullah Khan
, David Sundaram
, Noreen Jamil, Gerald Weber:
Big Data Velocity Management-From Stream to Warehouse via High Performance Memory Optimized Index Join. IEEE Access 8: 195370-195384 (2020) - [j22]Javaria Amin, Muhammad Sharif
, Muhammad Almas Anjum, Habib Ullah Khan
, Muhammad Sheraz Arshad Malik
, Seifedine Nimer Kadry
:
An Integrated Design for Classification and Localization of Diabetic Foot Ulcer Based on CNN and YOLOv2-DFU Models. IEEE Access 8: 228586-228597 (2020) - [j21]Saad Naeem, Noreen Jamil
, Habib Ullah Khan
, Shah Nazir
:
Complexity of Deep Convolutional Neural Networks in Mobile Computing. Complex. 2020: 3853780:1-3853780:8 (2020) - [j20]Meilian Li, Shah Nazir
, Habib Ullah Khan
, Sara Shahzad, Rohul Amin
:
Modelling Features-Based Birthmarks for Security of End-to-End Communication System. Secur. Commun. Networks 2020: 8852124:1-8852124:9 (2020) - [j19]Arshad Ahmad
, Ayaz Ullah, Chong Feng
, Muzammil Khan
, Shahzad Ashraf
, Muhammad Adnan, Shah Nazir
, Habib Ullah Khan
:
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications. Secur. Commun. Networks 2020: 8867792:1-8867792:10 (2020) - [j18]Luo GuangJun
, Shah Nazir
, Habib Ullah Khan
, Amin Ul Haq
:
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms. Secur. Commun. Networks 2020: 8873639:1-8873639:6 (2020) - [j17]Adnan Tahir
, Fei Chen
, Habib Ullah Khan
, Zhong Ming, Arshad Ahmad
, Shah Nazir
, Muhammad Shafiq
:
A Systematic Review on Cloud Storage Mechanisms Concerning e-Healthcare Systems. Sensors 20(18): 5392 (2020) - [j16]Zitian Liao
, Shah Nazir
, Anwar Hussain, Habib Ullah Khan
, Muhammad Shafiq
:
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions. Sci. Program. 2020: 6647819:1-6647819:14 (2020) - [j15]Chong Feng
, Muhammad Adnan, Arshad Ahmad
, Ayaz Ullah, Habib Ullah Khan
:
Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions. Sci. Program. 2020: 7063681:1-7063681:9 (2020) - [j14]Yingzi Wang
, Muhammad Nazir Jan, Sisi Chu, Yue Zhu, Habib Ullah Khan:
Use of Big Data Tools and Industrial Internet of Things: An Overview. Sci. Program. 2020: 8810634:1-8810634:10 (2020) - [j13]Ju Li
, Muhammad Nazir Jan, Mohammad Faisal
, Habib Ullah Khan:
Big Data, Scientific Programming, and Its Role in Internet of Industrial Things: A Decision Support System. Sci. Program. 2020: 8850096:1-8850096:7 (2020) - [j12]Xiaoqun Liao, Mohammad Faisal
, Qing QingChang
, Amjad Ali, Habib Ullah Khan:
Evaluating the Role of Big Data in IIOT-Industrial Internet of Things for Executing Ranks Using the Analytic Network Process Approach. Sci. Program. 2020: 8859454:1-8859454:7 (2020) - [c8]Asif Qumer Gill
, Ghassan Beydoun
, Mahmood Niazi, Habib Ullah Khan
:
Adaptive Architecture and Principles for Securing the IoT Systems. IMIS 2020: 173-182 - [c7]Madhuri Madhuri, Asif Qumer Gill
, Habib Ullah Khan
:
IoT-Enabled Smart Child Safety Digital System Architecture. ICSC 2020: 166-169 - 2013
- [c2]Habib Ullah Khan
, Shafiq Ahmad
, Mali Abdollahian
:
Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi Arabia. ITNG 2013: 590-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 21:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
