default search action
Nancy R. Mead
Person information
- affiliation: Cleveland State University, Software Engineering Institute, USA
- affiliation (former): Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c65]Xiaofei Xu, Carl K. Chang, Nancy R. Mead, Yves Ducq, Zhiying Tu, Haijun Zhang:
2024 IEEE Symposium on Services and Software Engineering Education (2024 SSEedu) Chair&s Messages. SSE 2024: xvii-xviii - [c64]Nancy R. Mead:
AI and Software Engineering Education: Riding the Wave of Innovation. CSEE&T 2024: 1 - [c63]Bastian Tenbergen, Nancy R. Mead:
Technology Acquisition Plans to Foster Supply Chain Risk Management Learning Outcomes in Project-Based Software Development Courses. CSEE&T 2024: 1-10 - [i2]Nancy Mead, Carol Woody, Scott Hissam:
Open Source Software (OSS) Transparency for DoD Acquisition. CoRR abs/2404.16737 (2024) - 2022
- [c62]Anne Kohnke, Bastian Tenbergen, Nancy Mead:
Using Cybersecurity Body of Knowledge (CyBOK) Case Studies to Enhance Student Learning. HICSS 2022: 1-10 - [c61]Nancy Mead, Elke Hochmüller:
Introduction to the Minitrack on Industry, Quality, and Social Issues (IQSI). HICSS 2022: 1 - [c60]Nancy R. Mead:
Critical Infrastructure Protection and Supply Chain Risk Management. RE Workshops 2022: 215-218 - 2021
- [c59]Bastian Tenbergen, Nancy R. Mead:
Adapting a Software Acquisition Curriculum to Instruct Supply Chain Risk Management in a Project-Based Software Development Course. SEENG@ICSE 2021: 36-40 - 2020
- [j37]Dan Shoemaker, Nancy R. Mead, Anne Kohnke:
Teaching Secure Acquisition in Higher Education. IEEE Secur. Priv. 18(4): 60-66 (2020) - [c58]John Impagliazzo, Pierre Bourque, Nancy R. Mead:
Incorporating CC2020 and SWECOM Competencies into Software Engineering Curricula: A Tutorial. CSEE&T 2020: 1-3 - [c57]Nancy R. Mead, Anne Kohnke, Dan Shoemaker:
Secure Sourcing of COTS Products: A Critical Missing Element in Software Engineering Education. CSEE&T 2020: 1-5
2010 – 2019
- 2019
- [c56]Kristian Beckers, Duncan Ki-Aries, Seok-Won Lee, Nancy Mead:
Preface Sixth International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE'19). RE Workshops 2019: 133 - 2018
- [j36]Nancy R. Mead, David Garlan, Mary Shaw:
Half a Century of Software Engineering Education: The CMU Exemplar. IEEE Softw. 35(5): 25-31 (2018) - [e3]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
5th IEEE International Workshop on Evolving Security & Privacy Requirements Engineering, ESPRE@RE 2018, Banff, AB, Canada, August 20, 2018. IEEE 2018, ISBN 978-1-5386-8420-7 [contents] - 2017
- [c55]Richard J. LeBlanc, Nancy R. Mead, John Impagliazzo:
Crafting the Future of Software Engineering Education in CC2020: A Workshop. CSEE&T 2017: 65-66 - [c54]Nancy Mead, Forrest Shull, Janine L. Spears, Stefan Heibl, Sam Weber, Jane Cleland-Huang:
Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling. RE 2017: 412-417 - [e2]Hironori Washizaki, Nancy Mead:
30th IEEE Conference on Software Engineering Education and Training, CSEE&T 2017, Savannah, GA, USA, November 7-9, 2017. IEEE 2017, ISBN 978-1-5386-2536-1 [contents] - 2016
- [j35]Daniel Shoemaker, Carol Woody, Nancy R. Mead:
Advances in Software Engineering and Software Assurance. Adv. Comput. 102: 1-46 (2016) - [c53]Nancy R. Mead, Girish Seshagiri, Julie Howar:
Meeting Industry Needs for Secure Software Development. CSEE&T 2016: 28-36 - [c52]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
Welcome to the Third Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE). RE Workshops 2016: 53 - 2015
- [j34]Nancy R. Mead, Jose Andre Morales, Gregory Paul Alice:
A Method and Case Study for Using Malware Analysis to Improve Security Requirements. Int. J. Secur. Softw. Eng. 6(1): 1-23 (2015) - [c51]Nancy R. Mead, David S. Gibson, Elizabeth K. Hawthorne:
Cyber Sciences and Software Engineering. CSEE&T 2015: 21-23 - [c50]Nancy R. Mead:
Industry/University Collaboration in Software Engineering Education: Refreshing and Retuning Our Strategies. ICSE (2) 2015: 273-275 - [c49]Steven D. Fraser, Dennis Mancl, Nancy R. Mead, Mary Shaw, Werner Wild:
Software Professionalism - Is it 'Good Enough?'. SPLASH (Companion Volume) 2015: 60-62 - 2014
- [p1]Nancy R. Mead, Daniel Shoemaker, Carol Woody:
Software Assurance. Computing Handbook, 3rd ed. (1) 2014: 93: 1-24 - [e1]Kristian Beckers, Shamal Faily, Seok-Won Lee, Nancy R. Mead:
IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, ESPRE 2014, 25 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6340-9 [contents] - 2013
- [j33]Thomas B. Hilburn, Nancy R. Mead:
Building Security In: A Road to Competency. IEEE Secur. Priv. 11(5): 89-92 (2013) - [j32]Nancy R. Mead, Thomas B. Hilburn:
Building Security In: Preparing for a Software Security Career. IEEE Secur. Priv. 11(6): 80-83 (2013) - [j31]Nancy R. Mead, Daniel Shoemaker, Carol Woody:
Principles and Measurement Models for Software Assurance. Int. J. Secur. Softw. Eng. 4(1): 1-10 (2013) - [c48]Nancy R. Mead, Daniel Shoemaker:
The software assurance competency model: A roadmap to enhance individual professional capability. CSEE&T 2013: 119-128 - [c47]Nancy R. Mead:
A history of the international requirements engineering conference (RE)RE@21. RE 2013: 215-221 - 2012
- [c46]Nancy R. Mead:
Measuring the Software Security Requirements Engineering Process. COMPSAC Workshops 2012: 583-588 - [c45]Carol Woody, Nancy R. Mead, Daniel Shoemaker:
Foundations for Software Assurance. HICSS 2012: 5368-5374 - [c44]Elizabeth K. Hawthorne, Nancy R. Mead, Mark A. Ardis, Carol A. Sledge:
Infusing software assurance and secure coding into introductory CS courses (abstract only). SIGCSE 2012: 676 - 2011
- [j30]Nancy R. Mead, Seiya Miyazaki, Justin Zhan:
Integrating privacy requirements considerations into a security requirements engineering method and tool. Int. J. Inf. Priv. Secur. Integr. 1(1): 106-126 (2011) - [c43]Mark A. Ardis, Nancy R. Mead:
The Development of a Graduate Curriculum for Software Assurance. AMCIS 2011 - [c42]Jeffrey A. Ingalsbe, Daniel Shoemaker, Nancy R. Mead:
Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations. AMCIS 2011 - [c41]Nancy R. Mead, Linda M. Laird, Daniel Shoemaker:
Getting Secure Software Assurance Knowledge into Conventional Practice: Three Educational Initiatives. COMPSAC 2011: 193-198 - 2010
- [j29]Nancy R. Mead, Joe Jarzombek:
Advancing Software Assurance with Public-Private Collaboration. Computer 43(9): 21-30 (2010) - [j28]Nancy R. Mead:
Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods. Int. J. Secur. Softw. Eng. 1(1): 74-91 (2010) - [j27]Nancy R. Mead, Julia H. Allen, Mark A. Ardis, Thomas B. Hilburn, Andrew J. Kornecki, Richard C. Linger, James McDonald:
Development of a Master of Software Assurance Reference Curriculum. Int. J. Secur. Softw. Eng. 1(4): 18-34 (2010) - [c40]Saeed Abu-Nimeh, Nancy R. Mead:
Combining Privacy and Security Risk Assessment in Security Quality Requirements Engineering. AAAI Spring Symposium: Intelligent Information Privacy Management 2010 - [c39]Daniel Shoemaker, Jeffrey A. Ingalsbe, Rita Barrios, Nancy R. Mead:
Defining the Discipline of Secure Software Assurance: Initial Findings from the National Software Assurance Repository. HICSS 2010: 1-8
2000 – 2009
- 2009
- [j26]Nancy R. Mead:
Software engineering education: How far we've come and how far we have to go. J. Syst. Softw. 82(4): 571-575 (2009) - [c38]Nancy R. Mead, Antonio Drommi, Daniel Shoemaker, Jeffrey A. Ingalsbe:
A Study of the Impact on Students Understanding Cross Cultural Differences in Software Engineering Work. COMPSAC (1) 2009: 644-645 - [c37]Nancy R. Mead, Daniel Shoemaker, Jeffrey A. Ingalsbe:
Ensuring Cost Efficient and Secure Software through Student Case Studies in Risk and Requirements Prioritization. HICSS 2009: 1-9 - [c36]Saeed Abu-Nimeh, Nancy R. Mead:
Privacy Risk Assessment in Privacy Requirements Engineering. RELAW 2009: 17-18 - [c35]Nancy R. Mead, Daniel Shoemaker, Jeffrey A. Ingalsbe:
Teaching Security Requirements Engineering Using SQUARE. REET 2009: 20-27 - [c34]Saeed Abu-Nimeh, Seiya Miyazaki, Nancy R. Mead:
Integrating Privacy Requirements into Security Requirements Engineering. SEKE 2009: 542-547 - 2008
- [j25]Jeffrey A. Ingalsbe, Louis Kunimatsu, Tim Baeten, Nancy R. Mead:
Threat Modeling: Diving into the Deep End. IEEE Softw. 25(1): 28-34 (2008) - [c33]Jeffrey A. Ingalsbe, Daniel Shoemaker, Nancy R. Mead, Antonio Drommi:
Threat Modeling the Enterprise. AMCIS 2008: 133 - [c32]Seiya Miyazaki, Nancy R. Mead, Justin Zhan:
Computer-Aided Privacy Requirements Elicitation Technique. APSCC 2008: 367-372 - [c31]Nancy R. Mead:
Position Statement: The Impact of Software Assurance on Computing Education. COMPSAC 2008: 6 - [c30]Nancy R. Mead, Daniel Shoemaker, Antonio Drommi, Jeffrey A. Ingalsbe:
An Immersion Program to Help Students Understand the Impact of Cross Cultural Differences in Software Engineering Work. COMPSAC 2008: 455-459 - [c29]Nancy R. Mead, Venkatesh Viswanathan, Deepa Padmanabhan:
Incorporating Security Requirements Engineering into the Dynamic Systems Development Method. COMPSAC 2008: 949-954 - [c28]Nancy R. Mead:
Software Engineering Education: How Far We've Come and How Far We Have to Go. CSEE&T 2008: 18-22 - [c27]Daniel Shoemaker, Antonio Drommi, Jeffrey A. Ingalsbe, Nancy R. Mead:
Integrating Secure Software Assurance Content with SE2004 Recommendations. CSEE&T 2008: 59-66 - 2007
- [j24]Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman:
Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. IEEE Secur. Priv. 5(5): 57-60 (2007) - [c26]Daniel Shoemaker, Antonio Drommi, Jeffrey A. Ingalsbe, Nancy R. Mead:
A Comparison of the Software Assurance Common Body of Knowledge to Common Curricular Standards. CSEE&T 2007: 149-156 - [c25]Nancy R. Mead, Thomas B. Hilburn, James McDonald, Michael Ryan, Daniel Shoemaker:
On the Feasibility of Specialization within Software Engineering Degree Programs. CSEE&T 2007: 362-366 - 2006
- [j23]Roel J. Wieringa, Neil A. M. Maiden, Nancy R. Mead, Colette Rolland:
Requirements engineering paper classification and evaluation criteria: a proposal and a discussion. Requir. Eng. 11(1): 102-107 (2006) - [c24]Nancy R. Mead, Eric D. Hough:
Security Requirements Engineering for Software Systems: Case Studies in Support of Software Engineering Education. CSEE&T 2006: 149-158 - 2005
- [j22]Nancy R. Mead, Gary McGraw:
A Portal for Software Security. IEEE Secur. Priv. 3(4): 75-79 (2005) - [j21]Nancy R. Mead, Ted Stehney:
Security quality requirements engineering (SQUARE) methodology. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c23]Nancy R. Mead, Ted Stehney:
Security quality requirements engineering (SQUARE) methodology. SESS@ICSE 2005: 1-7 - 2004
- [j20]Nancy R. Mead:
Who Is Liable for Insecure Systems? Computer 37(7): 27-34 (2004) - [j19]Victor R. Basili, Barry W. Boehm, Al Davis, Watts S. Humphrey, Nancy G. Leveson, Nancy R. Mead, John D. Musa, David Lorge Parnas, Shari Lawrence Pfleeger, Elaine J. Weyuker:
New Year's Resolutions for Software Quality. IEEE Softw. 21(1): 12-13 (2004) - 2003
- [j18]Nancy R. Mead:
Building a Foundation. IEEE Secur. Priv. 1(3): 14 (2003) - [j17]Nancy R. Mead:
SEHAS 2003: The Future of High-Assurance Systems. IEEE Secur. Priv. 1(5): 68-72 (2003) - [c22]Heidi J. C. Ellis, Ana María Moreno, Nancy R. Mead, Stephen B. Seidman:
Industry/University Software Engineering Collaborations for the Successful Reeducation of Non-Software Professionals. CSEE&T 2003: 44-51 - [c21]Martin S. Feather, Allen P. Nikora, Constance L. Heitmeyer, Nancy R. Mead:
ICSE 2003 Workshop on Software Engineering for High Assurance Systems: Synergies between Process, Product, and Profiling (SEHAS 2003). ICSE 2003: 787-788 - [c20]Nancy R. Mead, Nader Kameli:
Requirements Engineering in Practice: Making the Business Case for Requirements Engineering. RE 2003: 342 - 2002
- [j16]Heidi J. C. Ellis, Nancy R. Mead, Ana María Moreno, Cynthia D. Tanner, Dawn Ramsey:
Characteristics of Successful Collaborations to Produce Educated Software Engineering Professionals. Comput. Sci. Educ. 12(1-2): 119-140 (2002) - [j15]Gregory W. Hislop, Michael J. Lutz, J. Fernando Naveda, W. Michael McCracken, Nancy R. Mead, Laurie A. Williams:
Integrating Agile Practices into Software Engineering Courses. Comput. Sci. Educ. 12(3): 169-185 (2002) - [j14]Hermann Kaindl, Sjaak Brinkkemper, Janis A. Bubenko Jr., Barbara Farbey, Sol J. Greenspan, Constance L. Heitmeyer, Julio César Sampaio do Prado Leite, Nancy R. Mead, John Mylopoulos, Jawed I. A. Siddiqi:
Requirements Engineering and Technology Transfer: Obstacles, Incentives and Improvement Agenda. Requir. Eng. 7(3): 113-123 (2002) - [j13]Hossein Saiedian, Donald J. Bagert, Nancy R. Mead:
Software Engineering Programs: Dispelling the Myths and Misconceptions. IEEE Softw. 19(5): 35-41 (2002) - [c19]Howard F. Lipson, Nancy R. Mead, Andrew P. Moore:
Can We Ever Build Survivable Systems from COTS Components? CAiSE 2002: 216-229 - [c18]Laurie A. Williams, Michael J. Lutz, Gregory W. Hislop, Michael McCracken, Nancy R. Mead, J. Fernando Naveda:
Workshop 3: Integrating Agile Practices into Software Engineering Courses. CSEE&T 2002: 263-264 - 2001
- [j12]Nancy R. Mead, Richard C. Linger, John McHugh, Howard F. Lipson:
Managing Software Development for Survivable Systems. Ann. Softw. Eng. 11(1): 45-78 (2001) - [j11]Donald J. Bagert, Nancy R. Mead:
Software Engineering as a Professional Discipline. Comput. Sci. Educ. 11(1): 73-87 (2001) - 2000
- [j10]Nancy R. Mead:
Preface. Ann. Oper. Res. 97(1-4): 1-3 (2000) - [j9]Jeffrey M. Voas, Nancy R. Mead:
Malicious IT - Guest Editors' Introduction. IEEE Softw. 17(5): 23-25 (2000) - [j8]Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall:
Roundtable on Information Security Policy. IEEE Softw. 17(5): 26-32 (2000) - [c17]Nancy R. Mead:
Why is it so Difficult to Introduce Requirements Engineering Research Results into Mainstream Requirements Engineering Practice? ICRE 2000: 75-76 - [c16]Nancy R. Mead:
What Do You Mean I'm Practicing without a License? Certification and Licensing of Requirements Engineering Professionals. ICRE 2000: 152 - [c15]Rick Hubbard, Charles N. Schroeder, Nancy R. Mead:
An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process with Respect to the Conventional Interview Method. ICRE 2000: 178-188 - [c14]Nancy R. Mead, Hossein Saiedian, Günther Ruhe, Donald J. Bagert, Helen M. Edwards, Michael Ryan:
Shortages of qualified software engineering faculty and practitioners (panel session): challenges in breaking the cycle. ICSE 2000: 665-668
1990 – 1999
- 1999
- [j7]Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson, Thomas A. Longstaff, Nancy R. Mead:
Survivability: Protecting Your Critical Systems. IEEE Internet Comput. 3(6): 55-63 (1999) - [j6]Nancy R. Mead, Kathy Beckman, Jimmy Lawrence, George O'Mary, Cynthia L. Parish, Perla Unpingco, Hope Walker:
Industry/university collaborations: different perspectives heighten mutual opportunities. J. Syst. Softw. 49(2-3): 155-162 (1999) - [j5]Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead:
Survivable Network System Analysis: A Case Study. IEEE Softw. 16(4): 70-77 (1999) - [c13]Laurie Honour Werth, Donald J. Bagert, Nancy R. Mead, F. Goucher, R. Turner, D. Gordon:
Software Engineering - The State of the Profession. CSEE&T 1999: 114- - [c12]Nancy R. Mead:
Panel: Issues in Software Engineering for Survivable Systems. ICSE 1999: 592-593 - [c11]Donald J. Bagert, Thomas B. Hilburn, Gregory W. Hislop, Nancy R. Mead, Susan A. Mengel, Hossein Saiedian:
A report on the 1999 Conference on Software Engineering Education and Training. SIGCSE 1999: 346-347 - 1998
- [j4]Nancy R. Mead, A. Joe Turner:
Current Accreditation, Certification, and Licensure Activities Related to Software Engineering. Ann. Softw. Eng. 6: 167-180 (1998) - [c10]Richard C. Linger, Nancy R. Mead, Howard F. Lipson:
Requirements Definition for Survivable Network Systems. ICRE 1998: 14-23 - [c9]Nancy R. Mead, Thomas B. Hilburn, Donald J. Bagert, Michael Ryan, Oddur Benediktsson, Frances L. Van Scoy:
Everything you ever wanted to know about software engineering education, but were afraid to ask (panel). ITiCSE 1998: 260-263 - [i1]Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead:
Case Study in Survivable Network System Analysis. CoRR cs.SE/9811011 (1998) - 1997
- [j3]Nancy R. Mead:
Software Requirements Engineering - Preface. Ann. Softw. Eng. 3: 1-3 (1997) - [j2]Nancy R. Mead, David Carter, Michael J. Lutz:
Guest Editors' Introduction: The State of Software Engineering Education and Training. IEEE Softw. 14(6): 22-25 (1997) - [j1]Kathy Beckman, Neal S. Coulter, Soheil Khajenoori, Nancy R. Mead:
Collaborations: Closing the Industry-Academia Gap. IEEE Softw. 14(6): 49-57 (1997) - [c8]Nancy R. Mead:
Issues in licensing and certification of software engineers. CSEE&T 1997: 150-160 - 1996
- [c7]Nancy R. Mead:
Industry-University Partnerships: The Wave of the Future? Australian Software Engineering Conference 1996: 140- - [c6]Carol L. Hoover, Mary Shaw, Nancy R. Mead:
The Carnegie Mellon University Master of Software Engineering Specialization Tracks. CSEE 1996: 100-118 - 1995
- [c5]Nancy R. Mead:
Education Trends and Their Impact on Management of Software Engineering Education. CSEE 1995: 419-428 - 1994
- [c4]M. Chandra Shekaran, David Garlan, Michael Jackson, Nancy R. Mead, Colin Potts, Howard B. Reubenstein:
The role of software architecture in requirements engineering. ICRE 1994: 239-245 - 1991
- [c3]Nancy R. Mead, Patricia K. Lawlis:
Software Engineering: Graduate-Level Courses for AFIT Professional Continuing Education. CSEE 1991: 114-126
1980 – 1989
- 1989
- [c2]Nancy R. Mead, Roger J. Lockhart:
Using a multi-level design method under DOD-STD-2167A. WADAS 1989: 21-37 - 1988
- [c1]Nancy R. Mead, Daniel Ehrenfried, John R. Rymer:
Designing Ada software for maintainability. ICSM 1988: 214-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint