The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Amit Purohit, Vishnu Navda, Tzi-cker Chiueh Tracing the Root of "Rootable" Processes. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Haizhi Xu, Wenliang Du, Steve J. Chapin Detecting Exploit Code Execution in Loadable Kernel Modules. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ajay Gupta 0002, Daniel C. DuVarney Using Predators to Combat Worms and Viruses: A Simulation-Based Study. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steven Noel, Eric Robertson 0001, Sushil Jajodia Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xinzhou Qin, Wenke Lee Attack Plan Recognition and Prediction Using Causal Networks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1J. J. Brennan, Mindy Rudell, Donald B. Faatz, Carson Zimmerman Visualizing Enterprise-Wide Security (VIEWS). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jingyu Zhou, Giovanni Vigna Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kalyan S. Perumalla, Srikanth Sundaragopalan High-Fidelity Modeling of Computer Network Worms. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dingbang Xu, Peng Ning Alert Correlation through Triggering Events and Common Resources. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shai Rubin, Somesh Jha, Barton P. Miller Automatic Generation and Analysis of NIDS Attacks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhuowei Li 0001, Amitabha Das Visualizing and Identifying Intrusion Context from System Calls Trace. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marvin Schaefer If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ninghui Li, John C. Mitchell, Derrick Tong Securing Java RMI-Based Distributed Applications. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Fu-Hau Hsu, Tzi-cker Chiueh CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hailin Wu, Andrew Burt, Ramki Thurimella Making Secure TCP Connections Resistant to Server Failures. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante Differential Data Protection for Dynamic Distributed Application. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Eugene H. Spafford A Failure to Learn from the Past. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ramaswamy Chandramouli A Policy Validation Framework for Enterprise Authorization Specification. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Holger Peine, Reinhard Schwarz A Multi-View Tool for Checking the Security Semantics of Router Configurations. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Lance Spitzner Honeypots: Catching the Insider Threat. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Frédéric Cuppens, Alexandre Miège Modelling Contexts in the Or-BAC Model. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti How to unwittingly sign non-repudiable documents with Java applications. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Peter G. Neumann, Richard J. Feiertag PSOS Revisited. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, A. Ornaghi, Emilia Rosti S-ARP: a Secure Address Resolution Protocol. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Kulesh Shanmugasundaram, Nasir D. Memon Automatic Reassembly of Document Fragments via Context Based Statistical Models. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms
1Zhaole Chen, Moon-Chuen Lee An IP Traceback Technique against Denial-of-Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Meng Yu 0001, Peng Liu 0005, Wanyu Zang Multi-Version Attack Recovery for Workflow System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Stephen D. Wolthusen Goalkeeper: Close-In Interface Protection. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs 0001 Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer Intrusion Detection: A Bioinformatics Approach. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection
1Jacob Zimmermann, Ludovic Mé, Christophe Bidan Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Matthew M. Williamson Design, Implementation and Test of an Email Virus Throttle. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Giovanni Iachello Protecting Personal Data: Can IT Security Management Standards Help? Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF personal data protection, IS17799, multilateral security, privacy, HIPAA, information security management
1Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur Bayesian Event Classification for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dirk Balfanz Usable Access Control for the World Wide Web. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Clark Weissman MLS-PCA: A High Assurance Security Architecture for Future Avionics. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost Poly2 Paradigm: A Secure Network Service Architecture. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Raj Mohan, Timothy E. Levin, Cynthia E. Irvine An Editor for Adaptive XML-Based Policy Management of IPsec. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tye Stallard, Karl N. Levitt Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Darren Mutz, Giovanni Vigna, Richard A. Kemmerer An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks
1Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar 0001 Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou 0001, Kenneth E. Rowe Log Correlation for Intrusion Detection: A Proof of Concept. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  BibTeX  RDF
1Jeff Jianxin Yan Security Design in Online Games. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1James P. Early, Carla E. Brodley, Catherine Rosenberg Behavioral Authentication of Server Flows. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001 Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1O. Sami Saydjari, Carla Marceau Themes and Highlights of the New Security Paradigms Workshop 2003. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
1Nathan Carey, George M. Mohay, Andrew J. Clark Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson Synthesizing Test Data for Fraud Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro Forum Session: Security for Wireless Sensor Networks. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1John Viega Practical Random Number Generation in Software. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson Scalable and Efficient PKI for Inter-Organizational Communication. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer A Stateful Intrusion Detection System for World-Wide Web Servers. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, World-Wide Web, Intrusion Detection
1Frank Adelstein, Matthew Stillerman, Dexter Kozen Malicious Code Detection for Open Firmware. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Richard A. Kemmerer A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Mohammad A. Al-Kahtani, Ravi S. Sandhu A Model for Attribute-Based User-Role Assignment. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad A Context-Aware Security Architecture for Emerging Applications. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tuomas Aura, Michael Roe, Jari Arkko Security of Internet Location Management. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith Digging For Worms, Fishing For Answers. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ronald W. Ritchey, Brian O'Berry, Steven Noel Representing TCP/IP Connectivity For Topological Analysis of Network Security. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Matthew Schmid, Frank Hill, Anup K. Ghosh Protecting Data from Malicious Software. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Matthew M. Williamson Throttling Viruses: Restricting propagation to defeat malicious mobile code. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Karl N. Levitt Intrusion Detection: Current Capabilities and Future Directions. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Paul A. Karger, Roger R. Schell Thirty Years Later: Lessons from the Multics Security Evaluation. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Dale M. Johnson Wireless Security: Vulnerabilities and Countermeasures. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Marcel Waldvogel GOSSIB vs. IP Traceback Rumors. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Axel Kern Advanced Features for Enterprise-Wide Role-Based Access Control. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Thomas Toth, Christopher Krügel Evaluating the Impact of Automated Intrusion Response Mechanisms. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1O. Sami Saydjari LOCK : An Historical Perspective. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Victoria Ungureanu Regulating E-Commerce through Certified Contracts. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael Weber, Matthew Schmid, Michael Schatz, David Geyer A Toolkit for Detecting and Analyzing Malicious Software. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum A Security Architecture for Object-Based Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Cristina Serban, O. Sami Saydjari Themes and Highlights of the New Security Paradigms Workshop 2002. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael Clifford Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Herbert Leitold, Arno Hollosi, Reinhard Posch Security Architecture of the Austrian Citizen Card Concept. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1John Haggerty, Qi Shi 0001, Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr. Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay Gender-Preferential Text Mining of E-mail Discourse. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Andrew D. Marshall A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt Detecting and Defending against Web-Server Fingerprinting. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Daniel E. Geer Jr., John Harthorne Penetration Testing: A Duet. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Peng Liu 0005 Architectures for Intrusion Tolerant Database Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  BibTeX  RDF
1Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Controlled Physical Random Functions. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hanno Langweg With Gaming Technology towards Secure User Interfaces. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Donghua Xu, Chenghuai Lu, André L. M. dos Santos Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer Composable Tools For Network Discovery and Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Network Modeling and Analysis, Network Discovery and Validation, Network Security
1John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval A Secure Directory Service based on Exclusive Encryption. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Andreas Schaad, Jonathan D. Moffett A Framework for Organisational Control Principles. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Weijiang Yu, Aloysius K. Mok Enforcing Resource Bound Safety for Mobile SNMP Agents. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Roberto Barbieri, Danilo Bruschi, Emilia Rosti Voice over IPsec: Analysis and Solutions. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kevin Scott, Jack W. Davidson Safe Virtual Execution Using Software Dynamic Translation. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl Reusable Components for Developing Security-Aware Application. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell Access Control for Active Spaces. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1101 - #1200 of 1667 (100 per page; Change: )
Pages: [<<][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license