Остановите войну!
for scientists:
default search action
Selvakumar Manickam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Osama M. Dorgham:
Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things. IEEE Access 12: 19860-19871 (2024) - [j52]Mir Sajjad Hussain Talpur, Abdul Ahad Abro, Mansoor Ebrahim, Irfan Ali Kandhro, Selvakumar Manickam, Sham-ul-Arfeen Laghari, Abdulhalim Dandoush, Mueen Uddin:
Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring. IEEE Access 12: 48189-48209 (2024) - [j51]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection. EURASIP J. Inf. Secur. 2024(1): 20 (2024) - [j50]Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam, Samir I. Shaheen, Iznan Husainy Hasbullah:
Neighbor discovery protocol anomaly-based detection system using neural network algorithm. Int. J. Inf. Sec. 23(3): 1787-1803 (2024) - [j49]Ghada Al-Mukhaini, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Ammar Al Momani:
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101866 (2024) - [j48]Irfan Ali Kandhro, Fayyaz Ali, Mueen Uddin, Asadullah Kehar, Selvakumar Manickam:
Exploring aspect-based sentiment analysis: an in-depth review of current methods and prospects for advancement. Knowl. Inf. Syst. 66(7): 3639-3669 (2024) - 2023
- [j47]Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Selvakumar Manickam, Zeyad Ghaleb Al-Mekhlafi, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar:
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks. IEEE Access 11: 18571-18581 (2023) - [j46]Sham-ul-Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Ibrahim Al-Ani, Mahmood A. Al-Shareeda, Shankar Karuppayah:
ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications. IEEE Access 11: 31813-31828 (2023) - [j45]Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammad Adnan Aladaileh, Mohammed Faiz Aboalmaaly, Sham-ul-Arfeen Laghari:
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things. IEEE Access 11: 43019-43040 (2023) - [j44]Mahmood A. Al-Shareeda, Selvakumar Manickam:
A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework. IEEE Access 11: 46218-46228 (2023) - [j43]Hidayat Ullah, Selvakumar Manickam, Muath Obaidat, Sham-ul-Arfeen Laghari, Mueen Uddin:
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions. IEEE Access 11: 69686-69707 (2023) - [j42]Wenhao Li, Selvakumar Manickam, Sham-ul-Arfeen Laghari, Yung-Wey Chong:
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites. IEEE Access 11: 71925-71939 (2023) - [j41]Mueen Uddin, Selvakumar Manickam, Hidayat Ullah, Muath Obaidat, Abdulhalim Dandoush:
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges. IEEE Access 11: 87087-87103 (2023) - [j40]Adnan Hasan Bdair Aighuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Ayman Khallel Ibrahim Al-Ani, Dilovan Asaad Zebari, Hussam J. Mohammed, Mazin Abed Mohammed, Zainab Hussein Arif:
Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm. Comput. Syst. Sci. Eng. 47(1): 553-574 (2023) - [j39]Shafiq Ul Rehman, Selvakumar Manickam, Ahmed Al-Charchafchi:
Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university. Educ. Inf. Technol. 28(6): 7205-7223 (2023) - [j38]Selvakumar Manickam, Shafiq Ul Rehman:
Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices. IET Networks 12(1): 1-8 (2023) - [j37]Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare:
Enhancement of NTSA Secure Communication with One-Time Pad (OTP) in IoT. Informatica (Slovenia) 47(1) (2023) - [j36]Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Salih Alsaffar, Taha H. Rassem:
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing. Sensors 23(7): 3543 (2023) - [j35]Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah:
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking. Sensors 23(9): 4441 (2023) - [c23]Adnan Hasan Bdair Aighuraibawi, Selvakumar Manickam, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Hussam Mohammed Jasim, Nor Samsiah Sani:
Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection. ANT/EDI40 2023: 776-781 - [c22]Harish S. A, Suvrima Datta, Hemanth Kothapalli, Praveen Tammana, Achmad Basuki, Kotaro Kataoka, Selvakumar Manickam, U. Venkanna, Yung-Wey Chong:
Scaling IoT MUD Enforcement using Programmable Data Planes. NOMS 2023: 1-9 - 2022
- [j34]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Peterson Bernabe Cruspe, Ahmed K. Al-Ani, Shankar Karuppayah:
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review. IEEE Access 10: 71632-71655 (2022) - [j33]Ayman Al-Ani, Ahmed K. Al-Ani, Sham-ul-Arfeen Laghari, Selvakumar Manickam, Khin Wee Lai, Khairunnisa Hasikin:
NDPsec: Neighbor Discovery Protocol Security Mechanism. IEEE Access 10: 83650-83663 (2022) - [j32]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum. IEEE Access 10: 118043-118057 (2022) - [j31]Mahmood A. Al-Shareeda, Selvakumar Manickam:
MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks. IEEE Access 10: 120606-120615 (2022) - [j30]Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam, Iznan Husainy Hasbullah:
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. Comput. Syst. Sci. Eng. 40(1): 87-112 (2022) - [j29]Selvakumar Manickam, Riyadh Rahef Nuiaa, Ali Hakem Alsaeedi, Zaid Abdi Alkareem Alyasseri, Mazin Abed Mohammed, Mustafa Musa Jaber:
An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques. IET Networks 11(5): 169-181 (2022) - [j28]Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Omar:
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network. Informatica (Slovenia) 46(9) (2022) - [j27]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks. Sensors 22(5): 1696 (2022) - [j26]Mahmood A. Al Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi:
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors 22(13): 5026 (2022) - [j25]Mahmood A. Al Shareeda, Selvakumar Manickam:
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation. Symmetry 14(8): 1543 (2022) - [j24]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet. Symmetry 14(12): 2483 (2022) - [i6]Mahmood A. Al-Shareeda, Selvakumar Manickam:
Security Methods in Internet of vehicles. CoRR abs/2207.05269 (2022) - [i5]Wong Yan Shen, Selvakumar Manickam, Mahmood A. Al-Shareeda:
Review of Advanced Monitoring Mechanisms in Peer-to-Peer (P2P) Botnets. CoRR abs/2207.12936 (2022) - [i4]Khoh Choon Hwa, Selvakumar Manickam, Mahmood A. Al-Shareeda:
Review of Peer-to-Peer Botnets and Detection Mechanisms. CoRR abs/2207.12937 (2022) - 2021
- [j23]Abdijalil Abdullahi, Selvakumar Manickam, Shankar Karuppayah:
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art. IEEE Access 9: 74499-74509 (2021) - [j22]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Access 9: 113226-113238 (2021) - [j21]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ayman Khalil, Iznan Husainy Hasbullah:
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey. IEEE Access 9: 121522-121531 (2021) - [j20]Sham-ul-Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Ibrahim Al-Ani, Shafiq Ul Rehman, Shankar Karuppayah:
SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape. IEEE Access 9: 154380-154394 (2021) - [j19]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. Sensors 21(24): 8206 (2021) - [c21]Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. ACeS 2021: 248-276 - [c20]Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). ACeS 2021: 401-416 - [c19]Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam:
Intrusion Detection Systems in Fog Computing - A Review. ACeS 2021: 481-504 - [c18]Wu Chia Chuan, Selvakumar Manickam, Yeap Wei Seng, Kevin Yeap Khai Wen:
Enhance Robotic Process Automation Using a Rule-Based Approach. RoViSP 2021: 125-130 - [e3]Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam:
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers. Communications in Computer and Information Science 1347, Springer 2021, ISBN 978-981-33-6834-7 [contents] - [e2]Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar:
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science 1487, Springer 2021, ISBN 978-981-16-8058-8 [contents] - 2020
- [j18]Mahmood Al Shareeda, Mohammed Anbar, Iznan Husainy Hasbullah, Selvakumar Manickam, Sabri M. Hanshi:
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks. IEEE Access 8: 144957-144968 (2020) - [j17]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Ali A. Yassin:
VPPCS: VANET-Based Privacy-Preserving Communication Scheme. IEEE Access 8: 150914-150928 (2020) - [j16]Mahmood Al Shareeda, Mohammed Anbar, Murtadha A. Alazzawi, Selvakumar Manickam, Ahmed Shakir Al-Hiti:
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network. IEEE Access 8: 170507-170518 (2020) - [j15]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network. Symmetry 12(10): 1687 (2020) - [c17]Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam:
A Labeled Transactions-Based Dataset on the Ethereum Network. ACeS 2020: 61-79 - [c16]Nazrool Omar, Selvakumar Manickam:
Rule-Based SLAAC Attack Detection Mechanism. ACeS 2020: 435-449 - [c15]Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti:
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. ACeS 2020: 588-603 - [e1]Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam:
Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers. Communications in Computer and Information Science 1132, Springer 2020, ISBN 978-981-15-2692-3 [contents]
2010 – 2019
- 2019
- [j14]Basim Ahmad Alabsi, Mohammed Anbar, Selvakumar Manickam, Omar E. Elejla:
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation. IET Circuits Devices Syst. 13(6): 748-755 (2019) - [j13]Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammed Faiz Aboalmaaly:
A Brief Review on MQTT's Security Issues within the Internet of Things (IoT). J. Commun. 14(6): 463-469 (2019) - [j12]Abdullah Ahmed Bahashwan, Selvakumar Manickam:
A Brief Review of Messaging Protocol Standards for Internet of Things (IoT). J. Cyber Secur. Mobil. 8(1): 1-14 (2019) - [c14]Parminder Singh, Shafiq Ul Rehman, Selvakumar Manickam:
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment. ACeS 2019: 123-137 - [c13]Hala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam:
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. ACeS 2019: 305-319 - [c12]Ahmed Al-Charchafchi, Selvakumar Manickam, Zakaria N. M. Alqattan:
Threats Against Information Privacy and Security in Social Networks: A Review. ACeS 2019: 358-372 - [i3]Parminder Singh, Shafiq Ul Rehman, Selvakumar Manickam:
Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment. CoRR abs/1905.13447 (2019) - 2018
- [j11]Ahmed K. Al-Ani, Mohammed Anbar, Selvakumar Manickam, Ayman Al-Ani:
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network. J. Commun. 13(6): 317-324 (2018) - [j10]Redhwan M. A. Saad, Mohammed Anbar, Selvakumar Manickam:
Rule-based detection technique for ICMPv6 anomalous behaviour. Neural Comput. Appl. 30(12): 3815-3824 (2018) - 2017
- [j9]Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah:
A Review on Features' Robustness in High Diversity Mobile Traffic Classifications. Int. J. Commun. Networks Inf. Secur. 9(2) (2017) - [j8]Leau Yu Beng, Ali Abdulrazzaq Khudher, Selvakumar Manickam, Samer Al-Salem:
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness. J. Comput. Sci. 13(5): 114-129 (2017) - [c11]Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. ARES 2017: 34:1-34:6 - [c10]Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah:
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification. ICCSCE 2017: 156-161 - 2016
- [c9]Steffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
On the resilience of P2P-based botnet graphs. CNS 2016: 225-233 - 2015
- [j7]Hala Albaroodi, Selvakumar Manickam, Mohammed Anbar:
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift). J. Comput. Sci. 11(3): 590-597 (2015) - [j6]Parminder Singh Bawa, Selvakumar Manickam:
Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques. J. Comput. Sci. 11(7): 855-862 (2015) - 2014
- [j5]Hala Albaroodi, Selvakumar Manickam, Parminder Singh Bawa:
Critical Review of OpenStack Security: Issues and Weaknesses. J. Comput. Sci. 10(1): 23-33 (2014) - [j4]Mohammed Jamil Elhalabi, Selvakumar Manickam, Loai Bani Melhim, Mohammed Anbar, Huda Alhalabi:
A Review of Peer-to-Peer Botnet Detection Techniques. J. Comput. Sci. 10(1): 169-177 (2014) - 2013
- [j3]Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. J. Comput. Sci. 9(4): 421-426 (2013) - [i2]Ammar Almomani, Brij B. Gupta, Tat Chee Wan, Altyeb Altaher, Selvakumar Manickam:
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email. CoRR abs/1302.0629 (2013) - 2012
- [j2]Mohammed Anbar, Ahmed Manasrah, Selvakumar Manickam:
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS). Int. J. Comput. Math. 89(15): 1952-1969 (2012) - [i1]Esraa Alomari, Selvakumar Manickam, Brij B. Gupta, Shankar Karuppayah, Rafeef Alfaris:
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. CoRR abs/1208.0403 (2012)
2000 – 2009
- 2009
- [c8]Doris Hooi-Ten Wong, Selvakumar Manickam, Sureswaran Ramadass, Hussein A. Al Bazar:
Study on Advanced Visualization Tools In Network Monitoring Platform. EMS 2009: 445-449 - 2005
- [c7]Sakthiaseelan Karthigasoo, Yu-N Cheah, Selvakumar Manickam:
A knowledge discovery pipeline for medical decision support using clustering ensemble and neural network ensemble. IADIS AC 2005: 336-343 - [c6]Sakthiaseelan Karthigasoo, Yu-N Cheah, Selvakumar Manickam:
Using ensemble and learning techniques towards extending the knowledge discovery pipeline. ICEIS (2) 2005: 408-411 - 2003
- [c5]Selvakumar Manickam, Leong Wan Sun, Tan Poh Suan:
Internet Mediated, Multi Layer Medical Terminologies Retriever: Towards We-based UMLS Thesauri and Semantic Search Engine. CITA 2003: 106-111 - [c4]Sakthiaseelan Karthigasoo, Selvakumar Manickam, Yu-N Cheah:
An Approach to Analyze Visual Field and Diagnose Glaucoma Progression Using Artificial Neural Network Techniques. ICWI 2003: 861-864 - 2002
- [j1]Syed Sibte Raza Abidi, Selvakumar Manickam:
Leveraging XML-based electronic medical records to extract experiential clinical knowledge: An automated approach to generate cases for medical case-based reasoning systems. Int. J. Medical Informatics 68(1-3): 187-203 (2002) - [c3]Syed Zahid Hassan Zaidi, Syed Sibte Raza Abidi, Selvakumar Manickam:
Distributed Data Mining From Heterogeneous Healthcare Data Repositories: Towards an Intelligent Agent-Based Framework. CBMS 2002: 339-342 - 2001
- [c2]Syed Sibte Raza Abidi, Selvakumar Manickam:
Augmenting Medical Case Base Reasoning Systems with Clinical Knowledge Derived from Heterogeneous Electronic Patient Records. CBMS 2001: 421-426 - [c1]Selvakumar Manickam, Syed Sibte Raza Abidi:
Extracting Clinical Cases from XML-Based Electronic Patient Records for Use in Web-based Medical Case Based Reasoning Systems. MedInfo 2001: 643-647
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint