The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for hackers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1995 (15) 1996-1999 (17) 2000-2001 (18) 2002 (16) 2003 (24) 2004 (29) 2005 (23) 2006 (26) 2007 (33) 2008 (33) 2009 (16) 2010-2012 (22) 2013-2014 (19) 2015-2016 (24) 2017-2018 (29) 2019-2020 (17) 2021-2022 (17) 2023-2024 (10)
Publication types (Num. hits)
article(181) book(3) incollection(6) inproceedings(196) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 176 keywords

Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Ioanis Nikolaidis Honeypots, tracking hackers [Book Reviews]. Search on Bibsonomy IEEE Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Antonio Marturano Molecular biologists as hackers of human data: Rethinking IPR for bioinformatics research. Search on Bibsonomy J. Inf. Commun. Ethics Soc. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Alexander E. Voiskounsky, Olga V. Smyslova Flow-Based Model of Computer Hackers' Motivation. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Richard D. Austin Hackers, Viruses, DoS, Oh No! Search on Bibsonomy Int. CMG Conference The full citation details ... 2003 DBLP  BibTeX  RDF
20Igor V. Kotenko, Alexey Alexeev, Evgeny Man'kov Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Renata Matkeviciene What do you think about hackers? - Review of: Steven Furnell. Cybercrime: vandalizing the information society. Boston, MA: Addison-Wesley, 2002. 316p. ISBN 0-201-72159-7. Search on Bibsonomy Inf. Res. The full citation details ... 2002 DBLP  BibTeX  RDF
20Paula Roberts, Jenny Webber Virtuous Hackers: developing ethical sensitivity in a community of practice. Search on Bibsonomy Australas. J. Inf. Syst. The full citation details ... 2002 DBLP  BibTeX  RDF
20Alan D. Smith, William T. Rupp Issues in cybersecurity; understanding the potential risks associated with hackers/crackers. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Peter H. Salus, Anton Chuvakin Incident Response, and of Lance Spitzner: Honeypots: Tracking Hackers, reviewed by Eugene Schultz and Russell Shumway. Search on Bibsonomy login Usenix Mag. The full citation details ... 2002 DBLP  BibTeX  RDF
20E. Eugene Schultz Taking a stand on hackers. Search on Bibsonomy Comput. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Gorm Salomonsen Protection Against Hackers on Client Computers for e-Voting Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20George Ghinea Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves. Search on Bibsonomy Softw. Focus The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Tim Jordan Book Review: Hackers: Crime in the Digital Sublime. Search on Bibsonomy New Media Soc. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Bill Hancock Suspected Hackers Arrested in Russian Credit-Card Fraud. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Bill Hancock Hackers Breach Firewall. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Bill Hancock Japan Web Hackers Use Chinese and US Servers. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  BibTeX  RDF
20Bill Hancock Home PC's Targeted by Hackers (Duh!). Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Bill Hancock Generation X Hackers? Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  BibTeX  RDF
20Bill Hancock Hackers Still Love to Attack the Pentago. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Peter Stephenson Hiring Hackers. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Gerald L. Kovacich Hackers: Freedom fighters of the 21st Century. Search on Bibsonomy Comput. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Karl J. Flusche Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20David Bainbridge 0002 Law report - I: Cannot employees also be hackers? Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone?: Part 5 - Conclusions. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone?: Part 3 - Motivation and deterrence. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone?: Part 2 - Frequency of computer related abuse: the surveys, and public perception of the problem. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone?: Part 4 - Legislation. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone?: Part 6 - Appendices and bibliography. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Tom Mulhall Where have all the hackers gone? A study in motivation, deterrence, and crime displacement: Part 1 - introduction & methodology. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Rob Kling Beyond outlaws, hackers and pirates. Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Rob Kling Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals. Search on Bibsonomy Computerization and Controversy, 2nd Ed. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Andrew W. Appel Axiomatic Bootstrapping: A Guide for Compiler Hackers. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF bootstrapping
20Nigel Chapman, Maria Fox 0001, Elpida Keravnou, Matthew Lee 0005, Mark Levene, Derek Long, Peter Rounce, Ray Offen, Paul A. Samet, Russel L. Winder 'Slick Systems' and 'Happy Hackers': experience with group projects at UCL. Search on Bibsonomy Softw. Eng. J. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Belden Menkus "Hackers": Know the adversary. Search on Bibsonomy Comput. Secur. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Richard C. Hollinger Hackers: computer heroes or electronic highwaymen? Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20G. Hughes Computer crime: the liability of hackers. Search on Bibsonomy Aust. Comput. J. The full citation details ... 1990 DBLP  BibTeX  RDF
20Pamela Samuelson Can Hackers Be Sued for Damages Caused by Computer Viruses? Search on Bibsonomy Commun. ACM The full citation details ... 1989 DBLP  BibTeX  RDF
20Harold Joseph Highland Hackers revisited. Search on Bibsonomy Comput. Secur. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20Harold Joseph Highland Open Sesame-Hackers welcome. Search on Bibsonomy Comput. Secur. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20I. S. Herschberg The hackers' comfort. Search on Bibsonomy Comput. Secur. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20David Bellin Young Hackers (abstract): geniuses or criminal? Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
20David Bellin High school hackers: heroes or criminals? Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
12Elankayer Sithirasenan, Nasser Almahdouri Using WiMAX for effective business continuity during and after disaster. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF emergency networks, authentication, business continuity
12Rick Wash Folk models of home computer security. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF folk models, home security, mental models
12Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson ASSURE: automated support for secure and usable requirements engineering. Search on Bibsonomy ISSTA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security requirements-based testing, security requirements, usable requirements
12Robert Willison, Mikko T. Siponen Overcoming the insider: reducing employee computer crime through Situational Crime Prevention. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Richard A. DeMillo Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. Search on Bibsonomy WISE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Guido Schryen, Rouven Kadura Open source vs. closed source software: towards measuring security. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF closed source software, security, metrics, open source software
12Vicky G. Papadopoulou, Andreas Gregoriades Network Security Validation Using Game Theory. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Game Theory, Network Security, Non-functional requirements
12Andy King Untangling Reverse Engineering with Logic and Abstraction. Search on Bibsonomy ICLP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ming-Yang Su, Kai-Chi Chang, Chun-Yuen Lin Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Frequent Episodes Mining, Honeypot systems, Network Security
12Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms
12Eric Paulos The rise of the expert amateur: DIY culture and citizen science. Search on Bibsonomy UIST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DIY culture, citizen science
12Andrew Brownsword Reflecting on development processes in the video game industry. Search on Bibsonomy ICSE Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Siu Fung Yeung, John C. S. Lui Dynamic Bayesian approach for detecting cheats in multi-player online games. Search on Bibsonomy Multim. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Linda Wilbanks When Black Hats Are Really White. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12David Alan Grier Harry and Georgie. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12George Lawton Is It Finally Time to Worry about Mobile Malware? Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Andrew "bunnie" Huang Chumby: An Experiment in Hackable Pervasive Computing. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Andrew G. Brooks, Joe Grand Engineered Reality: Prototyping Inventions for Television. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Björn Hartmann, Scott Doorley, Scott R. Klemmer Hacking, Mashing, Gluing: Understanding Opportunistic Design. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Frank L. Greitzer, Andrew P. Moore, Dawn M. Cappelli, Dee H. Andrews, Lynn A. Carroll, Thomas D. Hull Combating the Insider Cyber Threat. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Hung-Min Sun, King-Hang Wang Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Chetan Parampalli, R. Sekar 0001, Rob Johnson A practical mimicry attack against powerful system-call monitors. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack
12Frank McCown, Michael L. Nelson Usage analysis of a public website reconstruction tool. Search on Bibsonomy JCDL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF search engine caches, digital preservation, web archiving
12Dayong Ye, Quan Bai, Minjie Zhang, Zhen Ye P2P Distributed Intrusion Detections by Using Mobile Agents. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Christian Schläger, Ludwig Fuchs, Günther Pernul Intensive Programme on Information and Communication Security. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPICS, E-learning, IT Security
12Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen Defending On-Line Web Application Security with User-Behavior Surveillance. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web attacks, Markov model, User behavior, Web security, Web application security
12Hui Liu, Zhitang Li Methodology of Network Intrusion Detection System Penetration Testing. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Prashant Dewan, David Durham, Hormuzd Khosravi, Men Long, Gayathri Nagabhushan A hypervisor-based system for protecting software runtime memory and persistent storage. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF runtime memory, performance evaluation, computer security, virtual machine monitor, hypervisor
12Mohammad Shirali-Shahreza, Sajad Shirali-Shahreza Advanced Collage CAPTCHA. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart), Collage CAPTCHA, Non-OCR-Based CAPTCHA
12Zhengbing Hu, Zhitang Li, Junqi Wu A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Eelco Dolstra, Jurriaan Hage, Bastiaan Heeren, Stefan Holdermans, Johan Jeuring, Andres Löh, Clara Löh, Arie Middelkoop, Alexey Rodriguez, John van Schie Report on the tenth ICFP programming contest. Search on Bibsonomy ICFP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reverse engineering, programming contest
12Ross J. Anderson Security, Functionality and Scale? (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Manuel Mendonça, Nuno Ferreira Neves Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. Search on Bibsonomy EDCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Soundararajan Chandramathi, K. V. Arunkumar, S. Deivarayan, P. Sendhilkumar Fuzzy based dynamic WEP keymanagement for WLAN security enhancement. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Shafi Goldwasser Program Obfuscation and One-Time Programs. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Chris Grier, Shuo Tang, Samuel T. King Secure Web Browsing with the OP Web Browser. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, browser, web security
12Guo-Lun Luo, Henry Ker-Chang Chang A new online auction with convertible authenticated encryption and authentication. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Wen-Gong Shieh, Jianmin Wang, Wen-Bing Horng Secure remote control model for information appliances. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Emmanuel Velasco, Weifeng Chen 0001, Ping Ji 0002, Raymond Hsieh Wireless Forensic: A New Radio Frequency Based Locating System. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Fahim Akhter E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt Securing information content using new encryption method and Steganography. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Karen Heyman New Attack Tricks Antivirus Software. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF antivirus software, dynamic code obfuscation, DCO attacks
12George Lawton Web 2.0 Creates Security Challenges. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web 2.0, security and privacy
12Manuel Mendonça, Nuno Ferreira Neves Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee Cyber Threat Trend Analysis Model Using HMM. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Håvard D. Johansen, Dag Johansen, Robbert van Renesse FirePatch: Secure and Time-Critical Dissemination of Software Patches. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Régis Leveugle, Abdelaziz Ammari, V. Maingot, E. Teyssou, Pascal Moitrel, Christophe Mourtel, Nathalie Feyt, Jean-Baptiste Rigaud, Assia Tria Experimental evaluation of protections against laser-induced faults and consequences on fault modeling. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jayamsakthi Shanmugam, M. Ponnavaikko A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
12Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal A Reflection-Based Framework for Content Validation. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines Analysis of Tools for Detecting Rootkits and Hidden Processes. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF offline analysis, Rootkits, rootkit detection, live analysis
12Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensics and Evidence, internet attacks, website systems
12Weider D. Yu, Savitha Murthy PPMLP: A Special Modeling Language Processor for Privacy Policies. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Rick Wash Incentive design for home computer security. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF botnets
12Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic Features, Identifying Users, Data Mining, Intrusion Detection
12G. V. S. Raju 0001, Rehan Akbani Authentication in Wireless Networks. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti E-Risk Management through Self Insurance: An Option Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, option model, self-insurance, e-commerce, security breach
12Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee Multi Layer Approach to Defend DDoS Attacks Caused by Spam. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 388 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license