% Encoding: UTF-8 @inproceedings{esa-2022, title = {When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting}, author = {Arghya Bhattacharya and Helen Xu and Abiyaz Chowdhury and Rezaul Chowdhury and Rathish Das and Rob Johnson and Rishab Nithyanand and Michael Bender}, booktitle = {Proceedings of the 2022 European Symposium on Algorithms (ESA 2022)}, keywords = {review, pretenure}, year = {2022}, month = {9} } @inproceedings{pets-2022, title = {ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem}, author = {Maaz Bin Musa and Rishab Nithyanand}, booktitle = {Proceedings of the 2022 Privacy Enhancing Technologies Symposium (PETS 2022)}, keywords = {review, pretenure}, options = {contrib=\majorc}, year = {2022}, month = {7} } @inproceedings{cscw-2022-1, author = {Arun Dunna and Katherine Keith and Ethan Zuckerman and Narseo Vallina-Rodriguez and Brendan O'Connor and Rishab Nithyanand}, title = {Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube's Demonetization Algorithms}, booktitle = {Proceedings of the 2022 ACM Conference on Computer Supported Cooperative Work (ACM CSCW 2022)}, options = {contrib=\majorc}, keywords = {appear}, year = {2022}, month = {9} } @inproceedings{cscw-2022-2, title = {Pathways to Radical Misogyny: How Participation, Interaction, and Perception in Online Communities Increase Radical Behavior}, author = {Hussam Habib and Padmini Srinivasan and Rishab Nithyanand}, booktitle = {Proceedings of the 2022 ACM Conference on Computer Supported Cooperative Work (ACM CSCW 2022)}, keywords = {review, maj, pretenure}, options = {contrib=\majorc}, year = {2022}, month = {9} } @inproceedings{icwsm-2022-2, title = {Exploring the Magnitude and Effects of Media Influence on Reddit}, author = {Hussam Habib and Rishab Nithyanand}, booktitle = {Proceedings of the 2022 International AAAI Conference on Web and Social Media (AAAI ICWSM 2022)}, options = {contrib=\majorc}, keywords = {appear, pretenure}, year = {2022}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/19291/19063.pdf}, month = {6} } @inproceedings{icwsm-2022-1, author = {Hussam Habib and Maaz Bin Musa and Fareed Zaffar and Rishab Nithyanand}, title = {Are Proactive Interventions for Reddit Communities Feasible?}, booktitle = {Proceedings of the 2022 International AAAI Conference on Web and Social Media (AAAI ICWSM 2022)}, options = {contrib=\majorc}, year = {2022}, month = {6}, url = {https://ojs.aaai.org/index.php/ICWSM/article/view/19290/19062.pdf}, keywords = {appear}, } @inproceedings{ica-2022, title = {Relationships Among Vaccination Attitudes, Social Media Use, and Activist vs. Radical Behavior}, author = {Ryan Stoldt and Andrew High and Ashley Peterson and Kathryn Biddle and Raven Maragh-Lloyd and Rishab Nithyanand and Brian Ekdale and Timothy Havens and Hussam Habib and John Thiede}, booktitle = {Proceedings of the 72nd Annual International Communication Association Conference (ICA 2022)}, year = {2022}, month = {5}, options = {contrib=\secondc}, } @inproceedings{DBLP:conf/anrw/SinghNAPTGP18, author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael Carl Tschantz and Phillipa Gill and Vern Paxson}, title = {Characterizing the Nature and Dynamics of Tor Exit Blocking}, booktitle = {Proceedings of the Applied Networking Research Workshop, {ANRW} 2018, Montreal, QC, Canada, July 16-16, 2018}, pages = {23}, year = {2018}, crossref = {DBLP:conf/anrw/2018}, url = {https://doi.org/10.1145/3232755.3232786}, doi = {10.1145/3232755.3232786}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/anrw/SinghNAPTGP18}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=7, } @inproceedings{DBLP:conf/ndss/RazaghpanahNVSA18, author = {Abbas Razaghpanah and Rishab Nithyanand and Narseo Vallina{-}Rodriguez and Srikanth Sundaresan and Mark Allman and Christian Kreibich and Phillipa Gill}, title = {Apps, Trackers, Privacy, and Regulators: {A} Global Study of the Mobile Tracking Ecosystem}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, year = {2018}, crossref = {DBLP:conf/ndss/2018}, url = {https://haystack.mobi/papers/ndss18_ats.pdf}, timestamp = {Thu, 09 Aug 2018 10:56:55 +0200}, biburl = {https://dblp.org/rec/bib/conf/ndss/RazaghpanahNVSA18}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=2, } @inproceedings{DBLP:conf/conext/ChoNRG17, author = {Shinyoung Cho and Rishab Nithyanand and Abbas Razaghpanah and Phillipa Gill}, title = {A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography}, booktitle = {Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, CoNEXT 2017, Incheon, Republic of Korea, December 12 - 15, 2017}, pages = {81--87}, year = {2017}, crossref = {DBLP:conf/conext/2017}, url = {https://people.cs.umass.edu/~phillipa/papers/conext2017_churn_paper.pdf}, doi = {10.1145/3143361.3143386}, timestamp = {Tue, 06 Nov 2018 16:58:30 +0100}, biburl = {https://dblp.org/rec/bib/conf/conext/ChoNRG17}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=12, } @inproceedings{DBLP:conf/uss/NithyanandSG17, author = {Rishab Nithyanand and Brian Schaffner and Phillipa Gill}, title = {Measuring Offensive Speech in Online Political Discourse}, booktitle = {7th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} 2017, Vancouver, BC, Canada, August 14, 2017.}, year = {2017}, crossref = {DBLP:conf/uss/2017foci}, url = {https://www.usenix.org/system/files/conference/foci17/foci17-paper-nithyanand.pdf}, timestamp = {Fri, 01 Sep 2017 12:25:32 +0200}, biburl = {https://dblp.org/rec/bib/conf/uss/NithyanandSG17}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=8, } @inproceedings{DBLP:conf/uss/SinghNAPTGP17, author = {Rachee Singh and Rishab Nithyanand and Sadia Afroz and Paul Pearce and Michael Carl Tschantz and Phillipa Gill and Vern Paxson}, title = {Characterizing the Nature and Dynamics of Tor Exit Blocking}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017.}, pages = {325--341}, year = {2017}, crossref = {DBLP:conf/uss/2017}, url = {https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-singh.pdf}, timestamp = {Fri, 01 Sep 2017 12:24:05 +0200}, biburl = {https://dblp.org/rec/bib/conf/uss/SinghNAPTGP17}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=8, } @inproceedings{DBLP:conf/eurosp/HahnNGJ16, author = {Bridger Hahn and Rishab Nithyanand and Phillipa Gill and Rob Johnson}, title = {Games without Frontiers: Investigating Video Games as a Covert Channel}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {63--77}, year = {2016}, crossref = {DBLP:conf/eurosp/2016}, url = {https://people.cs.umass.edu/~phillipa/papers/castle.pdf}, doi = {10.1109/EuroSP.2016.17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurosp/HahnNGJ16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=2, } @inproceedings{DBLP:conf/ndss/NithyanandSGZS16, author = {Rishab Nithyanand and Oleksii Starov and Phillipa Gill and Adva Zair and Michael Schapira}, title = {Measuring and Mitigating AS-level Adversaries Against Tor}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, year = {2016}, crossref = {DBLP:conf/ndss/2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/measuring-mitigating-as-level-adversaries-against-tor.pdf}, timestamp = {Tue, 16 Jan 2018 13:23:48 +0100}, biburl = {https://dblp.org/rec/bib/conf/ndss/NithyanandSGZS16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=2, } @inproceedings{DBLP:conf/uss/NithyanandKJVFP16, author = {Rishab Nithyanand and Sheharbano Khattak and Mobin Javed and Narseo Vallina{-}Rodriguez and Marjan Falahrastegar and Julia E. Powles and Emiliano De Cristofaro and Hamed Haddadi and Steven J. Murdoch}, title = {Adblocking and Counter Blocking: {A} Slice of the Arms Race}, booktitle = {6th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '16, Austin, TX, USA, August 8, 2016.}, year = {2016}, crossref = {DBLP:conf/uss/2016foci}, url = {https://www.usenix.org/system/files/conference/foci16/foci16-paper-nithyanand.pdf}, timestamp = {Sat, 07 Jul 2018 14:00:39 +0200}, biburl = {https://dblp.org/rec/bib/conf/uss/NithyanandKJVFP16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=8, } @inproceedings{DBLP:conf/ccs/CaiNWJG14, author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg}, title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {227--238}, year = {2014}, crossref = {DBLP:conf/ccs/2014}, url = {https://doi.org/10.1145/2660267.2660362}, doi = {10.1145/2660267.2660362}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/ccs/CaiNWJG14}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=11, } @inproceedings{DBLP:conf/uss/WangCNJG14, author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob Johnson and Ian Goldberg}, title = {Effective Attacks and Provable Defenses for Website Fingerprinting}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014.}, pages = {143--157}, year = {2014}, crossref = {DBLP:conf/uss/2014}, url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-wang-tao.pdf}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/uss/WangCNJG14}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=8, } @inproceedings{DBLP:conf/wpes/CaiNJ14, author = {Xiang Cai and Rishab Nithyanand and Rob Johnson}, title = {CS-BuFLO: {A} Congestion Sensitive Website Fingerprinting Defense}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {121--130}, year = {2014}, crossref = {DBLP:conf/wpes/2014}, url = {https://www.freehaven.net/anonbib/cache/wpes14-csbuflo.pdf}, doi = {10.1145/2665943.2665949}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/wpes/CaiNJ14}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=11, } @inproceedings{DBLP:conf/wpes/NithyanandCJ14, author = {Rishab Nithyanand and Xiang Cai and Rob Johnson}, title = {Glove: {A} Bespoke Website Fingerprinting Defense}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {131--134}, year = {2014}, crossref = {DBLP:conf/wpes/2014}, url = {https://www.freehaven.net/anonbib/cache/wpes14-glove.pdf}, doi = {10.1145/2665943.2665950}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/wpes/NithyanandCJ14}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=11, } @inproceedings{DBLP:conf/wpes/NithyanandJ13, author = {Rishab Nithyanand and Rob Johnson}, title = {The password allocation problem: strategies for reusing passwords effectively}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {255--260}, year = {2013}, crossref = {DBLP:conf/wpes/2013}, url = {https://www3.cs.stonybrook.edu/~rob/papers/opa.pdf}, doi = {10.1145/2517840.2517870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/wpes/NithyanandJ13}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=11, } @inproceedings{DBLP:conf/sp/NithyanandS12, author = {Rishab Nithyanand and John Solis}, title = {A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {1--11}, year = {2012}, crossref = {DBLP:conf/sp/2012w}, url = {https://prod-ng.sandia.gov/techlib-noauth/access-control.cgi/2011/116673.pdf}, doi = {10.1109/SPW.2012.16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/sp/NithyanandS12}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=5, } @inproceedings{DBLP:conf/esorics/KobsaNTU11, author = {Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and Ersin Uzun}, title = {Usability of Display-Equipped {RFID} Tags for Security Purposes}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, pages = {434--451}, year = {2011}, crossref = {DBLP:conf/esorics/2011}, url = {http://sprout.ics.uci.edu/pubs/usability_of_display.pdf}, doi = {10.1007/978-3-642-23822-2\_24}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/conf/esorics/KobsaNTU11}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=9, } @inproceedings{DBLP:conf/esorics/NithyanandTU10, author = {Rishab Nithyanand and Gene Tsudik and Ersin Uzun}, title = {Readers Behaving Badly - Reader Revocation in PKI-Based {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, pages = {19--36}, year = {2010}, crossref = {DBLP:conf/esorics/2010}, url = {http://sprout.ics.uci.edu/pubs/readers_behaving.pdf}, doi = {10.1007/978-3-642-15497-3\_2}, timestamp = {Thu, 15 Jun 2017 21:35:50 +0200}, biburl = {https://dblp.org/rec/bib/conf/esorics/NithyanandTU10}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=9, } @inproceedings{DBLP:conf/huc/NithyanandSTU10, author = {Rishab Nithyanand and Nitesh Saxena and Gene Tsudik and Ersin Uzun}, title = {Groupthink: usability of secure group association for wireless devices}, booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference, UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings}, pages = {331--340}, year = {2010}, crossref = {DBLP:conf/huc/2010}, url = {http://sprout.ics.uci.edu/pubs/p331-nithyanand.pdf}, doi = {10.1145/1864349.1864399}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/conf/huc/NithyanandSTU10}, bibsource = {dblp computer science bibliography, https://dblp.org}, month = 9, } @Article{Ahmad-WWW2020, author = {Suleman Ahmad and Daniyal Dar and Narseo Vallina-Rodriguez and Fareed Zaffar and Rishab Nithyanand}, journal = {Proceedings of The Web Conference, WWW 2020, April 2020}, title = {Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web}, year = {2020}, month = {4}, url = {https://sparta.cs.uiowa.edu/docs/www-2020.pdf}, timestamp = {Tue, 23 Jul 2019 10:54:22 +0200}, } @Article{Cook-PETS2020, author = {John Cook and Rishab Nithyanand and Zubair Shafiq}, journal = {Proceedings of Privacy Enhancing Technologies Symposium, PETS 2020, July 2020}, title = {Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding}, year = {2020}, month = {7}, volume = {abs/1907.07275}, archiveprefix = {arXiv}, bibsource = {dblp computer science bibliography, https://dblp.org}, biburl = {https://dblp.org/rec/bib/journals/corr/abs-1907-07275}, eprint = {1907.07275}, timestamp = {Tue, 23 Jul 2019 10:54:22 +0200}, url = {http://arxiv.org/abs/1907.07275.pdf}, } @article{DBLP:journals/corr/abs-1711-05303, author = {Rishab Nithyanand and Brian Schaffner and Phillipa Gill}, title = {Online Political Discourse in the Trump Era}, journal = {CoRR}, volume = {abs/1711.05303}, year = {2017}, url = {http://arxiv.org/abs/1711.05303.pdf}, archivePrefix = {arXiv}, eprint = {1711.05303}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/abs-1711-05303}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=11, } @article{DBLP:journals/usenix-login/HaddadiNKJVFPCM16, author = {Hamed Haddadi and Rishab Nithyanand and Sheharbano Khattak and Mobin Javed and Narseo Vallina{-}Rodriguez and Marjan Falahrastegar and Julia E. Powles and Emiliano De Cristofaro and Steven J. Murdoch}, title = {The Adblocking Tug-of-War}, journal = {;login:}, volume = {41}, number = {4}, year = {2016}, url = {https://www.usenix.org/system/files/login/articles/login_winter16_07_haddadi.pdf}, timestamp = {Thu, 20 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/bib/journals/usenix-login/HaddadiNKJVFPCM16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=12, } @article{DBLP:journals/corr/NithyanandSCG16, author = {Rishab Nithyanand and Rachee Singh and Shinyoung Cho and Phillipa Gill}, title = {Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design}, journal = {CoRR}, volume = {abs/1605.03596}, year = {2016}, url = {http://arxiv.org/abs/1605.03596.pdf}, archivePrefix = {arXiv}, eprint = {1605.03596}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/NithyanandSCG16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=5, } @article{DBLP:journals/corr/RazaghpanahLFNV16, author = {Abbas Razaghpanah and Anke Li and Arturo Filast{\`{o}} and Rishab Nithyanand and Vasilis Ververis and Will Scott and Phillipa Gill}, title = {Exploring the Design Space of Longitudinal Censorship Measurement Platforms}, journal = {CoRR}, volume = {abs/1606.01979}, year = {2016}, url = {http://arxiv.org/abs/1606.01979.pdf}, archivePrefix = {arXiv}, eprint = {1606.01979}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/RazaghpanahLFNV16}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=6, } @article{DBLP:journals/corr/NithyanandTJ14, author = {Rishab Nithyanand and Jonathan Toohill and Rob Johnson}, title = {How Best to Handle a Dicey Situation}, journal = {CoRR}, volume = {abs/1401.7304}, year = {2014}, url = {http://arxiv.org/pdf/1401.7304.pdf}, archivePrefix = {arXiv}, eprint = {1401.7304}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/corr/NithyanandTJ14}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=1, } @article{DBLP:journals/jcs/KobsaNTU13, author = {Alfred Kobsa and Rishab Nithyanand and Gene Tsudik and Ersin Uzun}, title = {Can Jannie verify? Usability of display-equipped {RFID} tags for security purposes}, journal = {Journal of Computer Security}, volume = {21}, number = {3}, pages = {347--370}, year = {2013}, url = {https://doi.org/10.3233/JCS-130470}, doi = {10.3233/JCS-130470}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/jcs/KobsaNTU13}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=10, } @article{DBLP:journals/jcs/NithyanandTU11, author = {Rishab Nithyanand and Gene Tsudik and Ersin Uzun}, title = {User-aided reader revocation in PKI-based {RFID} systems}, journal = {Journal of Computer Security}, volume = {19}, number = {6}, pages = {1147--1172}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0435}, doi = {10.3233/JCS-2011-0435}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/bib/journals/jcs/NithyanandTU11}, bibsource = {dblp computer science bibliography, https://dblp.org}, month=12, } @inproceedings{Pouryousef-PAM2020, author = {Shahrooz Pouryousef and Daniyal Dar and Suleman Ahmad and Phillipa Gill and Rishab Nithyanand}, booktitle = {Proceedings of the Passive and Active Measurement Conference, PAM 2020, March 2020}, title = {Extortion or Expansion? An investigation into the costs and consequences of ICANN's gTLD experiments}, year = {2020}, month = {3}, url = {https://sparta.cs.uiowa.edu/docs/pam-2020.pdf}, } @Comment{jabref-meta: databaseType:bibtex;}