default search action
Sebastian Schrittwieser
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Emilio Coppa, Sebastian Schrittwieser:
Editorial: Special issue on ARES 2022. Comput. Secur. 138: 103662 (2024) - [j17]Sebastian Raubitzek, Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger:
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns. J. Inf. Secur. Appl. 85: 103850 (2024) - [c62]Sebastian Schrittwieser, Michele Ianni:
CheckMATE '24 - Research on Offensive and Defensive Techniques in the context of Man At The End (MATE) Attacks. CCS 2024: 4901-4902 - [c61]Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser:
Quantifying the Odds in Real World Attack Scenarios. CSR 2024: 845-852 - [c60]Paul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser:
Comparing the Effectivity of Planned Cyber Defense Controls in Order to Support the Selection Process. ICISSP 2024: 211-218 - [c59]Lorenz Kummer, Samir Moustafa, Sebastian Schrittwieser, Wilfried N. Gansterer, Nils M. Kriege:
Attacking Graph Neural Networks with Bit Flips: Weisfeiler and Leman Go Indifferent. KDD 2024: 1428-1439 - [c58]Sebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl:
Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations. SECRYPT 2024: 323-333 - [c57]Sebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl:
Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping. SECRYPT 2024: 560-567 - [e2]Sebastian Schrittwieser, Michele Ianni:
Proceedings of the 2024 Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1230-2 [contents] - [i11]Caroline Lawitschka, Sebastian Schrittwieser:
Generating Mixed Boolean-Arithmetic Expressions through Equality Saturation. ERCIM News 139(138) (2024) - [i10]Sebastian Schrittwieser:
Verifying Code Correctness of Protected Software through Translation Validation. ERCIM News 139(138) (2024) - [i9]Sebastian Schrittwieser, Michele Ianni:
Software Security - Introduction to the Special Theme. ERCIM News 139(138) (2024) - 2023
- [c56]Sebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl:
Modeling Obfuscation Stealth Through Code Complexity. ESORICS Workshops (2) 2023: 392-408 - [c55]Patrick Kochberger, Maximilian Gramberger, Sebastian Schrittwieser, Caroline Lawitschka, Edgar R. Weippl:
Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code. SECRYPT 2023: 7-19 - [i8]Patrick Kochberger, Sebastian Schrittwieser, Bart Coppens, Bjorn De Sutter:
Evaluation Methodologies in Software Protection Research. CoRR abs/2307.07300 (2023) - 2022
- [c54]Robert Luh, Sebastian Eresheim, Stefanie Größbacher, Thomas Petelin, Florian Mayr, Paul Tavolato, Sebastian Schrittwieser:
PenQuest Reloaded: A Digital Cyber Defense Game for Technical Education. EDUCON 2022: 906-914 - [c53]Sebastian Schrittwieser, Patrick Kochberger, Michael Pucher, Caroline Lawitschka, Philip König, Edgar R. Weippl:
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation. NordSec 2022: 273-291 - [i7]Patrick Kochberger, Sebastian Schrittwieser, Edgar R. Weippl:
Meta-framework for Automating Static Malware Analysis. ERCIM News 2022(129): 0 (2022) - 2021
- [j16]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Secure Internal Data Markets. Future Internet 13(8): 208 (2021) - [c52]Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl:
SoK: Automatic Deobfuscation of Virtualization-protected Applications. ARES 2021: 6:1-6:15 - 2020
- [j15]Robert Luh, Sebastian Schrittwieser:
Advanced threat intelligence: detection and classification of anomalous behavior in system processes. Elektrotech. Informationstechnik 137(1): 38-44 (2020) - [j14]Tobias Dam, Lukas Daniel Klausner, Sebastian Schrittwieser:
Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam. J. Cyber Secur. Mobil. 9(2): 265-300 (2020) - [j13]Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser, Helge Janicke:
PenQuest: a gamified attacker/defender meta model for cyber security assessment and education. J. Comput. Virol. Hacking Tech. 16(1): 19-61 (2020) - [c51]Daniel Judt, Patrick Kochberger, Peter Kieseberg, Sebastian Schrittwieser:
Compiling and Analyzing Open Source Malware for Research Purposes. ICSSA 2020: 32-37 - [i6]Tobias Dam, Lukas Daniel Klausner, Sebastian Schrittwieser:
Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam. CoRR abs/2004.01749 (2020)
2010 – 2019
- 2019
- [j12]Robert Luh, Helge Janicke, Sebastian Schrittwieser:
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. Comput. Secur. 84: 120-147 (2019) - [c50]Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser:
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. ARES 2019: 53:1-53:9 - [c49]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Fingerprinting using database steganography. ICSSA 2019: 16-20 - [c48]Peter Kieseberg, Sebastian Schrittwieser, Peter Frühwirt, Edgar R. Weippl:
Analysis of the Internals of MySQL/InnoDB B+ Tree Index Navigation from a Forensic Perspective. ICSSA 2019: 46-51 - [c47]Patrick Kochberger, Alexander Tauber, Sebastian Schrittwieser:
Assessment of the Transparency of the Windows Subsystem for Linux (WSL). ICSSA 2019: 60-69 - [i5]Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser:
Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. CoRR abs/1906.10762 (2019) - 2018
- [j11]Damjan Buhov, Julian Rauchberger, Sebastian Schrittwieser:
FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 26-40 (2018) - [j10]Robert Luh, Gregor Schramm, Markus Wagner, Helge Janicke, Sebastian Schrittwieser:
SEQUIN: a grammar inference framework for analyzing malicious system behavior. J. Comput. Virol. Hacking Tech. 14(4): 291-311 (2018) - [c46]Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim:
The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. ARES 2018: 18:1-18:10 - [c45]Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Structural Limitations of B+-Tree forensics. CECC 2018: 9:1-9:4 - [c44]Robert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser:
APT RPG: Design of a Gamified Attacker/Defender Meta Model. ICISSP 2018: 526-537 - [e1]Sebastian Doerr, Mathias Fischer, Sebastian Schrittwieser, Dominik Herrmann:
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018. ACM 2018, ISBN 978-1-4503-6448-5 [contents] - 2017
- [j9]Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser:
The Evolution of Process Hiding Techniques in Malware - Current Threats and Possible Countermeasures. J. Inf. Process. 25: 866-874 (2017) - [j8]Robert Luh, Stefan Marschalek, Manfred Kaiser, Helge Janicke, Sebastian Schrittwieser:
Semantics-aware detection of targeted attacks: a survey. J. Comput. Virol. Hacking Tech. 13(1): 47-85 (2017) - [c43]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek:
LLR-Based Sentiment Analysis for Kernel Event Sequences. AINA 2017: 764-771 - [c42]Peter Kieseberg, Sebastian Neuner, Sebastian Schrittwieser, Martin Schmiedecker, Edgar R. Weippl:
Real-Time Forensics Through Endpoint Visibility. ICDF2C 2017: 18-32 - [c41]Julian Rauchberger, Robert Luh, Sebastian Schrittwieser:
Longkit - A Universal Framework for BIOS/UEFI Rootkits in System Management Mode. ICISSP 2017: 346-353 - [c40]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke:
Design of an Anomaly-based Threat Detection & Explication System. ICISSP 2017: 397-402 - [c39]Robert Luh, Gregor Schramm, Markus Wagner, Sebastian Schrittwieser:
Sequitur-based Inference and Analysis Framework for Malicious System Behavior. ICISSP 2017: 632-643 - [c38]Sebastian Eresheim, Robert Luh, Sebastian Schrittwieser:
On the Impact of Kernel Code Vulnerabilities in IoT Devices. ICSSA 2017: 1-5 - [c37]Martin Valicek, Gregor Schramm, Martin Pirker, Sebastian Schrittwieser:
Creation and Integration of Remote High Interaction Honeypots. ICSSA 2017: 50-55 - [c36]Stefan Marschalek, Robert Luh, Sebastian Schrittwieser:
Endpoint Data Classification Using Markov Chains. ICSSA 2017: 56-59 - [c35]Damjan Buhov, Patrick Kochberger, Richard Thron, Sebastian Schrittwieser:
Discovering Cryptographic Algorithms in Binary Code Through Loop Enumeration. ICSSA 2017: 80-86 - [c34]Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser:
Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. ISPEC 2017: 663-677 - [c33]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. SACMAT 2017: 119-120 - [i4]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Forensics using Internal Database Structures. ERCIM News 2017(108) (2017) - [i3]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser:
Security Testing for Mobile Applications. ERCIM News 2017(109) (2017) - 2016
- [j7]Sebastian Schrittwieser, Stefan Katzenbeisser, Johannes Kinder, Georg Merzdovnik, Edgar R. Weippl:
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? ACM Comput. Surv. 49(1): 4:1-4:37 (2016) - [c32]Edgar R. Weippl, Sebastian Schrittwieser, Sylvi Rennert:
Empirical Research and Research Ethics in Information Security. ICISSP (Revised Selected Papers) 2016: 14-22 - [c31]Damjan Buhov, Richard Thron, Sebastian Schrittwieser:
Catch Me if You Can! Transparent Detection of Shellcode. ICSSA 2016: 60-63 - [c30]Robert Luh, Sebastian Schrittwieser, Stefan Marschalek:
TAON: an ontology-based approach to mitigating targeted attacks. iiWAS 2016: 303-312 - [c29]Stefan Marschalek, Manfred Kaiser, Robert Luh, Sebastian Schrittwieser:
Empirical Malware Research through Observation of System Behaviour. WWW (Companion Volume) 2016: 467-469 - [i2]Peter Kieseberg, Edgar R. Weippl, Sebastian Schrittwieser:
Detection of Data Leaks in Collaborative Data Driven Research. ERCIM News 2016(105) (2016) - [i1]Bernd Malle, Peter Kieseberg, Sebastian Schrittwieser, Andreas Holzinger:
Privacy Aware Machine Learning and the "Right to be Forgotten". ERCIM News 2016(107) (2016) - 2015
- [j6]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
Security and privacy of smartphone messaging applications. Int. J. Pervasive Comput. Commun. 11(2): 132-150 (2015) - [c28]Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani:
Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems. ARES 2015: 174-179 - [c27]Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Gradually Improving the Forensic Process. ARES 2015: 404-410 - [c26]Peter Kieseberg, Peter Frühwirt, Sebastian Schrittwieser, Edgar R. Weippl:
Security tests for mobile applications - Why using TLS/SSL is not enough. ICST Workshops 2015: 1-2 - [c25]Stefan Marschalek, Robert Luh, Manfred Kaiser, Sebastian Schrittwieser:
Classifying malicious system behavior using event propagation trees. iiWAS 2015: 23:1-23:10 - [c24]Christoph Rottermanner, Peter Kieseberg, Markus Huber, Martin Schmiedecker, Sebastian Schrittwieser:
Privacy and data protection in smartphone messengers. iiWAS 2015: 83:1-83:10 - 2014
- [j5]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. Comput. Secur. 42: 13-26 (2014) - [j4]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Isao Echizen, Edgar R. Weippl:
An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata. Electron. Mark. 24(2): 113-124 (2014) - [j3]Christoph Hochreiner, Peter Frühwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Genie in a Model? Why Model Driven Security will not secure your Web Application. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 44-62 (2014) - [c23]Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl:
AES-SEC: Improving Software Obfuscation through Hardware-Assistance. ARES 2014: 184-191 - [c22]Christoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl:
Using Model Driven Security Approaches in Web Application Development. ICT-EurAsia 2014: 419-431 - [c21]Stefanie Beyer, Martin Mulazzani, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
Towards Fully Automated Digital Alibis with Social Interaction. IFIP Int. Conf. Digital Forensics 2014: 297-307 - [c20]Robin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl:
What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications. iiWAS 2014: 142-151 - [c19]Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar R. Weippl:
Spoiled Onions: Exposing Malicious Tor Exit Relays. Privacy Enhancing Technologies 2014: 304-331 - [c18]Peter Frühwirt, Peter Kieseberg, Christoph Hochreiner, Sebastian Schrittwieser, Edgar R. Weippl:
InnoDB Datenbank Forensik Rekonstruktion von Abfragen über Datenbank-interne Logfiles. Sicherheit 2014: 363-374 - [p1]Peter Kieseberg, Heidelinde Hobel, Sebastian Schrittwieser, Edgar R. Weippl, Andreas Holzinger:
Protecting Anonymity in Data-Driven Biomedical Science. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics 2014: 301-316 - 2013
- [j2]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. Int. J. Web Inf. Syst. 9(1): 53-68 (2013) - [j1]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs. Inf. Secur. Tech. Rep. 17(4): 227-238 (2013) - [c17]Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. ARES 2013: 255-261 - [c16]Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. AsiaCCS 2013: 529-534 - [c15]Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Appinspect: large-scale evaluation of social networking apps. COSN 2013: 143-154 - [c14]Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl:
Quantifying Windows File Slack Size and Stability. IFIP Int. Conf. Digital Forensics 2013: 183-193 - 2012
- [c13]Peter Frühwirt, Peter Kieseberg, Sebastian Schrittwieser, Markus Huber, Edgar R. Weippl:
InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs. ARES 2012: 625-633 - [c12]Sebastian Schrittwieser, Peter Kieseberg, Edgar R. Weippl:
Digital forensics for enterprise rights management systems. iiWAS 2012: 111-120 - [c11]Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. NDSS 2012 - 2011
- [c10]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara:
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters. ARES 2011: 645-649 - [c9]Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl:
Social snapshots: digital forensics for online social networks. ACSAC 2011: 113-122 - [c8]Peter Kieseberg, Sebastian Schrittwieser, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Trees Cannot Lie: Using Data Structures for Forensics Purposes. EISIC 2011: 282-285 - [c7]Sebastian Schrittwieser, Stefan Katzenbeisser:
Code Obfuscation against Static and Dynamic Reverse Engineering. Information Hiding 2011: 270-284 - [c6]Peter Kieseberg, Sebastian Schrittwieser, Lorcan Morgan, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Using the structure of B+-trees for enhancing logging mechanisms of databases. iiWAS 2011: 301-304 - [c5]Martin Salfer, Sven Wohlgemuth, Sebastian Schrittwieser, Bernhard Bauer, Isao Echizen:
Data Provenance with Watermarks for Usage Control Monitors at Disaster Recovery. iThings/CPSCom 2011: 514-519 - [c4]Sebastian Schrittwieser, Peter Kieseberg, Isao Echizen, Sven Wohlgemuth, Noboru Sonehara, Edgar R. Weippl:
An Algorithm for k-Anonymity-Based Fingerprinting. IWDW 2011: 439-452 - [c3]Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar R. Weippl:
Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. USENIX Security Symposium 2011 - 2010
- [c2]Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Cheap and automated socio-technical attacks based on social networking sites. AISec 2010: 61-64 - [c1]Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar R. Weippl:
QR code security. MoMM 2010: 430-435
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint