default search action
Somanath Tripathy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Susmita Palmal, Nikhilanand Arya, Sriparna Saha, Somanath Tripathy:
Integrative prognostic modeling for breast cancer: Unveiling optimal multimodal combinations using graph convolutional networks and calibrated random forest. Appl. Soft Comput. 154: 111379 (2024) - [j42]Partha Sarathi Chakraborty, Omkar Santosh Gavhane, Somanath Tripathy:
SEVCOD: secure and efficient verifiable computation on outsourced data. Clust. Comput. 27(4): 4725-4739 (2024) - [j41]Narendra Singh, Somanath Tripathy:
It's too late if exfiltrate: Early stage Android ransomware detection. Comput. Secur. 141: 103819 (2024) - [j40]Harsh Kasyap, Somanath Tripathy:
Beyond data poisoning in federated learning. Expert Syst. Appl. 235: 121192 (2024) - [j39]Harsh Kasyap, Somanath Tripathy:
Privacy-preserving and Byzantine-robust Federated Learning Framework using Permissioned Blockchain. Expert Syst. Appl. 238(Part E): 122210 (2024) - [j38]Partha Sarathi Chakraborty, Somanath Tripathy, Sanjeet Kumar Nayak:
BASPED: Blockchain assisted searchable public key encryption over outsourced data. Int. J. Inf. Sec. 23(1): 487-503 (2024) - [j37]Srikanta Pradhan, Somanath Tripathy, Rakesh Matam:
Towards optimal edge resource utilization: Predictive analytics and reinforcement learning for task offloading. Internet Things 26: 101147 (2024) - [j36]Vivek Singh, Kailash Chandra Ray, Somanath Tripathy:
An Efficient Method and Hardware System for Monitoring of Illegal Logging Events in Forest. IEEE Syst. J. 18(1): 40-50 (2024) - [j35]Debasmita Manna, Somanath Tripathy:
TriMPA: Triggerless Targeted Model Poisoning Attack in DNN. IEEE Trans. Comput. Soc. Syst. 11(4): 5431-5443 (2024) - [j34]Harsh Kasyap, Somanath Tripathy:
Sine: Similarity is Not Enough for Mitigating Local Model Poisoning Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(5): 4481-4494 (2024) - [j33]Susil Kumar Mohanty, Somanath Tripathy:
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack. ACM Trans. Priv. Secur. 27(4): 30:1-30:26 (2024) - 2023
- [j32]Nemi Chandra Rathore, Somanath Tripathy:
Restricting data-leakage using fine-grained access control on OSN objects. Int. J. Inf. Sec. 22(1): 93-106 (2023) - [j31]Susmita Palmal, Sriparna Saha, Somanath Tripathy:
Multi-objective optimization with majority voting ensemble of classifiers for prediction of HIV-1 protease cleavage site. Soft Comput. 27(17): 12211-12221 (2023) - [j30]Harsh Kasyap, Arpan Manna, Somanath Tripathy:
An Efficient Blockchain Assisted Reputation Aware Decentralized Federated Learning Framework. IEEE Trans. Netw. Serv. Manag. 20(3): 2771-2782 (2023) - [c60]Susil Kumar Mohanty, Somanath Tripathy:
FlexiPCN: Flexible Payment Channel Network. FC Workshops 2023: 405-419 - [c59]Narendra Singh, Somanath Tripathy:
MDLDroid: Multimodal Deep Learning Based Android Malware Detection. ICISS 2023: 159-177 - [c58]Susmita Palmal, Sriparna Saha, Somanath Tripathy:
Integrating Multi-view Feature Extraction and Fuzzy Rank-Based Ensemble for Accurate HIV-1 Protease Cleavage Site Prediction. ICONIP (10) 2023: 480-492 - [c57]Ajay Chandra Korlapati, Sanjeet Kumar Nayak, Partha Sarathi Chakraborty, Somanath Tripathy:
SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. ISPEC 2023: 595-613 - [c56]Harsh Kasyap, Somanath Tripathy, Mauro Conti:
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing. TrustCom 2023: 214-221 - [c55]Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:
LPA: A Lightweight PUF-based Authentication Protocol for IoT System. TrustCom 2023: 1712-1717 - 2022
- [j29]Sanjay Murmu, Harsh Kasyap, Somanath Tripathy:
PassMon: A Technique for Password Generation and Strength Estimation. J. Netw. Syst. Manag. 30(1): 13 (2022) - [j28]Susil Kumar Mohanty, Somanath Tripathy:
SIoVChain: Time-Lock Contract Based Privacy-Preserving Data Sharing in SIoV. IEEE Trans. Intell. Transp. Syst. 23(12): 24071-24082 (2022) - [j27]Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik, Somanath Tripathy:
CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage. J. Supercomput. 78(1): 987-1009 (2022) - [c54]Partha Sarathi Chakraborty, Mangesh Shivaji Chandrawanshi, Puspesh Kumar, Somanath Tripathy:
BSMFS: Blockchain assisted Secure Multi-keyword Fuzzy Search over Encrypted Data. Blockchain 2022: 216-221 - [c53]Harsh Kasyap, Somanath Tripathy:
Hidden Vulnerabilities in Cosine Similarity based Poisoning Defense. CISS 2022: 263-268 - [c52]Arvind Kumar, Rakesh Matam, Srinibas Swain, Somanath Tripathy, Mithun Mukherjee, Jaime Lloret:
Delay Aware Fault-Tolerant Concurrent Data Collection Trees in Shared IIoT Applications. GLOBECOM 2022: 323-328 - [c51]Badavath Shravan Naik, Somanath Tripathy, Susil Kumar Mohanty:
MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle. GLOBECOM 2022: 1763-1768 - [c50]Narendra Singh, Somanath Tripathy, Bruhadeshwar Bezawada:
SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection. ICISS 2022: 64-83 - [c49]Debasmita Manna, Harsh Kasyap, Somanath Tripathy:
MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning. ICISS 2022: 139-154 - [c48]Susmita Palmal, Nikhilanand Arya, Sriparna Saha, Somanath Tripathy:
A Multi-modal Graph Convolutional Network for Predicting Human Breast Cancer Prognosis. ICONIP (7) 2022: 187-198 - [c47]Susmita Palmal, Sriparna Saha, Somanath Tripathy:
HIV-1 Protease Cleavage Site Prediction using Stacked Autoencoder with Ensemble of Classifiers. IJCNN 2022: 1-8 - 2021
- [j26]Sumit Kumar Tetarave, Somanath Tripathy:
PJ-Sec: secure node joining in mobile P2P networks. CCF Trans. Pervasive Comput. Interact. 3(1): 13-24 (2021) - [j25]Susil Kumar Mohanty, Somanath Tripathy:
n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks. Comput. Secur. 106: 102291 (2021) - [j24]Somanath Tripathy, Vikash Kumar Rai, Jimson Mathew:
MARPUF: physical unclonable function with improved machine learning attack resistance. IET Circuits Devices Syst. 15(5): 465-474 (2021) - [j23]Sanjeet Kumar Nayak, Somanath Tripathy:
SEPS: Efficient public-key based secure search over outsourced data. J. Inf. Secur. Appl. 61: 102932 (2021) - [j22]Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:
Design and Analysis of Reconfigurable Cryptographic Primitives: TRNG and PUF. J. Hardw. Syst. Secur. 5(3): 247-259 (2021) - [j21]Nemi Chandra Rathore, Somanath Tripathy:
Effective Visibility Prediction on Online Social Network. IEEE Trans. Comput. Soc. Syst. 8(2): 355-364 (2021) - [j20]Sanjeet Kumar Nayak, Somanath Tripathy:
SEMKC: Secure and Efficient Computation over Outsourced Data Encrypted under Multiple Keys. IEEE Trans. Emerg. Top. Comput. 9(1): 414-428 (2021) - [j19]Harsh Kasyap, Somanath Tripathy:
Privacy-preserving Decentralized Learning Framework for Healthcare System. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 68:1-68:24 (2021) - [j18]Sanjeet Kumar Nayak, Somanath Tripathy:
SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage. IEEE Trans. Serv. Comput. 14(3): 876-888 (2021) - [c46]Arvind Kumar, Rakesh Matam, Somanath Tripathy:
Fault-Tolerant Concurrent Data collection Trees for Industrial IoT Applications. ANTS 2021: 319-324 - [c45]Bishmita Hazarika, Rakesh Matam, Somanath Tripathy:
Multiple RPL Objective Functions for Heterogeneous IoT Networks. AINA (3) 2021: 406-415 - [c44]Somanath Tripathy, Mayank Aggarwal, Sandip Chakraborty:
Beyond Uber and Lyft: A Decentralized Cab Consortium over Blockchains. BSCI 2021: 97-102 - [c43]Parth Parag Kulkarni, Harsh Kasyap, Somanath Tripathy:
DNet: An Efficient Privacy-Preserving Distributed Learning Framework for Healthcare Systems. ICDCIT 2021: 145-159 - [c42]Arpan Manna, Harsh Kasyap, Somanath Tripathy:
Moat: Model Agnostic Defense against Targeted Poisoning Attacks in Federated Learning. ICICS (1) 2021: 38-55 - [c41]Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:
TRGP: A Low-Cost Re-Configurable TRNG-PUF Architecture for IoT. ISQED 2021: 420-425 - [c40]Somanath Tripathy, Narendra Singh, Divyanshu N. Singh:
ADAM: Automatic Detection of Android Malware. SecITC 2021: 18-31 - [e1]Somanath Tripathy, Rudrapatna K. Shyamasundar, Rajiv Ranjan:
Information Systems Security - 17th International Conference, ICISS 2021, Patna, India, December 16-20, 2021, Proceedings. Lecture Notes in Computer Science 13146, Springer 2021, ISBN 978-3-030-92570-3 [contents] - 2020
- [j17]Sumit Kumar Tetarave, Somanath Tripathy, Ratan Ghosh:
Enhancing quality of experience using peer-to-peer overlay on device-to-device communications. Int. J. Commun. Syst. 33(15) (2020) - [j16]Sanjeet Kumar Nayak, Somanath Tripathy:
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage. Int. J. Inf. Sec. 19(2): 229-240 (2020) - [j15]Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar:
Correlation Power Analysis of KASUMI and Power Resilience Analysis of Some Equivalence Classes of KASUMI S-Boxes. J. Hardw. Syst. Secur. 4(4): 297-313 (2020) - [j14]Nemi Chandra Rathore, Somanath Tripathy:
AppMonitor: restricting information leakage to third-party applications. Soc. Netw. Anal. Min. 10(1): 49 (2020) - [c39]Somanath Tripathy, Susil Kumar Mohanty:
MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. Financial Cryptography Workshops 2020: 481-495 - [c38]Rishu Roshan, Rakesh Matam, Mithun Mukherjee, Jaime Lloret Mauri, Somanath Tripathy:
A secure task-offloading framework for cooperative fog computing environment. GLOBECOM 2020: 1-6 - [c37]Narendra Singh, Harsh Kasyap, Somanath Tripathy:
Collaborative Learning Based Effective Malware Detection System. PKDD/ECML Workshops 2020: 205-219
2010 – 2019
- 2019
- [j13]Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John, Anshika Srivastava:
A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets. IEEE Access 7: 67983-67995 (2019) - [j12]Ashutosh Kumar Sinha, Somanath Tripathy:
CookieArmor : Safeguarding against cross-site request forgery and session hijacking. Secur. Priv. 2(2) (2019) - [j11]Vikash Kumar Rai, Boreddy V. Reddy, Somanath Tripathy, Jimson Mathew:
Correlation power analysis and effective defense approach on light encryption device block cipher. Secur. Priv. 2(5) (2019) - [c36]Kasturi Dhal, Satyananda Champati Rai, Prasant Kumar Pattnaik, Somanath Tripathy:
KeySED: An Efficient Keyword based Search over Encrypted Data in Cloud Environment. ICDSE 2019: 133-138 - [c35]Vivek Singh, Kailash Chandra Ray, Somanath Tripathy:
Blind Detection and Classification Algorithm for Smart Audio Monitoring System. iSES 2019: 133-138 - [c34]Chanchal Suman, Somanath Tripathy, Sriparna Saha:
An Intrusion Detection System Using Unsupervised Feature Selection. TENCON 2019: 19-24 - [p1]Subho Shankar Basu, Somanath Tripathy:
Secure Multicast Communication Techniques for IoT. Security and Fault Tolerance in Internet of Things 2019: 43-59 - [i4]Sumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh:
Enhancing Quality of Experience using DHT Overlay on Device-to-Device Communications in LTE-A Networks. CoRR abs/1905.02381 (2019) - [i3]Sumit Kumar Tetarave, Somanath Tripathy:
Robust Node ID Assignment for Mobile P2P Networks. CoRR abs/1905.05388 (2019) - [i2]Nemi Chandra Rathore, Somanath Tripathy:
InfoRest: Restricting Privacy Leakage to Online Social Network App. CoRR abs/1905.06403 (2019) - [i1]Chanchal Suman, Somanath Tripathy, Sriparna Saha:
Building an Effective Intrusion Detection System using Unsupervised Feature Selection in Multi-objective Optimization Framework. CoRR abs/1905.06562 (2019) - 2018
- [c33]Srikanta Pradhan, Somanath Tripathy, Sukumar Nandi:
Blockchain based Security Framework for P2P Filesharing system. ANTS 2018: 1-6 - [c32]Nemi Chandra Rathore, Somanath Tripathy:
Epidemic model based visibility estimation in Online Social Networks. ICACCI 2018: 2161-2168 - [c31]Sumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh:
GMP2P: Mobile P2P over GSM for Efficient File Sharing. ICDCIT 2018: 217-231 - [c30]Sumit Kumar Tetarave, Somanath Tripathy, R. K. Ghosh:
V-Chord: An efficient file sharing on LTE/GSM Network. ICDCN 2018: 38:1-38:8 - [c29]Sumit Kumar Tetarave, Somanath Tripathy:
Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks. ISEA-ISAP 2018: 3-16 - [c28]Devansh Gupta, Somanath Tripathy, Bodhisatwa Mazumdar:
Correlation Power Analysis on KASUMI: Attack and Countermeasure. SPACE 2018: 142-156 - [c27]Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John:
eBot: Approach Towards Modeling an Advanced P2P Botnet. TrustCom/BigDataSE 2018: 391-396 - 2017
- [j10]Nemi Chandra Rathore, Somanath Tripathy:
A trust-based collaborative access control model with policy aggregation for online social networks. Soc. Netw. Anal. Min. 7(1): 7:1-7:13 (2017) - [c26]Sanjeet Kumar Nayak, Somanath Tripathy:
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. ICISS 2017: 50-67 - [c25]Somanath Tripathy, Praveen Kumar:
CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. NSS 2017: 87-98 - [c24]Srikanta Pradhan, Somanath Tripathy:
CAP: collaborative attack on pastry. SIN 2017: 319-322 - 2016
- [j9]Rakesh Matam, Somanath Tripathy:
Secure Multicast Routing Algorithm for Wireless Mesh Networks. J. Comput. Networks Commun. 2016: 1563464:1-1563464:11 (2016) - [c23]Nemi Chandra Rathore, Prashant Shaw, Somanath Tripathy:
Collaborative Access Control Mechanism for Online Social Networks. ICDCIT 2016: 142-147 - [c22]Sanjeet Kumar Nayak, Somanath Tripathy:
Privacy Preserving Provable Data Possession for Cloud Based Electronic Health Record System. Trustcom/BigDataSE/ISPA 2016: 860-867 - 2015
- [c21]Sumit Kumar Tetarave, Somanath Tripathy, Sathya Peri:
S-Gossip: Security Enhanced Gossip Protocol for Unstructured P2P Networks. ICDCIT 2015: 288-298 - [c20]Nemi Chandra Rathore, Somanath Tripathy, Joydeep Chandra:
Predicting User Visibility in Online Social Networks Using Local Connectivity Properties. ICDCIT 2015: 419-430 - 2014
- [j8]Rakesh Matam, Somanath Tripathy:
Provably Secure Routing Protocol for Wireless Mesh Networks. Int. J. Netw. Secur. 16(3): 168-178 (2014) - [j7]Tapas Pandit, Rana Barua, Somanath Tripathy:
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 65-85 (2014) - [c19]Amandeep Singh, Somanath Tripathy:
TabSol: An Efficient Framework to Defend Tabnabbing. ICIT 2014: 173-178 - [c18]Rakesh Matam, Somanath Tripathy, Swathi Bhumireddy:
Provably secure Peer-link establishment protocol for wireless mesh networks. ICACCI 2014: 1636-1642 - [c17]Tapas Pandit, Rana Barua, Somanath Tripathy:
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. NSS 2014: 435-447 - 2013
- [j6]Rakesh Matam, Somanath Tripathy:
WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013: 180 (2013) - [j5]Somanath Tripathy:
ESF: an efficient security framework for wireless sensor network. Int. J. Commun. Networks Distributed Syst. 10(2): 176-194 (2013) - [j4]Rakesh Matam, Somanath Tripathy:
Improved heuristics for multicast routing in wireless mesh networks. Wirel. Networks 19(8): 1829-1837 (2013) - [c16]Rakesh Matam, Somanath Tripathy:
AFC: An Effective Metric for Reliable Routing in Wireless Mesh Networks. TrustCom/ISPA/IUCC 2013: 73-80 - 2012
- [c15]Swathi Bhumireddy, Somanath Tripathy, Rakesh Matam:
Secure Peer-Link Establishment in Wireless Mesh Networks. ACITY (1) 2012: 189-198 - [c14]Rakesh Matam, Somanath Tripathy:
Reliability Enhanced Routing Protocol for Wireless Mesh Networks. ACITY (1) 2012: 587-596 - [c13]Madhumita Mishra, Somanath Tripathy, Sathya Peri:
SEPastry: Security Enhanced Pastry. ACITY (1) 2012: 789-795 - [c12]Rakesh Matam, Somanath Tripathy:
Defence against Wormhole Attacks in Wireless Mesh Networks. ICISS 2012: 181-193 - [c11]Somanath Tripathy, Debasish Sahoo:
WAKE: Authentication and Key Establishment for Wireless Mesh Network. SNDS 2012: 64-74 - 2011
- [c10]Rakesh Matam, Somanath Tripathy:
FRI-attack: fraduelent routing information attack on wireless mesh network. ACWR 2011: 335-338 - [c9]Rakesh Matam, Somanath Tripathy:
THWMP: trust based secure routing for wireless mesh networks. ICCCS 2011: 40-45 - 2010
- [c8]Somanath Tripathy:
Tin-Key: Effective Key-Establishment for Wireless Sensor Networks. CIT 2010: 916-921
2000 – 2009
- 2009
- [j3]Somanath Tripathy, Sukumar Nandi:
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption. Int. J. Netw. Secur. 8(3): 243-252 (2009) - [c7]Somanath Tripathy:
Effective pair-wise key establishment scheme for wireless sensor networks. SIN 2009: 158-163 - 2008
- [j2]Somanath Tripathy, Sukumar Nandi:
Defense against outside attacks in wireless sensor networks. Comput. Commun. 31(4): 818-826 (2008) - [j1]Somanath Tripathy, Sukumar Nandi:
Secure user-identification and key distribution scheme preserving anonymity. Int. J. Secur. Networks 3(3): 201-205 (2008) - 2007
- [c6]V. Chennakesavulu, Sukumar Nandi, Somanath Tripathy:
OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol. ICIT 2007: 116-121 - [c5]Atanu Roy Chowdhury, Somanath Tripathy, Sukumar Nandi:
Securing Wireless Sensor Networks Against Spurious Injections. COMSWARE 2007 - [c4]Somanath Tripathy:
LISA: LIghtweight Security Algorithm for Wireless Sensor Networks. ICDCIT 2007: 129-134 - 2006
- [c3]Somanath Tripathy, Sukumar Nandi, Atanu Roy Chowdhury:
CARMA: Cellular Automata Based Remote Mutual Authentication Scheme. ICIT 2006: 190-191 - [c2]Somanath Tripathy, Atanu Roy Chowdhury, Sukumar Nandi:
CARA: Cellular automata based remote-user authentication scheme. COMSWARE 2006: 1-4 - [c1]Somanath Tripathy, Sukumar Nandi:
Efficient Remote User Authentication and Key Establishment for Multi-server Environment. ICDCIT 2006: 333-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint