


default search action
Tyler Moore 0001
Person information
- affiliation: The University of Tulsa, OK, USA
- affiliation (former): Southern Methodist University, TX, USA
- affiliation (former): University of Cambridge, UK
Other persons with the same name
- Tyler Moore 0002
— University of Memphis, Electrical Engineering and Computer Science, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c72]Abulfaz Hajizada, Matthew Adams, Tyler Moore:
Construction and Analysis of a Large-Scale Firm-Level Cybersecurity Posture Dataset. AMCIS 2024 - [c71]Samantha Phillips, Sal Aurigemma, Bradley Brummel, Tyler Moore:
Leveraging Situational Judgment Tests to Measure Behavioral Information Security. HICSS 2024: 4714-4723 - [c70]Geoffrey Simpson, Tyler Moore:
Identifying Subdomain Doppelganger Attacks against Companies. HICSS 2024: 7387-7396 - 2023
- [j26]Neil Gandal, Tyler Moore
, Michael Riordan, Noa Barnir:
Empirically evaluating the effect of security precautions on cyber incidents. Comput. Secur. 133: 103380 (2023) - [c69]Andrew Morin, Tyler Moore
:
How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities. EuroS&P Workshops 2023: 207-215 - [c68]Abulfaz Hajizada, Tyler Moore
:
On Gaps in Enterprise Cyber Attack Reporting. EuroS&P Workshops 2023: 227-231 - 2022
- [c67]Andrew Morin, Tyler Moore
:
Towards Cost-Balanced Intrusion Detection in OT Environments. CNS 2022: 1-6 - [c66]Andrew Morin, Tyler Moore:
Towards Cost-Balanced Intrusion Detection in OT Environments. CNS 2022: 1-6 - [c65]Arghya Mukherjee
, Tyler Moore
:
Cryptocurrency Exchange Closure Revisited (Again). eCrime 2022: 1-8 - [c64]Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, Tyler Moore
:
"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk. eCrime 2022: 1-12 - [c63]Jonathan Codi West
, Tyler Moore
:
Longitudinal Study of Internet-Facing OpenSSH Update Patterns. PAM 2022: 675-689 - 2021
- [j25]Daniel W. Woods, Tyler Moore
, Andrew C. Simpson
:
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices. DTRAP 2(2): 10:1-10:21 (2021) - [j24]J. T. Hamrick, Farhang Rouhi, Arghya Mukherjee
, Amir Feder, Neil Gandal
, Tyler Moore
, Marie Vasek
:
An examination of the cryptocurrency pump-and-dump ecosystem. Inf. Process. Manag. 58(4): 102506 (2021) - [c62]J. T. Hamrick, Farhang Rouhi, Arghya Mukherjee
, Marie Vasek
, Tyler Moore
, Neil Gandal:
Analyzing Target-Based Cryptocurrency Pump and Dump Schemes. DeFi@CCS 2021: 21-27 - [c61]Mathew Vermeer
, Jonathan West
, Alejandro Cuevas, Shuonan Niu, Nicolas Christin
, Michel van Eeten
, Tobias Fiebig
, Carlos Gañán, Tyler Moore
:
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations. EuroS&P 2021: 440-456 - [c60]Andrew Morin, Marie Vasek
, Tyler Moore
:
Detecting Text Reuse in Cryptocurrency Whitepapers. IEEE ICBC 2021: 1-5 - 2020
- [j23]Daniel W. Woods
, Tyler Moore
:
Cyber warranties: market fix or marketing trick? Commun. ACM 63(4): 104-107 (2020) - [j22]Rainer Böhme
, Lisa Eckey, Tyler Moore
, Neha Narula, Tim Ruffing, Aviv Zohar:
Responsible vulnerability disclosure in cryptocurrencies. Commun. ACM 63(10): 62-71 (2020) - [j21]Daniel W. Woods
, Tyler Moore
:
Does Insurance Have a Future in Governing Cybersecurity? IEEE Secur. Priv. 18(1): 21-27 (2020) - [c59]Geoffrey Simpson, Tyler Moore
:
Empirical Analysis of Losses from Business-Email Compromise. eCrime 2020: 1-7 - [c58]Geoffrey Simpson, Tyler Moore
, Richard Clayton:
Ten years of attacks on companies using visual impersonation of domain names. eCrime 2020: 1-12 - [e5]Tamara Denning, Tyler Moore:
13th USENIX Workshop on Cyber Security Experimentation and Test, CSET 2020, August 10, 2020. USENIX Association 2020 [contents]
2010 – 2019
- 2019
- [e4]Ian Goldberg, Tyler Moore:
Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11598, Springer 2019, ISBN 978-3-030-32100-0 [contents] - [i5]Benjamin Johnson, Aron Laszka, Jens Grossklags, Tyler Moore:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. CoRR abs/1904.09381 (2019) - 2018
- [j20]Tyler Moore
, Nicolas Christin
, Janos Szurdi:
Revisiting the Risks of Bitcoin Currency Exchange Closure. ACM Trans. Internet Techn. 18(4): 50:1-50:18 (2018) - [c57]Marie Vasek
, Tyler Moore
:
Analyzing the Bitcoin Ponzi Scheme Ecosystem. Financial Cryptography Workshops 2018: 101-112 - [c56]Benjamin Johnson, Aron Laszka
, Jens Grossklags, Tyler Moore
:
Economic Analyses of Security Investments on Cryptocurrency Exchanges. iThings/GreenCom/CPSCom/SmartData 2018: 1253-1262 - [c55]Muwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, Tyler Moore:
Cybersecurity Research Datasets: Taxonomy and Empirical Analysis. CSET @ USENIX Security Symposium 2018 - 2017
- [j19]Mohammad Hanif Jhaveri
, Orçun Çetin, Carlos Gañán, Tyler Moore
, Michel van Eeten
:
Abuse Reporting and the Fight Against Cybercrime. ACM Comput. Surv. 49(4): 68:1-68:27 (2017) - [j18]Amir Feder, Neil Gandal, J. T. Hamrick, Tyler Moore
:
The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. J. Cybersecur. 3(2): 137-144 (2017) - [j17]Jake Drew
, Michael Hahsler
, Tyler Moore
:
Polymorphic malware detection using sequence classification methods and ensembles. EURASIP J. Inf. Secur. 2017: 2 (2017) - [j16]Tyler Moore
:
On the harms arising from the Equifax data breach of 2017. Int. J. Crit. Infrastructure Prot. 19: 47-48 (2017) - [c54]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore
, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CCS 2017: 553-567 - [c53]Jonathan M. Spring
, Tyler Moore
, David J. Pym:
Practicing a Science of Security: A Philosophy of Science Perspective. NSPW 2017: 1-18 - [i4]Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten:
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting. CoRR abs/1708.06693 (2017) - 2016
- [j15]Tyler Moore, David J. Pym, Michel van Eeten:
Introduction. J. Cybersecur. 2(1): 1-2 (2016) - [j14]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten
, Tyler Moore
:
Understanding the role of sender reputation in abuse reporting and cleanup. J. Cybersecur. 2(1): 83-98 (2016) - [j13]Tyler Moore
, David J. Pym:
Editorial. J. Cybersecur. 2(2): 119-120 (2016) - [j12]Tyler Moore
:
The dangers of cyber security folk wisdom. Int. J. Crit. Infrastructure Prot. 12: 27-28 (2016) - [j11]Marie Vasek
, John Wadleigh, Tyler Moore
:
Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. IEEE Trans. Dependable Secur. Comput. 13(2): 206-219 (2016) - [j10]Markus Riek, Rainer Böhme
, Tyler Moore
:
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance. IEEE Trans. Dependable Secur. Comput. 13(2): 261-273 (2016) - [c52]Marie Vasek, Matthew Weeden, Tyler Moore:
Measuring the Impact of Sharing Abuse Data with Web Hosting Providers. WISCS@CCS 2016: 71-80 - [c51]Marie Vasek
, Joseph Bonneau, Ryan Castellucci, Cameron Keith, Tyler Moore
:
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. Financial Cryptography 2016: 609-618 - [c50]Jake Drew, Tyler Moore
, Michael Hahsler:
Polymorphic Malware Detection Using Sequence Classification Methods. IEEE Symposium on Security and Privacy Workshops 2016: 81-87 - [i3]Tyler W. Moore, Christian W. Probst, Kai Rannenberg, Michel van Eeten:
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). Dagstuhl Reports 6(11): 63-89 (2016) - 2015
- [j9]Tyler Moore
, David J. Pym:
Welcome from the Editors-in-Chief. J. Cybersecur. 1(1): 1-2 (2015) - [c49]Tyler Moore
, Richard Clayton:
Which malware lures work best? Measurements from a large instant messaging worm. eCrime 2015: 69-78 - [c48]Marie Vasek
, Tyler Moore
:
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. Financial Cryptography 2015: 44-61 - [c47]Orçun Çetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, Tyler Moore:
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. WEIS 2015 - [c46]Richard Clayton, Tyler Moore, Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration. WEIS 2015 - [c45]John Wadleigh, Jake Drew, Tyler Moore
:
The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods. WWW 2015: 1188-1197 - 2014
- [j8]Jake Drew, Tyler Moore
:
Optimized combined-clustering methods for finding replicated criminal websites. EURASIP J. Inf. Secur. 2014: 14 (2014) - [c44]Nektarios Leontiadis, Tyler Moore
, Nicolas Christin
:
A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning. CCS 2014: 930-941 - [c43]Tyler Moore
, Richard Clayton:
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites. Financial Cryptography 2014: 33-48 - [c42]Marie Vasek
, Micah Thornton, Tyler Moore
:
Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. Financial Cryptography Workshops 2014: 57-71 - [c41]Benjamin Johnson, Aron Laszka
, Jens Grossklags, Marie Vasek
, Tyler Moore
:
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools. Financial Cryptography Workshops 2014: 72-86 - [c40]Marie Vasek
, Tyler Moore
:
Identifying Risk Factors for Webserver Compromise. Financial Cryptography 2014: 326-345 - [c39]Jake Drew, Tyler Moore
:
Automatic Identification of Replicated Criminal Websites Using Combined Clustering. IEEE Symposium on Security and Privacy Workshops 2014: 116-123 - [e3]Rainer Böhme, Michael Brenner, Tyler Moore
, Matthew Smith:
Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8438, Springer 2014, ISBN 978-3-662-44773-4 [contents] - 2013
- [j7]Stephen M. Papa, William D. Casper, Tyler Moore
:
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis. Int. J. Crit. Infrastructure Prot. 6(2): 96-106 (2013) - [j6]Tyler Moore
:
The promise and perils of digital currencies. Int. J. Crit. Infrastructure Prot. 6(3-4): 147-149 (2013) - [c38]Marie Vasek
, Tyler Moore
:
Empirical analysis of factors affecting malware URL detection. eCrime 2013: 1-8 - [c37]Tyler Moore
, Nicolas Christin
:
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. Financial Cryptography 2013: 25-33 - [c36]Nektarios Leontiadis
, Tyler Moore, Nicolas Christin
:
Pick your poison: pricing and inventories at unlicensed online pharmacies. EC 2013: 621-638 - [p3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten
, Michael Levi, Tyler Moore
, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2012
- [j5]Susan Landau, Tyler Moore:
Economic tussles in federated identity management. First Monday 17(10) (2012) - [c35]Rainer Böhme, Tyler Moore
:
How do consumers react to cybercrime? eCrime Researchers Summit 2012: 1-12 - [c34]Tyler Moore
, Richard Clayton:
Discovering phishing dropboxes using email metadata. eCrime Researchers Summit 2012: 1-9 - [c33]Tyler Moore
, Jie Han, Richard Clayton:
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. Financial Cryptography 2012: 41-56 - [c32]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest
:
Beyond the blacklist: modeling malware spread and the effect of interventions. NSPW 2012: 53-66 - [c31]Marie Vasek, Tyler Moore:
Do Malware Reports Expedite Cleanup? An Experimental Study. CSET 2012 - [c30]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - [i2]Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest:
Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions. CoRR abs/1202.3987 (2012) - [i1]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. CoRR abs/1202.4008 (2012) - 2011
- [c29]Tyler Moore
, Nektarios Leontiadis
, Nicolas Christin
:
Fashion crimes: trending-term exploitation on the web. CCS 2011: 455-466 - [c28]Tyler Moore
, Richard Clayton:
Ethical Dilemmas in Take-Down Research. Financial Cryptography Workshops 2011: 154-168 - [c27]Nektarios Leontiadis, Tyler Moore, Nicolas Christin:
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade. USENIX Security Symposium 2011 - [c26]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS 2011 - [c25]Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest
, Benjamin Edwards, George Stelle:
Modeling Internet-Scale Policies for Cleaning up Malware. WEIS (Springer Volume) 2011: 149-170 - [c24]Susan Landau, Tyler Moore:
Economic Tussles in Federated Identity Management. WEIS 2011 - 2010
- [j4]Rainer Böhme, Tyler Moore
:
The Iterated Weakest Link. IEEE Secur. Priv. 8(1): 53-55 (2010) - [j3]Tal Moran, Tyler Moore
:
The Phish-Market Protocol: Secure Sharing Between Competitors. IEEE Secur. Priv. 8(4): 40-45 (2010) - [j2]Tyler Moore
:
The economics of cybersecurity: Principles and policy options. Int. J. Crit. Infrastructure Prot. 3(3-4): 103-117 (2010) - [c23]Tyler Moore
, Benjamin Edelman:
Measuring the Perpetrators and Funders of Typosquatting. Financial Cryptography 2010: 175-191 - [c22]Tal Moran, Tyler Moore
:
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. Financial Cryptography 2010: 222-237 - [c21]Tyler Moore
, Allan Friedman, Ariel D. Procaccia:
Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems. NSPW 2010: 85-94 - [e2]Tyler Moore, Sujeet Shenoi:
Critical Infrastructure Protection IV - Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers. IFIP Advances in Information and Communication Technology 342, Springer 2010, ISBN 978-3-642-16805-5 [contents]
2000 – 2009
- 2009
- [c20]Tyler Moore
, Richard Clayton:
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Financial Cryptography 2009: 256-272 - [c19]Tyler Moore, Richard Clayton:
Temporal Correlations between Spam and Phishing Websites. LEET 2009 - [c18]Rainer Böhme, Tyler Moore:
The Iterated Weakest Link - A Model of Adaptive Security Investment. WEIS 2009 - [p2]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. Managing Information Risk and the Economics of Security 2009: 55-80 - [p1]Tyler Moore, Richard Clayton:
The Impact of Incentives on Notice and Take-down. Managing Information Risk and the Economics of Security 2009: 199-223 - 2008
- [b1]Tyler Moore:
Cooperative attack and defense in distributed networks. University of Cambridge, UK, 2008 - [c17]Tyler Moore
, Richard Clayton:
The consequence of non-cooperation in the fight against phishing. eCrime 2008: 1-14 - [c16]Tyler Moore
, Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. Financial Cryptography 2008: 16-30 - [c15]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore
:
Security Economics and European Policy. ISSE 2008: 57-76 - [c14]Tyler Moore
, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos
, Ross J. Anderson, Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks. SECON 2008: 135-143 - [c13]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. WEIS 2008 - [c12]Tyler Moore, Richard Clayton:
The Impact of Incentives on Notice and Take-down. WEIS 2008 - 2007
- [c11]Ross J. Anderson, Tyler Moore
:
Information Security Economics - and Beyond. CRYPTO 2007: 68-91 - [c10]Tyler Moore
, Richard Clayton:
Examining the impact of website take-down on phishing. eCrime Researchers Summit 2007: 1-13 - [c9]Tyler Moore
, Jolyon Clulow, Shishir Nagaraja, Ross J. Anderson:
New Strategies for Revocation in Ad-Hoc Networks. ESAS 2007: 232-246 - [c8]Tyler Moore
, Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. SEC 2007: 157-168 - [c7]Tyler Moore, Richard Clayton:
An Empirical Analysis of the Current State of Phishing Attack and Defence. WEIS 2007 - [e1]Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j1]Jolyon Clulow, Tyler Moore
:
Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Oper. Syst. Rev. 40(3): 18-21 (2006) - [c6]Jolyon Clulow, Gerhard P. Hancke
, Markus G. Kuhn
, Tyler Moore
:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. ESAS 2006: 83-97 - [c5]Christopher Swenson, Tyler Moore, Sujeet Shenoi:
GSM Cell Site Forensics. IFIP Int. Conf. Digital Forensics 2006: 259-272 - [c4]Tyler Moore
:
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks. PerCom Workshops 2006: 251-255 - [c3]Tyler Moore:
The Economics of Digital Forensics. WEIS 2006 - 2005
- [c2]Tyler Moore, Anthony Meehan, Gavin Manes, Sujeet Shenoi:
Using Signaling Information in Telecom Network Forensics. IFIP Int. Conf. Digital Forensics 2005: 177-188 - [c1]Tyler Moore:
Countering Hidden-Action Attacks on Networked Systems. WEIS 2005
Coauthor Index
aka: Michel J. G. van Eeten

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint