The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IJSN"( http://dblp.L3S.de/Venues/IJSN )

URL (DBLP): http://dblp.uni-trier.de/db/journals/ijsn

Publication years (Num. hits)
2006 (24) 2007 (23) 2008 (25) 2009 (22) 2010 (25) 2011 (21) 2012 (22) 2013 (20) 2014 (25) 2015 (25) 2016 (20) 2017 (23) 2018 (11)
Publication types (Num. hits)
article(286)
Venues (Conferences, Journals, ...)
IJSN(286)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 286 publication records. Showing 286 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Abu Asaduzzaman, Shanta Mazumder, Sergio Salinas A promising security protocol for protecting near field communication devices from networking attacks. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bencheng Yu, Peisen Song, Xiaoyuan Xu An android malware static detection scheme based on cloud security structure. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nabila Zrira, Soufiana Mekouar, El-Houssine Bouyakhf A novel approach for graph-based global outlier detection in social networks. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xian Guo, Cheng Chen, Ma-Jiang Zhang, Aristide Ngaboyindekwe, Laicheng Cao Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lukas Malina, Petr Dzurenda, Jan Hajny Evaluation of anonymous digital signatures for privacy-enhancing mobile applications. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wafa Neji, Kaouther Blibech, Narjes Ben Rajeb A secure electronic voting protocol with a simple ballot's encryption function. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ronak Shah, Kailas Patil A measurement study of the subresource integrity mechanism on real-world applications. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yun-Xia Deng, Run-Hua Shi An efficient remote anonymous authentication scheme with user revocation. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Appala Naidu Tentu, China Venkaiah Vadlamudi, V. Kamakshi Prasad CRT based multi-secret sharing schemes: revisited. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ning Xu, Haiping Huang, Zhengtao Li, Yunqi Wang, Chao Sha An ID-based authentication scheme to achieve the security of smart card. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammadreza Ramezani-Chemazi, Maede Ashouri-Talouki Toward signature extraction of Metasploit encoding algorithms using static analysis. Search on Bibsonomy IJSN The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Danny Velasco, Glen D. Rodriguez Rafael A review of the current state of Honeynet architectures and tools. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaojun Deng, Tao Zhang, Xunyu He Finishing the tiny flows quickly for common data centre services. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhenhua Wei, Zhifeng Liu, Jie Miao, Lihua Li, Wei Xu Configurable workflow platform based on SaaS model. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Qais Qassim, Abdullah Mohd Zin, Mohd Juzaiddin Ab Aziz Anomaly-based network IDS false alarm filter using cluster-based alarm classification approach. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gurdip Kaur, Renu Dhir, Maninder Singh Anatomy of ransomware malware: detection, analysis and reporting. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jamal Ghasemi, Jamal Esmaily Intrusion detection systems using a hybrid SVD-based feature extraction method. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Yuan Zhou, Li Jian Chen, Keji Mao, Ming Xia, Ruohong Huan A RFID-based prisoner localisation system. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sumanta Chatterjee, Shashidhar G. Koolagudi Hierarchical secret sharing scheme using parts of speech of English grammar. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Li Jian Chen, Wei Yuan Zhou, Keji Mao, Ming Xia, Ruohong Huan A beacon-free localisation algorithm in wireless sensor networks. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing Insider threat detection and its future directions. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ismeet Kaur Makkar, Fabio Di Troia, Corrado Aaron Visaggio, Thomas H. Austin, Mark Stamp SocioBot: a Twitter-based botnet. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yuxia Shen Distributed storage system model design in internet of things based on hash distribution. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1BaoHong Li, Baojun Li, Yinliang Zhao Generic construction of role-based encryption in the standard model. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Avinash Srinivasan, Jie Wu 0001, Justin Y. Shi Secure android covert channel with robust survivability to service provider restrictions. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yingjie Chen, Baijian Yang, Weijie Wang NetFlowMatrix: a visual approach for analysing large NetFlow data. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1ZhiQiang Liu, Tong Wang, Xibo Wang Destination unaware geometric routing for delay tolerant networks. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cheng Peng 0001, Canqing Zhang, Cheng Peng 0002, Junfeng Man A reinforcement learning approach to map reduce auto-configuration under networked environment. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yefeng Ruan, Xukai Zou Receipt-freeness and coercion resistance in remote E-voting systems. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maria Charalampidou, George Pavlidis, Spyridon G. Mouroutsos A novel modular wireless sensor networks approach for security applications. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chuah Chai Wen, Ed Dawson, Leonie Simpson Stream cipher based key derivation function. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guangcheng Zheng Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Junfeng Man, Cheng Peng 0001, Yinghui Ma, Changyun Li The network software multistep control algorithm based on NNVD research. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shubair A. Abdulla Survey of security issues in IPv4 to IPv6 tunnel transition mechanisms. Search on Bibsonomy IJSN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Priyanka Dadhich, Kamlesh Dutta, M. C. Govil Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu 0002, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe A threat monitoring system in enterprise networks with smart mobiles. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hala Abukhalaf, Jianxin Wang, Shigeng Zhang Distance outlier detection with a mobile beacon in wireless sensor networks localisation. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed Amine Ferrag, Mehdi Nafa, Salim Ghanemi EPSA: an efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rupesh Nomula, Mayssaa El Rifai, Pramode K. Verma Multi-photon tolerant protocols for quantum secure communication in wireless standards. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pranav Subramaniam, Abhishek Parakh A quantum Diffie-Hellman protocol. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pengju He, Xiaomeng Chen, Huazhi Zeng Wireless sensor network for multi-target detection algorithm based on blind source separation. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ya-nan Liu, Lein Harn, Lei Mao, Zhangliang Xiong Full-healing group-key distribution in online social networks. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Feng Shao, Shun Zhang, Hong Zhong 0001, Runhua Shi, Jie Cui 0004 Keyword search protocol with privacy preservation using ID-based proxy reencryption. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin Secure mobile agent-based English auction protocol using identity-based signature scheme. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abhishek Parakh, Pramode Verma, Mahadevan Subramaniam Improving efficiency of quantum key distribution with probabilistic measurements. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gao Ren, Wang Hui, Zhang Yun A multi-channel MAC protocol with power control in the distributed cognitive radio networks. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1P. Annadurai, S. Yazhini Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ye Bi A hybrid PSO-SVM model for network intrusion detection. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghézala A framework for firewalls policy representativeness testing based on classification and reversible metrics. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sharmila Subudhi, Suvasini Panigrahi Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhengping Jin, Qing Wang, Zhongxian Li A formal construction of certificateless proxy multi-signature scheme. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Geethapriya Thamilarasu iDetect: an intelligent intrusion detection system for wireless body area networks. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zesheng Chen, Chao Chen 0001 Characterising heterogeneity in vulnerable hosts on worm propagation. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sung-Hyun Baek, Jong-Wook Jang Design and implementation of the smart blackbox system. Search on Bibsonomy IJSN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Huang Research on optimisation and application of improved fuzzy neural network control algorithm. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yucai Zhou, Tong Wang 0005, Xinlin Zhao A hybrid recommendation algorithm based on time factor. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jongdeug Kim, Taehyun Jeon Efficient resource allocation for mobile instant messaging service in wireless network. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vivens Ndatinya, Zhifeng Xiao, Vasudeva Rao Manepalli, Ke Meng, Yang Xiao Network forensics analysis using Wireshark. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zuhua Guo, Lixin Xu Research of security structure model for web application systems based on the relational database. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rajiv Bagai, Bin Tang, Ahsan A. Khan, Abdus Samad A system-wide anonymity metric with message multiplicities. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari Chain reduction of authorisation certificates. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1N. M. Saravana Kumar, S. Lavanya A novel scheme for secure group communication in multicast network. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tong Wang 0005, Xinlin Zhao, Yucai Zhou Community detection in social network using shuffled frog-leaping optimisation. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alex Ming Hui Wong, Dae-Ki Kang Game layout and artificial intelligence implementation in mobile 3D tower defence game. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jingcheng Gao, Yang Xiao, Sneha Rao, Fnu Shalini Security tests and attack experimentations of ProtoGENI. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Arshi Agrawal, Mark Stamp Masquerade detection on GUI-based Windows systems. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ki Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo-Seok Choi, Sang-Bong Park, Yun Sik Lim, Jeong Jin Kang Spatio-temporal XACML: the expansion of XACML for access control. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Myungseok Song, Jun-Dong Cho, Jongpil Jeong Random-walk mobility management scheme for sensor-based mobile networks. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fnu Shalini, Yang Xiao 0001, Bo Sun 0001 ProtoGENI experiments. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jai-Pil Oh, Dong Ho Kim System architecture and platform design for terrestrial ultra-high definition (UHD) broadcasting service. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed Amin Benamara, Huixian Li Secure of personal health records shared in cloud computing using cipher-text attribute based encryption. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alaa Eddien Abdallah, Emad Eddien Abdallah, Mohammad Bsoul, Ahmad Al-Khasawneh, Lina Amer A blind 3D watermarking technique using spherical coordinates and skewness measure. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohamed Sarrab Bytecode instrumentation mechanism for monitoring mobile application information flow. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jared Lee, Thomas H. Austin, Mark Stamp Compression-based analysis of metamorphic malware. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Inkyoo Park, Jongjin Park, Gyoo-Seok Choi Using Bayesian posterior probability in confidence of attributes for feature selection. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bhawana Rudra, O. P. Vyas Understanding and mitigating security and authentication issues in service oriented network architecture. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath Accurate geolocation using network coordinates. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhiming Zhang, Fuying Wu, Changgen Jiang, Jiangang Deng An efficient detection scheme of node replication attacks for wireless sensor networks. Search on Bibsonomy IJSN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Salekul Islam Security analysis of LMAP using AVISPA. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seong-Kweon Kim, Kyung-Ryang Lee, Jae-Sang Cha, Kyoung-Kun Lee, Seong-Jong Kim Implementation of battery inspection system for building energy management system. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Ricardo dos Santos, Tiago Jaime Nascimento, Carla Merkle Westphall, Marcos Aurélio Pedroso Leandro, Carlos Becker Westphall Privacy-preserving identity federations in the cloud: a proof of concept. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ghita Mezzour, Kathleen M. Carley Spam diffusion in a social network initiated by hacked e-mail accounts. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammed Rangwala, Ping Zhang, Xukai Zou, Feng Li 0001 A taxonomy of privilege escalation attacks in Android applications. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wayne C. Henry, Barry E. Mullins VANISH: a variable advanced network IRC stealth handling system. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hwa-seon Kim, Seong-Jin Jang, Jong-Wook Jang Development of the knocking decision system using the CKP signal collection and analysis. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Po-Jen Chuang, Ming-Yu Ni On access control policy assignments and negotiation strategies in automated trust negotiation. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kun Peng Assumptions and conditions for mix networks: analysis, clarification and improvement. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jennifer Seberry, Yi Mu, Fuchun Guo, Tim Wellsmore Efficient authentication and integrity protection for the border gateway protocol. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nagaraj Ambika, G. T. Raju ECAWSN: eliminating compromised node with the help of auxiliary nodes in wireless sensor network. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghézala Firewalls anomalies severity evaluation and classification. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ahmed Ahmim, Nacira Ghoualmi-Zine A new adaptive intrusion detection system based on the intersection of two different classifiers. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jongdeug Kim, Taehyun Jeon Signalling optimisation for VoIP service in All-IP network. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hui Cui, Yi Mu, Man Ho Au Anonymous broadcast encryption with an untrusted gateway. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Min Soo Kang, Yong-Gyu Jung, Myung Ho Kim, Kichan Ahn Development of sensor nodes based on fault tolerance. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zuhong Feng, Jing Li, Jie Hu Meichsner A Bayesian network intrusion detection algorithm based on principal component analysis and sliding window. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kyungrak Lee, Jaeyoung Yoo, Inwhee Joe An environmental transition-aware data transmission scheme with energy efficiency in energy harvesting wireless sensor networks. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ziyad S. Al-Salloum GeoGraphical passwords. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher W. Badenhop, Barry E. Mullins A black hole attack model using topology approximation for reactive ad-hoc routing protocols. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1John T. Hagen, Barry E. Mullins Network vulnerability analysis of the Player command and control protocol. Search on Bibsonomy IJSN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 286 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license