default search action
Jean-Louis Lanet
Person information
- affiliation: INRIA, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j24]Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. ACM Comput. Surv. 54(6): 117:1-117:36 (2022) - 2021
- [j23]Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi:
In-Depth Analysis of Ransom Note Files. Comput. 10(11): 145 (2021) - [j22]Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi:
A behavioural in-depth analysis of ransomware infection. IET Inf. Secur. 15(1): 38-58 (2021) - [c71]Mathieu Escouteloup, Ronan Lashermes, Jacques Fournier, Jean-Louis Lanet:
Under the Dome: Preventing Hardware Timing Information Leakage. CARDIS 2021: 233-253 - 2020
- [j21]Mozhdeh Farhadi, Jean-Louis Lanet, Guillaume Pierre, Daniele Miorandi:
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures. Softw. Pract. Exp. 50(6): 973-997 (2020) - [j20]Samiya Hamadouche, Jean-Louis Lanet, Mohamed Mezghiche:
Hiding a fault enabled virus through code construction. J. Comput. Virol. Hacking Tech. 16(2): 103-124 (2020) - [c70]Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Confiance: detecting vulnerabilities in Java Card applets. ARES 2020: 24:1-24:10 - [c69]Guillaume Hiet, Frédéric Tronel, Jean-Louis Lanet:
Preface of the 2nd Workshop on the Security of Software/Hardware Interfaces (SILM 2020). EuroS&P Workshops 2020: 681 - [c68]Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud Van Straaten, Jean-Louis Lanet:
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures. ICETE (2) 2020: 302-309 - [i3]Cédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud Van Straaten, Jean-Louis Lanet:
Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures. CoRR abs/2009.12204 (2020)
2010 – 2019
- 2019
- [j19]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
Formal methods in dynamic software updating: a survey. Int. J. Crit. Comput. Based Syst. 9(1/2): 76-114 (2019) - [j18]Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM. Int. J. Inf. Sec. 18(1): 85-100 (2019) - [c67]Routa Moussaileb, Charles Berti, Guillaume Deboisdeffre, Nora Cuppens, Jean-Louis Lanet:
Watch Out! Doxware on the Way... CRiSIS 2019: 279-292 - [c66]Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
JavaNeighbors: Improving ChuckyJava's neighborhood discovery algorithm. EUSPN/ICTH 2019: 70-76 - [c65]Routa Moussaileb, Nora Cuppens, Jean-Louis Lanet, Hélène Le Bouder:
Ransomware Network Traffic Analysis for Pre-encryption Alert. FPS 2019: 20-38 - [c64]Etienne Boespflug, Romain Gourier, Jean-Louis Lanet:
Predicting the Effect of Hardware Fault Injection. IWBIS 2019: 103-108 - [c63]Benoît Fournier, Gilles Guette, Valérie Viet Triem Tong, Jean-Louis Lanet:
SEER4US, Secured Energy Efficient Routing for UAV Swarms. WiMob 2019: 1-6 - [e8]Jean-Louis Lanet, Cristian Toma:
Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11359, Springer 2019, ISBN 978-3-030-12941-5 [contents] - 2018
- [j17]Mohamed El Beqqal, Mostafa Azizi, Jean-Louis Lanet:
A Novel Approach for an Interoperable Biometric Verification. Int. J. Interact. Mob. Technol. 12(6): 124-132 (2018) - [j16]Jean-Louis Lanet, Hélène Le Bouder, Mohammed Benattou, Axel Legay:
When time meets test. Int. J. Inf. Sec. 17(4): 395-409 (2018) - [j15]Yahiaoui Chahrazed, Jean-Louis Lanet, Mohamed Mezghiche, Karim Tamine:
Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application. J. Exp. Theor. Artif. Intell. 30(1): 101-127 (2018) - [c62]Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet:
Ransomware's Early Mitigation Mechanisms. ARES 2018: 2:1-2:10 - [c61]Sébanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay:
Let's shock our IoT's heart: ARMv7-M under (fault) attacks. ARES 2018: 33:1-33:6 - [c60]Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Protection of Systems Against Fuzzing Attacks. FPS 2018: 156-172 - [c59]Sébanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet:
When Fault Injection Collides with Hardware Complexity. FPS 2018: 243-256 - [c58]Damien Couroussé, Thierno Barry, Bruno Robisson, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann:
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. CS2@HiPEAC 2018: 17-18 - [c57]Hélène Le Bouder, Gaël Thomas, Edwin Bourget, Mariem Graa, Nora Cuppens, Jean-Louis Lanet:
Theoretical Security Evaluation of the Human Semantic Authentication Protocol. ICETE (2) 2018: 498-505 - [c56]Léopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet:
Normalization of Java Source Codes. SecITC 2018: 29-40 - [e7]Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro:
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10694, Springer 2018, ISBN 978-3-319-76686-7 [contents] - 2017
- [j14]Abdelhak Mesbah, Jean-Louis Lanet, Mohamed Mezghiche:
Reverse engineering a Java Card memory management algorithm. Comput. Secur. 66: 97-114 (2017) - [j13]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
A formal verification of dynamic updating in a Java-based embedded system. Int. J. Crit. Comput. Based Syst. 7(4): 303-340 (2017) - [j12]Noreddine El Janati El Idrissi, Guillaume Bouffard, Jean-Louis Lanet, Said El Hajji:
Trust can be misplaced. J. Cryptogr. Eng. 7(1): 21-34 (2017) - [j11]Mozhdeh Farhadi, Jean-Louis Lanet:
Chronicle of a Java Card death. J. Comput. Virol. Hacking Tech. 13(2): 109-123 (2017) - [c55]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ICISS 2017: 127-145 - [c54]Aurélien Palisse, Antoine Durand, Hélène Le Bouder, Colas Le Guernic, Jean-Louis Lanet:
Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure. NordSec 2017: 192-208 - [c53]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). PST 2017: 253-258 - [c52]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. SEC 2017: 205-218 - [c51]Thomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay:
An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENT. TrustCom/BigDataSE/ICESS 2017: 293-300 - [c50]Sébanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay:
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip. WISTP 2017: 93-109 - [e6]Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:
Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3 [contents] - [i2]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2017: 699 (2017) - 2016
- [c49]Abdelhak Mesbah, Leo Regnaud, Jean-Louis Lanet, Mohamed Mezghiche:
The Hell Forgery - Self Modifying Codes Shoot Again. CARDIS 2016: 105-121 - [c48]Aurélien Palisse, Hélène Le Bouder, Jean-Louis Lanet, Colas Le Guernic, Axel Legay:
Ransomware and the Legacy Crypto API. CRiSIS 2016: 11-28 - [c47]Razika Lounas, Nisrine Jafri, Axel Legay, Mohamed Mezghiche, Jean-Louis Lanet:
A Formal Verification of Safe Update Point Detection in Dynamic Software Updating. CRiSIS 2016: 31-45 - [c46]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Tracking Explicit and Control Flows in Java and Native Android Apps Code. ICISSP 2016: 307-316 - [c45]Mozhdeh Farhadi, Jean-Louis Lanet:
Paper Tigers: An Endless Fight. SECITC 2016: 40-62 - [c44]Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes:
A Template Attack Against VERIFY PIN Algorithms. SECRYPT 2016: 231-238 - [c43]Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. WISTP 2016: 136-152 - [i1]Nisrine Jafri, Axel Legay, Jean-Louis Lanet:
Vulnerability Prediction Against Fault Attacks. ERCIM News 2016(106) (2016) - 2015
- [j10]Guillaume Bouffard, Jean-Louis Lanet:
The ultimate control flow transfer in a Java based smart card. Comput. Secur. 50: 33-46 (2015) - [c42]Mohammed Amine Kasmi, Mostafa Azizi, Jean-Louis Lanet:
Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code. IAS 2015: 104-110 - [c41]Jean-Louis Lanet:
Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards. C2SI 2015: 74-82 - [c40]Noreddine El Janati El Idrissi, Said El Hajji, Jean-Louis Lanet:
Countermeasures Mitigation for Designing Rich Shell Code in Java Card. C2SI 2015: 149-161 - [c39]Aymerick Savary, Marc Frappier, Michael Leuschel, Jean-Louis Lanet:
Model-Based Robustness Testing in Event-B Using Mutation. SEFM 2015: 132-147 - [c38]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
An Approach for Formal Verification of Updated Java Bytecode Programs. VECoS 2015: 51-64 - 2014
- [j9]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Security automaton to mitigate laser-based fault attacks on smart cards. Int. J. Trust. Manag. Comput. Commun. 2(2): 185-205 (2014) - [j8]Guillaume Bouffard, Jean-Louis Lanet:
Reversing the operating system of a Java based smart card. J. Comput. Virol. Hacking Tech. 10(4): 239-253 (2014) - [c37]Jean-Louis Lanet, Guillaume Bouffard, Rokia Lamrani Alaoui, Ranim Chakra, Afef Mestiri, Mohammed Monsif, Abdellatif Fandi:
Memory Forensics of a Java Card Dump. CARDIS 2014: 3-17 - [c36]Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig:
Heap ... Hop! Heap Is Also Vulnerable. CARDIS 2014: 18-31 - [c35]Achkar Amine, Mohammed Benattou, Jean-Louis Lanet:
Generating control flow graph from Java card byte code. CIST 2014: 206-212 - [c34]Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. SECRYPT 2014: 451-456 - 2013
- [j7]Jean Dubreuil, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Mitigating Type Confusion on Java Card. Int. J. Secur. Softw. Eng. 4(2): 19-39 (2013) - [j6]Samiya Hamadouche, Jean-Louis Lanet:
Virus in a smart card: Myth or reality? J. Inf. Secur. Appl. 18(2-3): 130-137 (2013) - [j5]Nassima Kamel, Jean-Louis Lanet:
Risks induced by Web applications on smart cards. J. Inf. Secur. Appl. 18(2-3): 148-156 (2013) - [c33]Guillaume Bouffard, Tom Khefif, Jean-Louis Lanet, Ismael Kane, Sergio Casanova Salvia:
Accessing secure information using export file fraudulence. CRiSIS 2013: 1-5 - [c32]Jean-Louis Lanet:
Foreword. CRiSIS 2013: 1 - [c31]Aymerick Savary, Marc Frappier, Jean-Louis Lanet:
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing. IFM 2013: 223-237 - [c30]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Vulnerability Analysis on Smart Cards Using Fault Tree. SAFECOMP 2013: 82-93 - [c29]Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Detecting Laser Fault Injection for Smart Cards Using Security Automata. SSCC 2013: 18-29 - [e5]Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet:
2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013. IEEE Computer Society 2013 [contents] - 2012
- [c28]Jean Dubreuil, Guillaume Bouffard, Jean-Louis Lanet, Julien Cartigny:
Type Classification against Fault Enabled Mutant in Java Based Smart Card. ARES 2012: 551-556 - [c27]Guillaume Bouffard, Jean-Louis Lanet:
The Next Smart Card Nightmare - Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things. Cryptography and Security 2012: 405-424 - [c26]Jean-Louis Lanet:
Attacks against smart cards: Hands on session. CRiSIS 2012: 1-5 - [c25]Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet:
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. DBSec 2012: 122-128 - [c24]Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. SNDS 2012: 185-194 - [c23]Razika Lounas, Mohamed Mezghiche, Jean-Louis Lanet:
Towards a General Framework for Formal Reasoning about Java Bytecode Transformation. SCSS 2012: 63-73 - [e4]Fabio Martinelli, Jean-Louis Lanet, William M. Fitzgerald, Simon N. Foley:
7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-3087-9 [contents] - 2011
- [c22]Amaury Gauthier, Clement Mazin, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Enhancing Fuzzing Technique for OKL4 Syscalls Testing. ARES 2011: 728-733 - [c21]Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary:
Evaluation of the Ability to Transform SIM Applications into Hostile Applications. CARDIS 2011: 1-17 - [c20]Guillaume Bouffard, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Combined Software and Hardware Attacks on the Java Card Control Flow. CARDIS 2011: 283-296 - [c19]David Pequegnot, Laurent Cart-Lamy, Aurélien Thomas, Thibault Tigeon, Julien Iguchi-Cartigny, Jean-Louis Lanet:
A Security Mechanism to Increase Confidence in M-Transactions. CRiSIS 2011: 9-16 - [c18]Agnes C. Noubissi, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Hot updates for Java based smart cards. ICDE Workshops 2011: 168-173 - [c17]Jean-Baptiste Machemie, Clement Mazin, Jean-Louis Lanet, Julien Cartigny:
SmartCM a smart card fault injection simulator. WIFS 2011: 1-6 - [r1]Jean-Louis Lanet:
Bytecode Verification. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 177-178 - 2010
- [j4]Lydie du Bousquet, Yves Ledru, Olivier Maury, Catherine Oriat, Jean-Louis Lanet:
Reusing a JML Specification Dedicated to Verification for Testing, and Vice-Versa: Case Studies. J. Autom. Reason. 45(4): 415-435 (2010) - [j3]Julien Iguchi-Cartigny, Jean-Louis Lanet:
Developing a Trojan applets in a smart card. J. Comput. Virol. 6(4): 343-351 (2010) - [c16]Pierre Girard, Karine Villegas, Jean-Louis Lanet, Aude Plateaux:
A new payment protocol over the Internet. CRiSIS 2010: 1-6 - [c15]Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Checking the Paths to Identify Mutant Application on Embedded Systems. FGIT 2010: 459-468 - [e3]Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny:
Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings. Lecture Notes in Computer Science 6035, Springer 2010, ISBN 978-3-642-12509-6 [contents]
2000 – 2009
- 2009
- [c14]Ahmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet:
Automatic detection of fault attack and countermeasures. WESS 2009 - 2006
- [c13]Gilles Barthe, Lilian Burdy, Julien Charles, Benjamin Grégoire, Marieke Huisman, Jean-Louis Lanet, Mariela Pavlova, Antoine Requet:
JACK - A Tool for Validation of Security and Behaviour of Java Applications. FMCO 2006: 152-174 - [e2]Gilles Barthe, Benjamin Grégoire, Marieke Huisman, Jean-Louis Lanet:
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, Second International Workshop, CASSIS 2005, Nice, France, March 8-11, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3956, Springer 2006, ISBN 3-540-33689-3 [contents] - 2005
- [e1]Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean:
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3362, Springer 2005, ISBN 3-540-24287-2 [contents] - 2004
- [c12]Mariela Pavlova, Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet:
Enforcing High-Level Security Properties for Applets. CARDIS 2004: 1-16 - [c11]Lydie du Bousquet, Yves Ledru, Olivier Maury, Catherine Oriat, Jean-Louis Lanet:
Case Study in JML-Based Software Validation. ASE 2004: 294-297 - 2003
- [c10]Lilian Burdy, Antoine Requet, Jean-Louis Lanet:
Java Applet Correctness: A Developer-Oriented Approach. FME 2003: 422-439 - 2002
- [j2]Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets: Extended Version. J. Comput. Secur. 10(4): 369-398 (2002) - [c9]Ludovic Casset, Jean-Louis Lanet:
Increasing smart card dependability. ACM SIGOPS European Workshop 2002: 209-212 - 2000
- [c8]Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets. ESORICS 2000: 1-16 - [c7]Pierre Bieber, Jacques Cazin, A. El Marouani, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow. Java Card Workshop 2000: 25-37 - [c6]Jean-Louis Lanet:
Are Smart Cards the Ideal Domain for Applying Formal Methods? ZB 2000: 363-373
1990 – 1999
- 1999
- [j1]Pierre Girard, Jean-Louis Lanet:
New security issues raised by open cards. Inf. Secur. Tech. Rep. 4(2): 19-27 (1999) - [c5]Ludovic Casset, Jean-Louis Lanet:
How to Formally Specify the Java Bytecode Semantivs Using the B Method. ECOOP Workshops 1999: 104-105 - [c4]Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Vandewalle:
FACADE: A Typed Intermediate Language Dedicated to Smart Cards. ESEC / SIGSOFT FSE 1999: 476-493 - [c3]Pierre Bieber, Jacques Cazin, Virginie Wiels, Guy Zanon, Pierre Girard, Jean-Louis Lanet:
Electronic Purse Applet Certification: extended abstract. Workshop on Secure Architectures and Information Flow 1999: 14-25 - 1998
- [c2]Jean-Louis Lanet, Antoine Requet:
Formal Proof of Smart Card Applets Correctness. CARDIS 1998: 85-97 - 1996
- [c1]Jean-Louis Lanet:
A Load Balancing Task Allocation Scheme in a Hard Real Time System. Euro-Par, Vol. II 1996: 640-643
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint