The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SIN"( http://dblp.L3S.de/Venues/SIN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sin

Publication years (Num. hits)
2009 (51) 2010 (41) 2011 (44) 2012 (34) 2013 (90) 2014 (83) 2015 (63) 2016 (34) 2017 (50) 2018 (29) 2019 (29) 2020 (35) 2021 (28) 2022 (39) 2023 (35)
Publication types (Num. hits)
inproceedings(670) proceedings(15)
Venues (Conferences, Journals, ...)
SIN(685)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 146 occurrences of 129 keywords

Results
Found 685 publication records. Showing 685 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Maxim Anikeev, Felix C. Freiling Preventing malicious data harvesting from deallocated memory areas. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Herman Isa, Norziana Jamil, Muhammad Reza Z'aba S-box construction from non-permutation power functions. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi Joux multicollisions attack in sponge construction. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Erkay Savas Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui Metamodel for reputation based agents system: case study for electrical distribution SCADA design. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch 0001 Improved face recognition at a distance using light field camera & super resolution schemes. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1T. Mekhaznia Nature inspired heuristics for attack of simplified DES algorithm. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1N. Rajamanickam, R. Nadarajan Implementing real-time transactional security property using timed edit automata. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lihui Hu, Jean Mayo, Charles Wallace 0001 An empirical study of three access control systems. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Romdhane Ben Younes, Guy Tremblay A possibilistic approach to intrusion detection under imperfect logging protocol. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed Features extraction of fingerprints using firefly algorithm. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich Using quadrocopter as a pentest tool. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Georges Ataya Information security, risk governance and management frameworks: an overview of COBIT 5. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh Generalized approach to modeling user activity graphs for network security and public safety monitoring. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ludmila K. Babenko, Evgeniya Ishchukova Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis. Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 Mining control flow graph as API call-grams to detect portable executable malware. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pawan Kumar, Virendra Singh Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Luís Mendonça, Henrique Santos 0001 Botnets: a heuristic-based detection framework. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Priyanka Singh, Suneeta Agarwal A region specific robust watermarking scheme based on singular value decomposition. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya Anomaly based intrusion detection using meta ensemble classifier. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari Detection of incorrect position information using speed and time span verification in VANET. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Eric Dubois 0001, Erik Proper, Iver Band, Michaël Petit Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ajay Chaudhary, Manoj Misra, Anjali Sardana An efficient fuzzy controller based technique for network traffic classification to improve QoS. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Herman Isa, Muhammad Reza Z'aba Randomness analysis on LED block ciphers. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Apurba Das, S. Kavitha Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitry Chernyavskiy, Natalia G. Miloslavskaya A concept of unification of network security policies. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev Classification of polymorphic and metamorphic malware samples based on their behavior. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Prerana Sharma, Devesh Mishra, Ankur Agarwal Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar Split personality malware detection and defeating in popular virtual machines. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 ESCAPE: entropy score analysis of packed executable. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nilanjan Dey, Poulami Das 0002, Sheli Sinha Chaudhuri, Achintya Das Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur Detection attack analysis using partial watermark in DCT domain. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chirag Modi 0001, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan A novel framework for intrusion detection in cloud. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kunal Sain, Mradula Sharma, Suneeta Agarwal (Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay Ensemble-based DDoS detection and mitigation model. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Priyanka Loya, Alwyn Roshan Pais SIRIS: secure IRIS authentication system. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Soumya Maity, Soumya Kanti Ghosh 0001 Enforcement of access control policy for mobile ad hoc networks. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich Methods of automated analysis of vendor specific implementation of stateful-filtration. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hiroshi Tsunoda, Glenn Mansfield Keeni Security by simple network traffic monitoring. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh (eds.) 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012 Search on Bibsonomy SIN The full citation details ... 2012 DBLP  BibTeX  RDF
1Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro Research about strength of GOST 28147-89 encryption algorithm. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Behnam Rahnama, Atilla Elçi, Ibukun Eweoya Fine tuning the advanced encryption standard (AES). Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Preety Singh, Vijay Laxmi, Manoj Singh Gaur Lip peripheral motion for visual surveillance. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1K. V. Arya, Hemant Kumar A clustering based algorithm for network intrusion detection. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1A. M. Chandrashekar, K. Raghuveer Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eugene Tumoyan, Daria Kavchuk The method of optimizing the automatic vulnerability validation. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas Detection of NDP based attacks using MLD. Search on Bibsonomy SIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atilla Elçi, Behnam Rahnama, Reza Makvandi Microcontroller-based implementation of parsekey+ for limited resources embedded applications. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu Exploration of a hand-based graphical password scheme. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran (eds.) Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011 Search on Bibsonomy SIN The full citation details ... 2011 DBLP  BibTeX  RDF
1Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro Algebraic analysis of GOST encryption algorithm. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haitham S. Al-Sinani, Chris J. Mitchell Extending the Scope of cardspace. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Suleyman Kondakci Obscurity of network security course curriculum. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani Secure random number generation in wireless sensor networks. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj Counterfactually reasoning about security. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Boulares Ouchenne, Ousmane Koné Formal analysis of usage control policies. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert Security analysis of a femtocell device. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada Proposal and implementation of enhanced HDD authentication that enables self-wipe. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chun Ruan, Seyed A. Shahrestani Logic based authorization program and its implementation. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kevin A. Kwiat Fault tolerance for fight-through: a basis for strategic survival. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala Counteracting DDoS attacks in WLAN. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson Algebraic analysis of the SSS stream cipher. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung An approach to enhance the security of remote health monitoring systems. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno Collusion resistant fingerprinting of digital audio. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shu-guang Dai, Chun-Ming Tang 0003, Yuenai Chen The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Geong Sen Poh, Muhammad Reza Z'aba On the security and practicality of a buyer seller watermarking protocol for DRM. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Valeriy O. Osipyan Different models of information protection system, based on the functional knapsack. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin Ågren, Martin Hell Cryptanalysis of the stream cipher BEAN. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Iynkaran Natgunanathan, Yong Xiang 0001 Echo hiding based stereo audio watermarking against pitch-scaling attacks. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wei-Kuo Chiang, Jian-Hao Chen TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati A sybil attack detection approach using neighboring vehicles in VANET. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Nassar 0001, Sylvain Martin, Guy Leduc, Olivier Festor Using decision trees for generating adaptive SPIT signatures. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1William Huba, Bo Yuan 0005, Daryl Johnson, Peter Lutz A HTTP cookie covert channel. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mufeed Juma AlMashrafi A different algebraic analysis of the ZUC stream cipher. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel WinSEND: Windows SEcure Neighbor Discovery. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski Acceleration of packet filtering using gpgpu. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur Detour attack in OLSR. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins A model-based attack injection approach for security validation. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Helena Rifà-Pous, Carles Garrigues A secure and anonymous cooperative sensing protocol for cognitive radio networks. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa On automatic detection of SQL injection attacks by the feature extraction of the single character. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Ming, Minhuan Huang, Dongxia Wang 0001, Xiaohui Kuang, Chunlei Wang, Xuewei Feng Research on survivability metrics based on survivable process of network system. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liang Cheng 0004, Yang Zhang 0021 Model checking security policy model using both UML static and dynamic diagrams. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmad Jafarabadi, Mohammad Abdollahi Azgomi On the impacts of join and leave on the propagation ratio of topology-aware active worms. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich Corporate networks security evaluation based on attack graphs. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Long Hoang Nguyen 0001 Rational distance-bounding protocols over noisy channel. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Rethinking cyber security. Search on Bibsonomy SIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alexander I. Tolstoy, Natalia G. Miloslavskaya Bachelor of information security: ("automated systems security profile"). Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazim Yumbul, Serdar Süer Erdem, Erkay Savas Design and implementation of robust embedded processor for cryptographic applications. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Meisam S. A. Najjar, Mohammad Abdollahi Azgomi A distributed multi-approach intrusion detection system for web services. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi A novel defense mechanism against sybil attacks in VANET. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pedro D. Salgueiro, Salvador Abreu A DSL for intrusion detection based on constraint programming. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Takeshi Takahashi 0001, Youki Kadobayashi, Hiroyuki Fujiwara Ontological approach toward cybersecurity in cloud computing. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh 0001 A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. Search on Bibsonomy SIN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 685 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license