default search action
Search dblp for Publications
export results for "toc:db/conf/infoseccd/infoseccd2007.bht:"
@inproceedings{DBLP:conf/infoseccd/Al-Hamdani07, author = {Wasim A. Al{-}Hamdani}, title = {Education organization baseline control protection and trusted level security}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {14:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409924}, doi = {10.1145/1409908.1409924}, timestamp = {Tue, 11 Jun 2019 10:42:50 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Al-Hamdani07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Alexander07, author = {Tammy Alexander}, title = {Questionable qualifications: an in-depth look at diploma mills}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {19:1--19:7}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409929}, doi = {10.1145/1409908.1409929}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Alexander07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Austin07, author = {Richard D. Austin}, title = {Digital forensics on the cheap: teaching forensics using open source tools}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {6:1--6:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409915}, doi = {10.1145/1409908.1409915}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Austin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BaiSB07, author = {Yan Bai and Wayne Summers and Edward Bosworth}, title = {Teaching network risk assessment to online graduate students}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {8:1--8:6}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409917}, doi = {10.1145/1409908.1409917}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/BaiSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Blake07, author = {Errol A. Blake}, title = {Network and database security: regulatory compliance, network, and database security-a unified process and goal}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {26:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409937}, doi = {10.1145/1409908.1409937}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Blake07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Blake07a, author = {Errol A. Blake}, title = {Network security: VoIP security on data network-a guide}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {27:1--27:7}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409938}, doi = {10.1145/1409908.1409938}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Blake07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BoatwrightL07, author = {Michelle Boatwright and Xin Luo}, title = {What do we know about biometrics authentication?}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {31:1--31:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409942}, doi = {10.1145/1409908.1409942}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/BoatwrightL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BowmanBP07, author = {Michael Bowman and Heath D. Brown and Paul Pitt}, title = {An undergraduate rootkit research project: How available? How hard? How dangerous?}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {7:1--7:6}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409916}, doi = {10.1145/1409908.1409916}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/BowmanBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Boynton07, author = {Brian C. Boynton}, title = {Identification of process improvement methodologies with application in information security}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {28:1--28:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409939}, doi = {10.1145/1409908.1409939}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Boynton07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Carrow07, author = {Erwin Louis Carrow}, title = {Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {13:1--13:7}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409923}, doi = {10.1145/1409908.1409923}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Carrow07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Carrow07a, author = {Erwin Louis Carrow}, title = {InfoSec technology management of user space and services through security threat gateways}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {21:1--21:6}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409932}, doi = {10.1145/1409908.1409932}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Carrow07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Fabian07, author = {Michael Fabian}, title = {Endpoint security: managing USB-based removable devices with the advent of portable applications}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {24:1--24:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409935}, doi = {10.1145/1409908.1409935}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Fabian07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/FloydHH07, author = {Kevin S. Floyd and Susan J. Harrington and Prachi Hivale}, title = {The autotelic propensity of types of hackers}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {16:1--16:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409926}, doi = {10.1145/1409908.1409926}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/FloydHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/FranciaEFNS07, author = {Guillermo Francia III and Brian Estes and Rahjima R. Francia and Vu Nguyen and Alex Scroggins}, title = {The design and implementation of an automated security compliance toolkit: a pedagogical exercise}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {4:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409913}, doi = {10.1145/1409908.1409913}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/FranciaEFNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Fumey-Nassah07, author = {Godwin Fumey{-}Nassah}, title = {The management of economic ramification of information and network security on an organization}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {25:1--25:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409936}, doi = {10.1145/1409908.1409936}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Fumey-Nassah07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Gay07, author = {Stephen C. Gay}, title = {An examination of virtualization's role in contingency planning}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {17:1--17:8}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409927}, doi = {10.1145/1409908.1409927}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Gay07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/GraefeLGGGHA07, author = {Jonathan M. Graefe and Laurel Lashley and M{\'{a}}rio A. M. Guimar{\~{a}}es and Eghosa Guodabia and Amol K. Gupta and David Henry and Richard Austin}, title = {Credit card transaction security}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {18:1--18:6}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409928}, doi = {10.1145/1409908.1409928}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/GraefeLGGGHA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Green07, author = {Andy Green}, title = {Management of security policies for mobile devices}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {22:1--22:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409933}, doi = {10.1145/1409908.1409933}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Green07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/GuimaraesMA07, author = {M{\'{a}}rio A. M. Guimar{\~{a}}es and Meg Murray and Richard Austin}, title = {Incorporating database security courseware into a database security class}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {5:1--5:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409914}, doi = {10.1145/1409908.1409914}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/GuimaraesMA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Hedrick07, author = {Alison Hedrick}, title = {Cyberinsurance: a risk management tool?}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {20:1--20:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409931}, doi = {10.1145/1409908.1409931}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Hedrick07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ImsandH07, author = {Eric S. Imsand and John A. Hamilton Jr.}, title = {Impact of daily computer usage on {GUI} usage analysis}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {30:1--30:9}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409941}, doi = {10.1145/1409908.1409941}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/ImsandH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Joubert07, author = {Scott Joubert}, title = {Managing data access and voice service for remote workers}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {23:1--23:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409934}, doi = {10.1145/1409908.1409934}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Joubert07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Mattord07, author = {Herbert J. Mattord}, title = {Rethinking risk-based information security}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {11:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409921}, doi = {10.1145/1409908.1409921}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Mattord07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Newman07, author = {Robert C. Newman}, title = {Covert computer and network communications}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {12:1--12:8}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409922}, doi = {10.1145/1409908.1409922}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Newman07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/PatelL07, author = {Dipti Patel and Xin Luo}, title = {Take a close look at phishing}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {32:1--32:4}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409943}, doi = {10.1145/1409908.1409943}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/PatelL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/PowellDJWTP07, author = {Valerie J. H. Powell and Christopher T. Davis and Randall S. Johnson and Peter Y. Wu and John C. Turchek and Ian W. Parker}, title = {VLabNet: the integrated design of hands-on learning in information security and networking}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {9:1--9:7}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409918}, doi = {10.1145/1409908.1409918}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/PowellDJWTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/ReidG07, author = {Randall Craig Reid and Arthur H. Gilbert}, title = {Managing security from the perspective of the business executive}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {15:1--15:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409925}, doi = {10.1145/1409908.1409925}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/ReidG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Snyder07, author = {Robin M. Snyder}, title = {Introducing Python programming into the data communications and security courses}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {1:1--1:5}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409910}, doi = {10.1145/1409908.1409910}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Snyder07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Snyder07a, author = {Robin M. Snyder}, title = {Security programming using Python: man-in-the-middle attacks}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {2:1--2:6}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409911}, doi = {10.1145/1409908.1409911}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Snyder07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Spencer07, author = {Wesley Spencer}, title = {Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {29:1--29:7}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409940}, doi = {10.1145/1409908.1409940}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Spencer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Taylor07, author = {Richard G. Taylor}, title = {Making molehills out of mountains: bringing security research to the classroom}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {3:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409912}, doi = {10.1145/1409908.1409912}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Taylor07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/Twitchell07, author = {Douglas P. Twitchell}, title = {SecurityCom: a multi-player game for researching and teaching information security teams}, booktitle = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, pages = {10:1}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908.1409919}, doi = {10.1145/1409908.1409919}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/Twitchell07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infoseccd/2007, title = {Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1409908}, doi = {10.1145/1409908}, isbn = {978-1-59593-909-8}, timestamp = {Tue, 11 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.