The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for firewalls with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1996 (15) 1997-1998 (18) 1999 (17) 2000 (18) 2001 (26) 2002 (39) 2003 (51) 2004 (68) 2005 (69) 2006 (76) 2007 (86) 2008 (70) 2009 (39) 2010 (24) 2011-2012 (26) 2013-2014 (29) 2015 (17) 2016 (18) 2017-2018 (20) 2019 (16) 2020 (16) 2021 (16) 2022-2023 (28) 2024 (1)
Publication types (Num. hits)
article(172) book(9) incollection(14) inproceedings(605) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 741 occurrences of 469 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Jörg Fritsch, Steffen Gundel Firewalls im Unternehmenseinsatz - Grundlagen, Betrieb und Produkte (2. Aufl.). Search on Bibsonomy 2005   RDF
18Günter Schäfer Internet Firewalls. Search on Bibsonomy The Industrial Information Technology Handbook The full citation details ... 2005 DBLP  BibTeX  RDF
18Kun Bai, Alex Hai Wang, Peng Liu 0005 Towards Database Firewalls. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Robert M. Marmorstein, Phil Kearns An Open Source Solution for Testing NAT'd and Nested iptables Firewalls. Search on Bibsonomy LISA The full citation details ... 2005 DBLP  BibTeX  RDF
18Saikat Guha 0002, Paul Francis Characterization and Measurement of TCP Traversal Through NATs and Firewalls. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2005 DBLP  BibTeX  RDF
18Avishai Wool The use and usability of direction-based filtering in firewalls. Search on Bibsonomy Comput. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Gregor N. Purdy Linux iptables - pocket reference: firewalls, nat and accounting. Search on Bibsonomy 2004   RDF
18Marco Prandini A flexible approach to configuration of linux-based firewalls. Search on Bibsonomy Communications, Internet, and Information Technology The full citation details ... 2004 DBLP  BibTeX  RDF
18Olivier Paul Improving Distributed Firewalls Performance through Vertical Load Balancing. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jin-Ho Kim, Saewoong Bahk, Heejo Lee A connection management protocol for stateful inspection firewalls in multi-homed networks. Search on Bibsonomy ICC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Mohammad J. Rashti, Hamid R. Rabiee, Amir Foroutan, Meisam Lavasani A Multi-Dimensional Packet Classifier for NP-Based Firewalls. Search on Bibsonomy SAINT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ulrich Ultes-Nitsche Run-Time Protocol Conformance Verification In Firewalls. Search on Bibsonomy ISSA The full citation details ... 2004 DBLP  BibTeX  RDF
18Ehab S. Al-Shaer, Hazem H. Hamed Discovery of Policy Anomalies in Distributed Firewalls. Search on Bibsonomy INFOCOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz Anonymity and Covert Channels in Simple Timed Mix-Firewalls. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob C. Knauerhase, Aaron Klingaman Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System. Search on Bibsonomy LISA The full citation details ... 2004 DBLP  BibTeX  RDF
18Lee J. White, Brian Robinson Industrial Real-Time Regression Testing and Analysis Using Firewalls. Search on Bibsonomy ICSM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Testing Firewall, Software Testing, Deadlock, Regression Testing, Software Defects, Real-Time Software
18Ray Hunt, Theuns Verwoerd Reactive firewalls - a new technique. Search on Bibsonomy Comput. Commun. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18William A. Arbaugh Firewalls: An Outdated Defense. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Mark N. Frolick A New Webmaster's Guide to Firewalls and Security. Search on Bibsonomy Inf. Syst. Manag. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Abe Singer Life Without Firewalls. Search on Bibsonomy login Usenix Mag. The full citation details ... 2003 DBLP  BibTeX  RDF
18Seny Kamara, Sonia Fahmy, E. Eugene Schultz, Florian Kerschbaum, Michael Frantzen Analysis of vulnerabilities in Internet firewalls. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Juan M. Estévez-Tapiador Concepts and Attitudes for Internet Security (A review of Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin). Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2003 DBLP  BibTeX  RDF
18Zhuhan Jiang, Laxmikanth Gudipudi, Hiep Pham Distributed Resource Relay Under Personalized Firewalls. Search on Bibsonomy Security and Management The full citation details ... 2003 DBLP  BibTeX  RDF
18Faheem Bukhatwa, Ahmed Patel Effects of Ordered Access Lists in Firewalls. Search on Bibsonomy ICWI The full citation details ... 2003 DBLP  BibTeX  RDF
18Abe Singer Security Without Firewalls. Search on Bibsonomy LISA The full citation details ... 2003 DBLP  BibTeX  RDF
18Tom Markham, Lynn Meredith, Charlie Payne Distributed Embedded Firewalls with Virtual Private Groups. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Kaushal Chari Firewalls. Search on Bibsonomy Encyclopedia of Information Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Flemming Nielson, Hanne Riis Nielson, René Rydhof Hansen Validating firewalls using flow logics. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Mayur S. Desai, Thomas C. Richards, Thomas von der Embse System insecurity - firewalls. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Paul Sijben, Willem van Willigenburg, Michel de Boer, Sietse van der Gaast Middleboxes: Controllable media firewalls. Search on Bibsonomy Bell Labs Tech. J. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Stefan Strobel Firewalls und IT-Sicherheit - Grundlagen und Praxis sicherer Netze: IP-Filter, Content Security, PKI, Intrusion Detection und Applikationssicherheit, 3. Auflage. Search on Bibsonomy 2002   RDF
18Simon R. Chudley, Ulrich Ultes-Nitsche Configuring Firewalls - An XML-based Approach to Modelling and Implementing Firewall Configurations. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
18Peter H. Salus Internet Security: Beyond Firewalls, Passwords, and Crypto. Search on Bibsonomy LISA The full citation details ... 2002 DBLP  BibTeX  RDF
18Andreas Wolf Firewalls und VPNs: Was kommt danach? Die Stellung des Access-Control-Managements in einem ganzheitlichen IT-Security-Ansatz. Search on Bibsonomy DFN-Arbeitstagung über Kommunikationsnetze The full citation details ... 2002 DBLP  BibTeX  RDF
18Dave Zwieback High Availability Firewalls/VPN with VRRP. Search on Bibsonomy login Usenix Mag. The full citation details ... 2001 DBLP  BibTeX  RDF
18Utz Roedig, Ralf Ackermann, Ralf Steinmetz IP-Telefonie und Firewalls, Probleme und Lösungen. Search on Bibsonomy Prax. Inf.verarb. Kommun. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Michael Frantzen, Florian Kerschbaum, E. Eugene Schultz, Sonia Fahmy A Framework for Understanding Vulnerabilities in Firewalls Using a Dataflow Model of Firewall Internals. Search on Bibsonomy Comput. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Wing Hang Cheung, Michael R. Lyu, Kam-Wing Ng A Scalable Mediator System beyond Firewalls using CORBA, XML and Java Servlet. Search on Bibsonomy ISAS-SCI (1) The full citation details ... 2001 DBLP  BibTeX  RDF
18John W. Lockwood Platform and Methodology for Teaching Design of Hardware Modules in Internet Routers and Firewalls. Search on Bibsonomy MSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002, Thomas Engel 0001, Christoph Meinel Managing Distributed Personal Firewalls with Smart Data Servers. Search on Bibsonomy WebNet The full citation details ... 2001 DBLP  BibTeX  RDF
18Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas A graph theoretic model for hardware-based firewalls. Search on Bibsonomy ICON The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Germano Caronni Firewalls in a P2P World. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Wing Hang Cheung, Michael R. Lyu, Kam-Wing Ng Tunneling Across Firewalls by using XML and Servlets: An Experiment on CORBA. Search on Bibsonomy International Conference on Internet Computing (1) The full citation details ... 2001 DBLP  BibTeX  RDF
18Ioanis Nikolaidis Firewalls: a complete guide [Books]. Search on Bibsonomy IEEE Netw. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Ned Freed Behavior of and Requirements for Internet Firewalls. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman Building internet firewalls - internet and web security (2. ed.). Search on Bibsonomy 2000   RDF
18Ross S. Finlayson IP Multicast and Firewalls. Search on Bibsonomy RFC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Stefan Strobel Firewalls - Einführung, Praxis, Produkte, 2. Auflage. Search on Bibsonomy 1999   RDF
18Sally Hambridge, Charles Smothers, Tod Oace, Jeff Sedayao Just Type Make! Managing Internet Firewalls, Including Router Access Control Lists, Sendmail Configurations, DNS Databases, and OS Upgrades, Using Make and Other Publicly Available Utilities. Search on Bibsonomy NETA The full citation details ... 1999 DBLP  BibTeX  RDF
18Mark Vandenwauver, Joris Claessens, Wim Moreau, Calin Vaduva, Robert Maier Why Enterprises Need More than Firewalls and Intrusion Detection Systems. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Active Content, Java, Intrusion Detection Systems, Firewall, JavaScript, Intranet
18Uwe Ellermann Firewalls in Hochgeschwindigkeitsnetzen. (PDF / PS) Search on Bibsonomy 1999   RDF
18Marius Nacht The spectrum of modern firewalls. Search on Bibsonomy Comput. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Rainer Falk Java RMI, CORBA und Firewalls. Search on Bibsonomy Java-Informations-Tage The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Kaushik Ghosh, Allan J. Christie Communication Across Fault-Containment Firewalls on the SGI Origin. Search on Bibsonomy HPCA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Uday S. Murthy, O. Bukhres, W. Winn, E. Vanderdez Firewalls for Security in Wireless Networks. Search on Bibsonomy HICSS (7) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Marcus J. Ranum Thinking about firewalls V2.0: Beyond perimeter security. Search on Bibsonomy Inf. Secur. Tech. Rep. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Michael I. Sobol Firewalls. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford Firewalls: An Expert Roundtable. Search on Bibsonomy IEEE Softw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Rolf Oppliger Internet Security: Firewalls and Beyond. Search on Bibsonomy Commun. ACM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Ralph Niederberger Firewalls in Forschungsnetzen. Search on Bibsonomy Prax. Inf.verarb. Kommun. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Stefan Strobel Firewalls für das Netz der Netze - Sicherheit im Internet: Einführung und Praxis. Search on Bibsonomy 1997   RDF
18Young Chul Park, Dae Young Huh Mini-Savepoints: Firewalls for Atomic Updates. Search on Bibsonomy DASFAA The full citation details ... 1997 DBLP  BibTeX  RDF
18Nils Harald Berge, Jon Ølnes Firewalls in an OSI-environment. Search on Bibsonomy Comput. Commun. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Markus Mütze Firewalls. Search on Bibsonomy Wirtschaftsinf. The full citation details ... 1996 DBLP  BibTeX  RDF
18D. Brent Chapman, Elizabeth D. Zwicky Einrichten von Internet Firewalls - Sicherheit im Internet gewährleisten. Search on Bibsonomy 1996   RDF
18D. A. Meyer, M. Wefer, W. Steinblock Internet-Ressourcen in einem Klinikumsnetz, Konzept und Betrieb eines Firewalls. Search on Bibsonomy GMDS The full citation details ... 1996 DBLP  BibTeX  RDF
18Mark Miller, Joe Morris Centralized Administration of Distributed Firewalls. Search on Bibsonomy LISA The full citation details ... 1996 DBLP  BibTeX  RDF
18Darren Bolding Network security, filters and firewalls. Search on Bibsonomy XRDS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18D. Brent Chapman, Elizabeth D. Zwicky Building internet firewalls. Search on Bibsonomy 1995   RDF
18William R. Cheswick, Steven M. Bellovin Firewalls and internet security - repelling the wily hacker. Search on Bibsonomy 1995   RDF
18Steven M. Bellovin, William R. Cheswick Network firewalls. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Marcus J. Ranum, Frederick M. Avolio A Toolkit and Methods for Internet Firewalls. Search on Bibsonomy USENIX Summer The full citation details ... 1994 DBLP  BibTeX  RDF
9Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li 0001 Quilt: a patchwork of multicast regions. Search on Bibsonomy DEBS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Xue Cai, John S. Heidemann Understanding block-level address usage in the visible internet. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF internet address usage, low-bitrate, median-up, clustering, classification, availability, survey, pattern analysis, volatility, RTT
9Virgil D. Gligor Architectures for practical security. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF architectures
9Andrew Besmer, Jason Watson, Heather Richter Lipford The impact of social navigation on privacy policy configuration. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy configuration, privacy, social networking, social navigation
9Sourour Meharouech, Adel Bouhoula, Tarek Abbes Ensuring security in depth based on heterogeneous network security technologies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Management of interaction, Devices’ collaboration, Network security, Security technologies
9Geoffrey Goodell, Mema Roussopoulos, Scott O. Bradner A directory service for perspective access networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network neutrality, peer-to-peer, overlay networks
9Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak Automated pseudo-live testing of firewall configuration enforcement. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Steven M. Bellovin, Randy Bush Configuration management and security. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Lujo Bauer, Jay Ligatti, David Walker 0001 Composing expressive runtime security policies. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy-specification language, policy enforcement, Policy composition
9Guangjuan Lv, Ruzhi Xu, Xiangrong Zu, Liwu Deng Information Security Monitoring System Based on Data Mining. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Mahdi Dashtbozorgi, Mohammad Abdollahi Azgomi A scalable multi-core aware software architecture for high-performance network monitoring. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF high-performance network monitoring, multi-core aware architecture, scalable architecture
9Iftikhar Ahmad 0002, Azween B. Abdullah, Abdullah Sharaf Alghamdi Application of artificial neural network in detection of DOS attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF internet control message protocol, multiple layered perceptron, resilient backpropagation, neural network, artificial neural network, false positive, dataset, false negative, detection rate, denial of service attack
9Puneet Gupta, Scott D. Stoller Verification of Security Policy Enforcement in Enterprise Systems. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Viktor Pus, Jan Korenek Fast and scalable packet classification using perfect hash functions. Search on Bibsonomy FPGA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fpga, sram, packet classification
9Colin Allison, Alan Miller, Iain Oliver, Thomas Sturgeon Global Connections for Lasting Impressions: Experiential Learning about TCP. Search on Bibsonomy ICWL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCP, PlanetLab, Exploratory Learning
9Nihel Ben Youssef, Adel Bouhoula, Florent Jacquemard Automatic verification of conformance of firewall configurations to security policies. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Leonardo Lemes Fagundes, Luciano Paschoal Gaspary Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Krzysztof Kurowski, Walter de Back, Werner Dubitzky, László Gulyás, George Kampis, Mariusz Mamonski, Gabor Szemes, Martin T. Swain Complex System Simulations with QosCosGrid. Search on Bibsonomy ICCS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Java, Grid computing, complex system, modeling and simulation, parallel applications, advance reservation, ProActive, co-allocation
9Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ruleset, framework, language, firewall, acl
9Francisco Milagro Lardies, Pablo Antolin Rafael, João Fernandes 0002, Weishan Zhang, Klaus Marius Hansen, Peeter Kool Deploying Pervasive Web Services over a P2P Overlay. Search on Bibsonomy WETICE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Gian Paolo Jesi, Alberto Montresor Secure Peer Sampling Service: The Mosquito Attack. Search on Bibsonomy WETICE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee Alert propagation in mobile ad hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Minsu Shin, Song Chong, Injong Rhee Dual-resource TCP/AQM for processing-constrained networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CPU capacity, TCP-AQM, proportional, transmission link capacity, fairness, efficiency
9Alex X. Liu, Mohamed G. Gouda Diverse Firewall Design. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wei Yan, Zheng Zhang, Nirwan Ansari Revealing Packed Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Luigi Ciminiera, Guido Marchetto, Fulvio Risso, Livio Torrero Distributed connectivity service for a SIP infrastructure. Search on Bibsonomy IEEE Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Françoise Sailhan, Julien Bourgeois, Valérie Issarny A Security Supervision System for Hybrid Networks. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF host-based and network intrusion detection, security and protection management, event notification, Distributed intrusion detection
Displaying result #401 - #500 of 803 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license