default search action
Achim D. Brucker
Person information
- affiliation: University of Sheffield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Achim D. Brucker, Nicolas Méric, Burkhart Wolff:
Isabelle/DOF. Arch. Formal Proofs 2024 (2024) - [j38]Achim D. Brucker, Amy Stell:
(Extended) Interval Analysis. Arch. Formal Proofs 2024 (2024) - [c68]Achim D. Brucker, Teddy Cameron-Burke, Amy Stell:
Formally Verified Interval Arithmetic and Its Application to Program Verification. FormaliSE@ICSE 2024: 111-121 - [c67]Achim D. Brucker, Diego Marmsoler:
Teaching Formal Methods in Application Domains - A Case Study in Computer and Network Security. FMTea 2024: 124-140 - 2023
- [j37]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition in Isabelle/HOL. ACM Trans. Priv. Secur. 26(3): 25:1-25:36 (2023) - [c66]Achim D. Brucker, Amy Stell:
Verifying Feedforward Neural Networks for Classification in Isabelle/HOL. FM 2023: 427-444 - [c65]Achim D. Brucker, Idir Aït-Sadoune, Nicolas Méric, Burkhart Wolff:
Using Deep Ontologies in Formal Software Engineering. ABZ 2023: 15-32 - 2022
- [j36]Achim D. Brucker:
Nano JSON: Working with JSON formatted data in Isabelle/HOL and Isabelle/ML. Arch. Formal Proofs 2022 (2022) - [j35]Diego Marmsoler, Achim D. Brucker:
Isabelle/Solidity: A deep Embedding of Solidity in Isabelle/HOL. Arch. Formal Proofs 2022 (2022) - [c64]Diego Marmsoler, Achim D. Brucker:
Conformance Testing of Formal Semantics Using Grammar-Based Fuzzing. TAP@STAF 2022: 106-125 - 2021
- [c63]Achim D. Brucker, Sakine Yalman:
Confidentiality Enhanced Life-Cycle Assessment. Business Process Management Workshops 2021: 434-446 - [c62]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Performing Security Proofs of Stateful Protocols. CSF 2021: 1-16 - [c61]Diego Marmsoler, Achim D. Brucker:
A Denotational Semantics of Solidity in Isabelle/HOL. SEFM 2021: 403-422 - 2020
- [j34]Achim D. Brucker, Michael Herzberg:
The Safely Composable DOM. Arch. Formal Proofs 2020 (2020) - [j33]Achim D. Brucker, Michael Herzberg:
A Formalization of Safely Composable Web Components. Arch. Formal Proofs 2020 (2020) - [j32]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Safely Composable Document Object Model with Shadow Roots. Arch. Formal Proofs 2020 (2020) - [j31]Achim D. Brucker, Michael Herzberg:
A Formalization of Web Components. Arch. Formal Proofs 2020 (2020) - [j30]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Document Object Model with Shadow Roots. Arch. Formal Proofs 2020 (2020) - [j29]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, John Derrick:
Inference of Extended Finite State Machines. Arch. Formal Proofs 2020 (2020) - [j28]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, John Derrick:
A Formal Model of Extended Finite State Machines. Arch. Formal Proofs 2020 (2020) - [j27]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker:
Stateful Protocol Composition and Typing. Arch. Formal Proofs 2020 (2020) - [j26]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Automated Stateful Protocol Verification. Arch. Formal Proofs 2020 (2020) - [j25]Achim D. Brucker, Frédéric Tuong, Burkhart Wolff:
Model Transformation as Conservative Theory-Transformation. J. Object Technol. 19(3): 3:1-16 (2020)
2010 – 2019
- 2019
- [j24]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
A Screening Test for Disclosed Vulnerabilities in FOSS Components. IEEE Trans. Software Eng. 45(10): 945-966 (2019) - [c60]Achim D. Brucker, Michael Herzberg:
A Formally Verified Model of Web Components. FACS 2019: 51-71 - [c59]Achim D. Brucker, Burkhart Wolff:
Using Ontologies in Formal Developments Targeting Certification. IFM 2019: 65-82 - [c58]Achim D. Brucker, Gwendal Daniel, Martin Gogolla, Frédéric Jouault, Christophe Ponsard, Valéry Ramon, Edward D. Willink:
Emerging Topics in Textual Modelling. OCL@MoDELS 2019: 91-104 - [c57]Michael Foster, Achim D. Brucker, Ramsay G. Taylor, Siobhán North, John Derrick:
Incorporating Data into EFSM Inference. SEFM 2019: 257-272 - [c56]Achim D. Brucker, Burkhart Wolff:
Isabelle/DOF: Design and Implementation. SEFM 2019: 275-292 - [e6]Achim D. Brucker, Gwendal Daniel, Frédéric Jouault:
19th International Workshop in OCL and Textual Modeling (OCL 2019) co-located with IEEE/ACM 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS 2019), Munich, Germany, September 16, 2019. CEUR Workshop Proceedings 2513, CEUR-WS.org 2019 [contents] - 2018
- [j23]Achim D. Brucker, Michael Herzberg:
A Formal Model of the Document Object Model. Arch. Formal Proofs 2018 (2018) - [j22]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur:
Security policy monitoring of BPMN-based service compositions. J. Softw. Evol. Process. 30(9) (2018) - [c55]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition. ESORICS (1) 2018: 427-446 - [c54]Michael Foster, Ramsay G. Taylor, Achim D. Brucker, John Derrick:
Formalising Extended Finite State Machine Transition Merging. ICFEM 2018: 373-387 - [c53]Achim D. Brucker, Idir Aït-Sadoune, Paolo Crisafulli, Burkhart Wolff:
Using the Isabelle Ontology Framework - Linking the Formal with the Informal. CICM 2018: 23-38 - [c52]Achim D. Brucker, Michael Herzberg:
Formalizing (Web) Standards - An Application of Test and Proof. TAP@STAF 2018: 159-166 - [c51]Achim D. Brucker, Michael Herzberg:
A Formal Semantics of the Core DOM in Isabelle/HOL. WWW (Companion Volume) 2018: 741-749 - 2017
- [j21]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Formal Network Models and Their Application to Firewall Policies. Arch. Formal Proofs 2017 (2017) - [j20]Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker:
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors. Data Sci. Eng. 2(2): 107-124 (2017) - [j19]Achim D. Brucker, Bo Zhou, Francesco Malmignati, Qi Shi, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - [c50]Robert Bill, Achim D. Brucker, Jordi Cabot, Martin Gogolla, Antonio Vallecillo, Edward D. Willink:
Workshop in OCL and Textual Modelling - Report on Recent Trends and Panel Discussions. STAF Workshops 2017: 297-301 - 2016
- [j18]Michael Felderer, Matthias Büchler, Martin Johns, Achim D. Brucker, Ruth Breu, Alexander Pretschner:
Security Testing: A Survey. Adv. Comput. 101: 1-51 (2016) - [c49]Achim D. Brucker, Michael Herzberg:
On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. ESSoS 2016: 72-88 - [c48]Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci:
On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. ESSoS 2016: 190-206 - [c47]Achim D. Brucker, Jordi Cabot, Gwendal Daniel, Martin Gogolla, Adolfo Sánchez-Barbudo Herrera, Frank Hilken, Frédéric Tuong, Edward D. Willink, Burkhart Wolff:
Recent Developments in OCL and Textual Modelling. OCL@MoDELS 2016: 157-165 - [c46]Achim D. Brucker, Burkhart Wolff:
Monadic Sequence Testing and Explicit Test-Refinements. TAP@STAF 2016: 17-36 - [e5]Achim D. Brucker, Jordi Cabot, Adolfo Sánchez-Barbudo Herrera:
Proceedings of the 16th International Workshop on OCL and Textual Modelling co-located with 19th International Conference on Model Driven Engineering Languages and Systems (MODELS 2016), Saint-Malo, France, October 2, 2016. CEUR Workshop Proceedings 1756, CEUR-WS.org 2016 [contents] - 2015
- [j17]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Formal firewall conformance testing: an application of test and proof techniques. Softw. Test. Verification Reliab. 25(1): 34-71 (2015) - [c45]Mattia Salnitri, Achim D. Brucker, Paolo Giorgini:
From Secure Business Process Models to Secure Artifact-Centric Specifications. BMMDS/EMMSAD 2015: 246-262 - [c44]Lotfi Ben Othmane, Golriz Chehrazi, Eric Bodden, Petar Tsalovski, Achim D. Brucker, Philip Miseldine:
Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study. ISC 2015: 102-119 - [c43]Achim D. Brucker, Oto Havle, Yakoub Nemouchi, Burkhart Wolff:
Testing the IPC Protocol for a Real-Time Operating System. VSTTE 2015: 40-60 - [e4]Achim D. Brucker, Marina Egea, Martin Gogolla, Frédéric Tuong:
Proceedings of the 15th International Workshop on OCL and Textual Modeling co-located with 18th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2015), Ottawa, Canada, September 28, 2015. CEUR Workshop Proceedings 1512, CEUR-WS.org 2015 [contents] - 2014
- [j16]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
The Unified Policy Framework (UPF). Arch. Formal Proofs 2014 (2014) - [j15]Achim D. Brucker, Frédéric Tuong, Burkhart Wolff:
Featherweight OCL: A Proposal for a Machine-Checked Formal Semantics for OCL 2.5. Arch. Formal Proofs 2014 (2014) - [j14]Ruediger Bachmann, Achim D. Brucker:
Developing secure software. Datenschutz und Datensicherheit 38(4): 257-261 (2014) - [j13]Achim D. Brucker, Jacques Julliand:
Editorial for the special issue of STVR on tests and proofs volume 1: tests and proofs in model-based testing. Softw. Test. Verification Reliab. 24(7): 497-498 (2014) - [j12]Achim D. Brucker, Jacques Julliand:
Editorial for the special issue of STVR on tests and proofs volume 2: tests and proofs for improving the generation time and quality of test data suites. Softw. Test. Verification Reliab. 24(8): 591-592 (2014) - [c42]Achim D. Brucker, Tony Clark, Carolina Dania, Geri Georg, Martin Gogolla, Frédéric Jouault, Ernest Teniente, Burkhart Wolff:
Panel Discussion: Proposals for Improving OCL. OCL@MoDELS 2014: 83-99 - [c41]Achim D. Brucker, Uwe Sodan:
Deploying Static Application Security Testing on a Large Scale. Sicherheit 2014: 91-101 - [c40]Steffen Bartsch, Bernhard J. Berger, Eric Bodden, Achim D. Brucker, Jens Heider, Mehmet Kus, Sönke Maseberg, Karsten Sohr, Melanie Volkamer:
Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen. Sicherheit 2014: 283-291 - [p6]Per Håkon Meland, Erkuden Rios, Vasilis Tountopoulos, Achim D. Brucker:
The Aniketos Platform. Secure and Trustworthy Service Composition 2014: 50-62 - [p5]Achim D. Brucker:
Using SecureBPMN for Modelling Security-Aware Service Compositions. Secure and Trustworthy Service Composition 2014: 110-120 - [p4]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - [p3]Achim D. Brucker, Luca Compagna, Pierre Guilleminot:
Compliance Validation of Secure Service Compositions. Secure and Trustworthy Service Composition 2014: 136-149 - [p2]Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Brett Lempereur, Qi Shi:
Security Policy Monitoring of Composite Services. Secure and Trustworthy Service Composition 2014: 192-202 - [e3]Achim D. Brucker, Carolina Dania, Geri Georg, Martin Gogolla:
Proceedings of the 14th International Workshop on OCL and Textual Modelling co-located with 17th International Conference on Model Driven Engineering Languages and Systems (MODELS 2014), Valencia, Spain, September 30, 2014. CEUR Workshop Proceedings 1285, CEUR-WS.org 2014 [contents] - [e2]Achim D. Brucker, Fabiano Dalpiaz, Paolo Giorgini, Per Håkon Meland, Erkuden Rios:
Secure and Trustworthy Service Composition - The Aniketos Approach. Lecture Notes in Computer Science 8900, Springer 2014, ISBN 978-3-319-13517-5 [contents] - [i1]Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, Burkhart Wolff:
Report on the Aachen OCL Meeting. CoRR abs/1408.5698 (2014) - 2013
- [j11]Achim D. Brucker, Burkhart Wolff:
On theorem prover-based testing. Formal Aspects Comput. 25(5): 683-721 (2013) - [j10]Achim D. Brucker:
Integrating Security Aspects into Business Process Models. it Inf. Technol. 55(6): 239-246 (2013) - [c39]Luca Compagna, Pierre Guilleminot, Achim D. Brucker:
Business Process Compliance via Security Validation as a Service. ICST 2013: 455-462 - [c38]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
hol-TestGen/fw - An Environment for Specification-Based Firewall Conformance Testing. ICTAC 2013: 112-121 - [c37]Achim D. Brucker, Delphine Longuet, Frédéric Tuong, Burkhart Wolff:
On the Semantics of Object-Oriented Data Structures and Path Expressions. OCL@MoDELS 2013: 23-32 - [c36]Achim D. Brucker, Dan Chiorean, Tony Clark, Birgit Demuth, Martin Gogolla, Dimitri Plotnikov, Bernhard Rumpe, Edward D. Willink, Burkhart Wolff:
Report on the Aachen OCL Meeting. OCL@MoDELS 2013: 103-111 - [c35]Achim D. Brucker, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - [c34]Achim D. Brucker, Abderrahmane Feliachi, Yakoub Nemouchi, Burkhart Wolff:
Test Program Generation for a Microprocessor - A Case-Study. TAP@STAF 2013: 76-95 - 2012
- [c33]Achim D. Brucker, Isabelle Hang:
Secure and Compliant Implementation of Business Process-Driven Systems. Business Process Management Workshops 2012: 662-674 - [c32]Ganna Monakova, Cristina Severin, Achim D. Brucker, Ulrich Flegel, Andreas Schaad:
Monitoring Security and Safety of Assets in Supply Chains. Future Security 2012: 9-20 - [c31]Achim D. Brucker, Burkhart Wolff:
Featherweight OCL: a study for the consistent semantics of OCL 2.3 in HOL. OCL@MoDELS 2012: 19-24 - [c30]Ganna Monakova, Achim D. Brucker, Andreas Schaad:
Security and safety of assets in business processes. SAC 2012: 1667-1673 - [c29]Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, Raj Ruparel:
SecureBPMN: modeling and enforcing access control requirements in business processes. SACMAT 2012: 123-126 - [p1]Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, Wolfgang Theilmann:
Service Levels, Security, and Trust. Handbook of Service Description 2012: 295-326 - [e1]Achim D. Brucker, Jacques Julliand:
Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague, Czech Republic, May 31 - June 1, 2012. Proceedings. Lecture Notes in Computer Science 7305, Springer 2012, ISBN 978-3-642-30472-9 [contents] - 2011
- [j9]Matthias P. Krieger, Achim D. Brucker:
Extending OCL Operation Contracts with Objective Functions. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 44 (2011) - [c28]Achim D. Brucker, Helmut Petritsch:
A Framework for Managing and Analyzing Changes of Security Policies. POLICY 2011: 105-112 - [c27]Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff:
An approach to modular and testable security models of real-world health-care applications. SACMAT 2011: 133-142 - [c26]Stephan Braune, Achim D. Brucker, Gerald Kleser, Keqin Li, Theo Dirk Meijler, Heiko Paulheim, Florian Probst:
A Service-oriented Architecture for Emergency Management Systems. Software Engineering (Workshops) 2011: 225-232 - 2010
- [j8]Michael Wahler, David A. Basin, Achim D. Brucker, Jana Koehler:
Efficient analysis of pattern-based constraint specifications. Softw. Syst. Model. 9(2): 225-255 (2010) - [c25]Achim D. Brucker, Dieter Hutter:
Information Flow in Disaster Management Systems. ARES 2010: 156-163 - [c24]Achim D. Brucker, Helmut Petritsch:
Idea: Efficient Evaluation of Access Control Constraints. ESSoS 2010: 157-165 - [c23]Michael Altenhofen, Achim D. Brucker:
Practical Issues with Formal Specifications - Lessons Learned from an Industrial Case Study. FMICS 2010: 17-32 - [c22]Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff:
Verified Firewall Policy Transformations for Test Case Generation. ICST 2010: 345-354 - [c21]Achim D. Brucker, Matthias P. Krieger, Delphine Longuet, Burkhart Wolff:
A Specification-Based Test Case Generation Method for UML/OCL. MoDELS (Workshops) 2010: 334-348 - [c20]Achim D. Brucker, Helmut Petritsch, Stefan G. Weber:
Attribute-Based Encryption with Break-Glass. WISTP 2010: 237-244
2000 – 2009
- 2009
- [j7]Achim D. Brucker, Burkhart Wolff:
Semantics, calculi, and analysis for object-oriented specifications. Acta Informatica 46(4): 255-284 (2009) - [c19]Mathias Kohler, Achim D. Brucker, Andreas Schaad:
ProActive Caching: Generating Caching Heuristics for Business Process Environments. CSE (3) 2009: 297-304 - [c18]Achim D. Brucker, Burkhart Wolff:
hol-TestGen. FASE 2009: 417-420 - [c17]Achim D. Brucker, Sebastian Mödersheim:
Integrating Automated and Interactive Protocol Verification. Formal Aspects in Security and Trust 2009: 248-262 - [c16]Achim D. Brucker, Matthias P. Krieger, Burkhart Wolff:
Extending OCL with Null-References. MoDELS (Workshops) 2009: 261-275 - [c15]Achim D. Brucker, Helmut Petritsch, Andreas Schaad:
Delegation Assistance. POLICY 2009: 84-91 - [c14]Achim D. Brucker, Helmut Petritsch:
Extending access control models with break-glass. SACMAT 2009: 197-206 - 2008
- [j6]Achim D. Brucker, Burkhart Wolff:
An Extensible Encoding of Object-oriented Data Models in hol. J. Autom. Reason. 41(3-4): 219-249 (2008) - [c13]Achim D. Brucker, Burkhart Wolff:
Extensible Universes for Object-Oriented Data Models. ECOOP 2008: 438-462 - [c12]Achim D. Brucker, Burkhart Wolff:
HOL-OCL: A Formal Proof Environment for UML/OCL. FASE 2008: 97-100 - [c11]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Model-Based Firewall Conformance Testing. TestCom/FATES 2008: 103-118 - [c10]Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Verifying Test-Hypotheses: An Experiment in Test and Proof. MBT@ETAPS 2008: 15-27 - 2007
- [b1]Achim D. Brucker:
An interactive proof environment for object-oriented specifications. ETH Zurich, Zürich, Switzerland, 2007 - [c9]Achim D. Brucker, Burkhart Wolff:
Test-Sequence Generation with Hol-TestGen with an Application to Firewall Testing. TAP 2007: 149-168 - 2006
- [j5]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
An MDA Framework Supporting OCL. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [j4]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
Semantic Issues of OCL: Past, Present, and Future. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [j3]Michael Wahler, Jana Koehler, Achim D. Brucker:
Model-Driven Constraint Engineering. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 5 (2006) - [c8]Achim D. Brucker, Jürgen Doser, Burkhart Wolff:
A Model Transformation Semantics and Analysis Methodology for SecureUML. MoDELS 2006: 306-320 - 2005
- [j2]Achim D. Brucker, Burkhart Wolff:
A verification approach to applied system security. Int. J. Softw. Tools Technol. Transf. 7(3): 233-247 (2005) - [c7]Achim D. Brucker, Burkhart Wolff:
Interactive Testing with HOL-TestGen. FATES 2005: 87-102 - 2004
- [c6]Achim D. Brucker, Burkhart Wolff:
Symbolic Test Case Generation for Primitive Recursive Functions. FATES 2004: 16-32 - 2003
- [j1]Achim D. Brucker, Frank Rittinger, Burkhart Wolff:
HOL-Z 2.0: A Proof Environment for Z-Specifications. J. Univers. Comput. Sci. 9(2): 152-172 (2003) - [c5]Achim D. Brucker, Burkhart Wolff:
A Case Study of a Formalized Security Architecture. FMICS 2003: 24-40 - 2002
- [c4]Achim D. Brucker, Burkhart Wolff:
A Proposal for a Formal OCL Semantics in Isabelle/HOL. TPHOLs 2002: 99-114 - [c3]Achim D. Brucker, Burkhart Wolff:
Using Theory Morphisms for Implementing Formal Methods Tools. TYPES 2002: 59-77 - [c2]Achim D. Brucker, Burkhart Wolff:
HOL-OCL: Experiences, Consequences and Design Choices. UML 2002: 196-211 - 2001
- [c1]Achim D. Brucker, Burkhart Wolff:
Testing Distributed Component Based Systems Using UML/OCL. GI Jahrestagung (1) 2001: 608-614
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint