default search action
Krzysztof Szczypiorski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j41]Jedrzej Bieniasz, Patryk Bak, Krzysztof Szczypiorski:
StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments. IEEE Access 10: 88354-88370 (2022) - [c29]Mateusz Nosek, Krzysztof Szczypiorski:
An Evaluation of Meltdown Vulnerability. icWCSN 2022: 35-41 - [c28]Michal Szaknis, Krzysztof Szczypiorski:
The design of the simple SMM rootkit. icWCSN 2022: 47-56 - [c27]Slawomir Kuklinski, Krzysztof Szczypiorski, Konrad S. Wrona, Jedrzej Bieniasz:
5G-Enabled Defence-in-Depth for Multi-domain Operations. MILCOM 2022: 1024-1029
2010 – 2019
- 2019
- [j40]Jedrzej Bieniasz, Krzysztof Szczypiorski:
Methods for Information Hiding in Open Social Networks. J. Univers. Comput. Sci. 25(2): 74-97 (2019) - [j39]Jedrzej Bieniasz, Monika Stepkowska, Artur Janicki, Krzysztof Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels. J. Univers. Comput. Sci. 25(9): 1109-1130 (2019) - [c26]Jacques Blanc-Talon, Krzysztof Szczypiorski:
Preface. ICFSP 2019: vi - 2018
- [j38]Grzegorz J. Blinowski, Piotr Januszewski, Grzegorz Stepniak, Krzysztof Szczypiorski:
LuxSteg: First Practical Implementation of Steganography in VLC. IEEE Access 6: 74366-74375 (2018) - [j37]Waldemar Graniszewski, Jacek Krupski, Krzysztof Szczypiorski:
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP. J. Univers. Comput. Sci. 24(7): 864-891 (2018) - [j36]Krzysztof Szczypiorski, Liqiang Wang, Xiangyang Luo, Dengpan Ye:
Big Data Analytics for Information Security. Secur. Commun. Networks 2018: 7657891:1-7657891:2 (2018) - [c25]Jedrzej Bieniasz, Krzysztof Szczypiorski:
Towards Empowering Cyber Attack Resiliency Using Steganography. ICFSP 2018: 24-28 - [c24]Patryk Bak, Jedrzej Bieniasz, Michal Krzeminski, Krzysztof Szczypiorski:
Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication. ICFSP 2018: 34-38 - [i41]Mihaela Todorova, Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov:
SHAH: Hash Function based on Irregularly Decimated Chaotic Map. CoRR abs/1808.01956 (2018) - 2017
- [j35]Grzegorz J. Blinowski, Krzysztof Szczypiorski:
Steganography in VLC Systems. J. Univers. Comput. Sci. 23(5): 454-478 (2017) - [c23]Krzysztof Szczypiorski, Wojciech Zydecki:
Steglbiza: Steganography in club music implemented in Python. ICFSP 2017: 35-38 - [c22]Jedrzej Bieniasz, Krzysztof Szczypiorski:
SocialStegDisc: Application of steganography in social networks to create a file system. ICFSP 2017: 76-80 - [e1]Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2 [contents] - [i40]Borislav Stoyanov, Krzysztof Szczypiorski, Krasimir Kordov:
Yet Another Pseudorandom Number Generator. CoRR abs/1702.07502 (2017) - [i39]Krzysztof Szczypiorski, Wojciech Zydecki:
StegIbiza: Steganography in Club Music Implemented in Python. CoRR abs/1705.07788 (2017) - [i38]Jedrzej Bieniasz, Krzysztof Szczypiorski:
SocialStegDisc: Application of steganography in social networks to create a file system. CoRR abs/1706.09641 (2017) - 2016
- [j34]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: information hiding for Skype video traffic. Multim. Tools Appl. 75(21): 13521-13540 (2016) - [j33]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Steganography in IEEE 802.11 OFDM symbols. Secur. Commun. Networks 9(2): 118-129 (2016) - [j32]Wojciech Mazurczyk, Krzysztof Szczypiorski, Artur Janicki, Hui Tian:
Trends in modern information hiding: techniques, applications, and detection. Secur. Commun. Networks 9(8): 703-704 (2016) - [j31]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On importance of steganographic cost for network steganography. Secur. Commun. Networks 9(8): 781-790 (2016) - [j30]Wojciech Mazurczyk, Krzysztof Szczypiorski, Zoran Duric, Dengpan Ye:
Cyber Crime. Secur. Commun. Networks 9(15): 2861-2863 (2016) - [j29]Wojciech Fraczek, Krzysztof Szczypiorski:
Perfect undetectability of network steganography. Secur. Commun. Networks 9(15): 2998-3010 (2016) - [j28]Wojciech Mazurczyk, Thomas Holt, Krzysztof Szczypiorski:
Guest Editors' Introduction: Special Issue on Cyber Crime. IEEE Trans. Dependable Secur. Comput. 13(2): 146-147 (2016) - [c21]Krzysztof Szczypiorski:
StegIbiza: New method for information hiding in club music. ICFSP 2016: 20-24 - [c20]Krzysztof Szczypiorski, Piotr Smietanka, Djamel Khadraoui, Marcin Seredynski:
Security framework with active defence system for vehicular ad hoc networks. ICFSP 2016: 121-125 - [c19]Jedrzej Bieniasz, Piotr Sapiecha, Milosz Smolarczyk, Krzysztof Szczypiorski:
Towards model-based anomaly detection in network communication protocols. ICFSP 2016: 126-130 - [i37]Krzysztof Szczypiorski:
StegIbiza: New Method for Information Hiding in Club Music. CoRR abs/1608.02988 (2016) - [i36]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski, Artur Janicki:
YouSkyde: Information Hiding for Skype Video Traffic. CoRR abs/1608.07337 (2016) - [i35]Krzysztof Szczypiorski, Tomasz Tyl:
MoveSteg: A Method of Network Steganography Detection. CoRR abs/1610.01955 (2016) - [i34]Krzysztof Szczypiorski:
StegHash: New Method for Information Hiding in Open Social Networks. CoRR abs/1611.00306 (2016) - 2015
- [j27]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad and The Ugly": Evaluation of Wi-Fi Steganography. J. Commun. 10(10): 747-752 (2015) - [j26]Artur Janicki, Krzysztof Szczypiorski:
Why Do Older Adults Prefer Some Radio Stations? Helping to Increase Speech Understanding. J. Commun. 10(11): 926-931 (2015) - [j25]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
On the undetectability of transcoding steganography. Secur. Commun. Networks 8(18): 3804-3814 (2015) - [j24]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of speech codecs selection on transcoding steganography. Telecommun. Syst. 59(3): 305-315 (2015) - [c18]Wojciech Fraczek, Krzysztof Szczypiorski:
Steg Blocks: Ensuring Perfect Undetectability of Network Steganography. ARES 2015: 436-441 - [c17]Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj:
Using Facebook for Image Steganography. ARES 2015: 442-447 - [c16]Piotr Smietanka, Krzysztof Szczypiorski, Francesco Viti, Marcin Seredynski:
Distributed Automated Vehicle Location (AVL) System Based on Connected Vehicle Technology. ITSC 2015: 1946-1951 - [i33]Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj:
Using Facebook for Image Steganography. CoRR abs/1506.02071 (2015) - [i32]Wojciech Fraczek, Krzysztof Szczypiorski:
StegBlocks: ensuring perfect undetectability of network steganography. CoRR abs/1506.02311 (2015) - [i31]Krzysztof Szczypiorski, Artur Janicki, Steffen Wendzel:
"The Good, The Bad And The Ugly": Evaluation of Wi-Fi Steganography. CoRR abs/1508.04978 (2015) - 2014
- [j23]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian:
Network forensics and challenges for cybersecurity. Ann. des Télécommunications 69(7-8): 345-346 (2014) - [j22]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of transcoding steganography. Ann. des Télécommunications 69(7-8): 449-460 (2014) - [j21]Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Trends in steganography. Commun. ACM 57(3): 86-95 (2014) - [j20]Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Principles and overview of network steganography. IEEE Commun. Mag. 52(5): 225-229 (2014) - [j19]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Advances in digital media security and right management. Multim. Syst. 20(2): 101-103 (2014) - [j18]Wojciech Mazurczyk, Pawel Szaga, Krzysztof Szczypiorski:
Using transcoding for hidden communication in IP telephony. Multim. Tools Appl. 70(3): 2139-2165 (2014) - [j17]Wojciech Mazurczyk, Józef Lubacz, Krzysztof Szczypiorski:
On steganography in lost audio packets. Secur. Commun. Networks 7(12): 2602-2615 (2014) - [c15]Marcin Seredynski, Patricia Ruiz, Krzysztof Szczypiorski, Djamel Khadraoui:
Improving Bus Ride Comfort Using GLOSA-Based Dynamic Speed Optimisation. IPDPS Workshops 2014: 457-463 - [c14]Iwona Grabska, Krzysztof Szczypiorski:
Steganography in Long Term Evolution Systems. IEEE Symposium on Security and Privacy Workshops 2014: 92-99 - [c13]Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Improving Hard Disk Contention-Based Covert Channel in Cloud Computing. IEEE Symposium on Security and Privacy Workshops 2014: 100-107 - [i30]Bartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Improving Hard Disk Contention-based Covert Channel in Cloud Computing Environment. CoRR abs/1402.0239 (2014) - [i29]Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares, Krzysztof Szczypiorski:
On Importance of Steganographic Cost For Network Steganography. CoRR abs/1406.2519 (2014) - 2013
- [j16]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski:
SkyDe: a Skype-based Steganographic Method. Int. J. Comput. Commun. Control 8(3): 432-443 (2013) - [j15]Wojciech Mazurczyk, Krzysztof Szczypiorski, Hui Tian, Yali Liu:
Trends in modern information hiding: techniques, applications and detection. Secur. Commun. Networks 6(11): 1414-1415 (2013) - [j14]Michal Pióro, Jacek Rak, Krzysztof Szczypiorski:
Networks for the e-society. Telecommun. Syst. 52(2): 931-933 (2013) - [j13]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
PadSteg: introducing inter-protocol steganography. Telecommun. Syst. 52(2): 1101-1111 (2013) - [j12]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
On information hiding in retransmissions. Telecommun. Syst. 52(2): 1113-1121 (2013) - [c12]Marcin Seredynski, Riad Aggoune, Wojciech Mazurczyk, Krzysztof Szczypiorski, Djamel Khadraoui:
Vehicular ad hoc networks for joint traffic and mobility management. ICUMT 2013: 7-12 - [c11]Szymon Grabski, Krzysztof Szczypiorski:
Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks. ICUMT 2013: 13-19 - [c10]Iwona Grabska, Krzysztof Szczypiorski:
Steganography in WiMAX networks. ICUMT 2013: 20-27 - [c9]Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski:
StegTorrent: A Steganographic Method for the P2P File Sharing Service. IEEE Symposium on Security and Privacy Workshops 2013: 151-157 - [c8]Szymon Grabski, Krzysztof Szczypiorski:
Steganography in OFDM Symbols of Fast IEEE 802.11n Networks. IEEE Symposium on Security and Privacy Workshops 2013: 158-164 - [c7]Marcin Seredynski, Riad Aggoune, Krzysztof Szczypiorski, Djamel Khadraoui:
Performance Evaluation of Trust-Based Collaborative Sanctioning in MANETs. TrustCom/ISPA/IUCC 2013: 81-88 - [i28]Wojciech Mazurczyk, Maciej Karas, Krzysztof Szczypiorski:
SkyDe: a Skype-based Steganographic Method. CoRR abs/1301.3632 (2013) - [i27]Pawel Kopiczko, Wojciech Mazurczyk, Krzysztof Szczypiorski:
StegTorrent: a Steganographic Method for the P2P File Sharing Service. CoRR abs/1303.4264 (2013) - 2012
- [j11]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Toward Effective and Reliable Digital Forensics. Comput. J. 55(6): 651-652 (2012) - [j10]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Hiding information in a Stream Control Transmission Protocol. Comput. Commun. 35(2): 159-169 (2012) - [j9]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Multilevel Steganography: Improving Hidden Communication in Networks. J. Univers. Comput. Sci. 18(14): 1967-1986 (2012) - [j8]Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski:
What are suspicious VoIP delays? Multim. Tools Appl. 57(1): 109-126 (2012) - [j7]Giannis F. Marias, João Barros, Markus Fiedler, Andreas Fischer, Harald Hauff, Ralph Herkenhöner, Antonio Grillo, Alessandro Lentini, Luísa Lima, Charlott Lorentzen, Wojciech Mazurczyk, Hermann de Meer, Paulo F. Oliveira, George C. Polyzos, Enric Pujol, Krzysztof Szczypiorski, João P. Vilela, Tiago T. V. Vinhoza:
Security and privacy issues for the network of the future. Secur. Commun. Networks 5(9): 987-1005 (2012) - [j6]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Toward network steganography detection. Telecommun. Syst. 49(2): 161-162 (2012) - [j5]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Evaluation of steganographic methods for oversized IP packets. Telecommun. Syst. 49(2): 207-217 (2012) - [j4]Krzysztof Szczypiorski:
A performance analysis of HICCUPS - a steganographic system for WLAN. Telecommun. Syst. 49(2): 255-259 (2012) - [c6]Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:
Towards steganography detection through network traffic visualisation. ICUMT 2012: 947-954 - [i26]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Influence of Speech Codecs Selection on Transcoding Steganography. CoRR abs/1201.6218 (2012) - [i25]Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski:
The Advent of Steganography in Computing Environments. CoRR abs/1202.5289 (2012) - [i24]Józef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Principles and Overview of Network Steganography. CoRR abs/1207.0917 (2012) - [i23]Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski:
Towards Steganography Detection Through Network Traffic Visualisation. CoRR abs/1208.2861 (2012) - [i22]Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganalysis of Transcoding Steganography. CoRR abs/1210.5888 (2012) - 2011
- [j3]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission steganography and its detection. Soft Comput. 15(3): 505-515 (2011) - [i21]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Multi-Level Steganography: Improving Hidden Communication in Networks. CoRR abs/1101.4789 (2011) - [i20]Wojciech Mazurczyk, Józef Lubacz, Krzysztof Szczypiorski:
On Steganography in Lost Audio Packets. CoRR abs/1102.0023 (2011) - [i19]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
PadSteg: Introducing Inter-Protocol Steganography. CoRR abs/1104.0422 (2011) - [i18]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Hiding Information in a Stream Control Transmission Protocol. CoRR abs/1104.3333 (2011) - [i17]Piotr Bialczak, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Sending Hidden Data via Google Suggest. CoRR abs/1107.4062 (2011) - [i16]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
How Hidden Can Be Even More Hidden? CoRR abs/1107.4065 (2011) - [i15]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Is Cloud Computing Steganography-proof? CoRR abs/1107.4077 (2011) - [i14]Elzbieta Zielinska, Krzysztof Szczypiorski:
Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4. CoRR abs/1107.4230 (2011) - [i13]Wojciech Mazurczyk, Pawel Szaga, Krzysztof Szczypiorski:
Using Transcoding for Hidden Communication in IP Telephony. CoRR abs/1111.1250 (2011) - 2010
- [j2]Krzysztof Szczypiorski:
Guest editorial. Telecommun. Syst. 45(2-3): 93-94 (2010) - [c5]Krzysztof Cabaj, Krzysztof Szczypiorski, Sheila Becker:
Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework. MISSI 2010: 143-151 - [i12]Wojciech Mazurczyk, Krzysztof Cabaj, Krzysztof Szczypiorski:
What are suspicious VoIP delays? CoRR abs/1002.4303 (2010) - [i11]Bartosz Jankowski, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Information Hiding Using Improper Frame Padding. CoRR abs/1005.1925 (2010) - [i10]Wojciech Fraczek, Wojciech Mazurczyk, Krzysztof Szczypiorski:
Stream Control Transmission Protocol Steganography. CoRR abs/1006.0247 (2010) - [i9]Krzysztof Szczypiorski, Wojciech Mazurczyk:
Hiding Data in OFDM Symbols of IEEE 802.11 Networks. CoRR abs/1006.0495 (2010) - [i8]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Retransmission Steganography Applied. CoRR abs/1007.0767 (2010)
2000 – 2009
- 2009
- [i7]Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski:
Hiding Information in Retransmissions. CoRR abs/0905.0363 (2009) - [i6]Krzysztof Szczypiorski:
A Performance Analysis of HICCUPS - a Steganographic System for WLAN. CoRR abs/0906.4217 (2009) - [i5]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography in Handling Oversized IP Packets. CoRR abs/0907.0313 (2009) - 2008
- [j1]Krzysztof Szczypiorski, Józef Lubacz:
Saturation throughput analysis of IEEE 802.11g (ERP-OFDM) networks. Telecommun. Syst. 38(1-2): 45-52 (2008) - [c4]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography of VoIP Streams. OTM Conferences (2) 2008: 1001-1018 - [c3]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski:
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. OTM Conferences (2) 2008: 1019-1035 - [i4]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Steganography of VoIP streams. CoRR abs/0805.2938 (2008) - [i3]Wojciech Mazurczyk, Krzysztof Szczypiorski:
Covert Channels in SIP for VoIP signalling. CoRR abs/0805.3538 (2008) - [i2]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk:
Steganographic Routing in Multi Agent System Environment. CoRR abs/0806.0576 (2008) - [i1]Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski:
TrustMAS: Trusted Communication Platform for Multi-Agent Systems. CoRR abs/0808.4060 (2008) - 2007
- [c2]Krzysztof Szczypiorski, Józef Lubacz:
Saturation Throughput Analysis of IEEE 802.11g (ERP-OFDM) Networks. PWC 2007: 196-205 - [c1]Krzysztof Szczypiorski, Józef Lubacz:
Performance Evaluation of IEEE 802.11 DCF Networks. ITC 2007: 1084-1095 - 2005
- [p2]Igor Margasinski, Krzysztof Szczypiorski:
VAST: Versatile Anonymous System for Web Users. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 71-82 - [p1]Krzysztof Szczypiorski, Aneta Zwierko, Igor Margasinski:
Micropayments with Privacy - a New Proposal for E-commerce. Information Processing and Security Systems 2005: 175-185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint