default search action
William Glisson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Jeffrey Todd McDonald, Philip Menard, William Glisson:
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics. HICSS 2024: 7375-7376 - [i23]Sundar Krishnan, William Bradley Glisson:
Digital Footprints of Streaming Devices. CoRR abs/2402.06869 (2024) - 2023
- [j21]George Grispos, Kim-Kwang Raymond Choo, William Bradley Glisson:
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices. Mob. Networks Appl. 28(4): 1282-1292 (2023) - [c59]Jonah Fitzgerald, Thomas Mason, Brian Mulhair, William Glisson:
Exploiting a Contact Tracing App to Attack Neighboring Devices. HICSS 2023: 3631-3640 - [c58]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics. HICSS 2023: 6601-6602 - 2022
- [c57]Valentin Gazeau, William Glisson, Cihan Varol, Qingzhong Liu:
Walk This Way: Footwear Recognition Using Images & Neural Networks. HICSS 2022: 1-13 - [c56]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2022: 1-2 - 2021
- [j20]Dustin Mink, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - [c55]Joshua Hightower, William Bradley Glisson, Ryan Benton, Jeffrey Todd McDonald:
Classifying Android Applications Via System Stats. IEEE BigData 2021: 5388-5394 - [c54]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. FABULOUS 2021: 311-322 - [c53]Kim-Kwang Raymond Choo, George Grispos, William Bradley Glisson:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2021: 1-2 - [c52]Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton:
Deception Detection Using Machine Learning. HICSS 2021: 1-10 - [c51]Jeffrey Todd McDonald, Nathan Herron, William Bradley Glisson, Ryan Benton:
Machine Learning-Based Android Malware Detection Using Manifest Permissions. HICSS 2021: 1-10 - [c50]Selim Ozcan, Merve Astekin, William Bradley Glisson, Kim-Kwang Raymond Choo:
DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images. iSCI 2021: 53-61 - [c49]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. TrustCom 2021: 710-717 - [i22]George Grispos, Talon Flynn, William Bradley Glisson, Kim-Kwang Raymond Choo:
Investigating Protected Health Information Leakage from Android Medical Applications. CoRR abs/2105.07360 (2021) - [i21]George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. CoRR abs/2109.05518 (2021) - 2020
- [j19]Lynne Graves, William Bradley Glisson, Kim-Kwang Raymond Choo:
LinkedLegal: Investigating social media as evidence in courtrooms. Comput. Law Secur. Rev. 38: 105408 (2020) - [j18]Edward Harshany, Ryan Benton, David Bourrie, William Bradley Glisson:
Big Data Forensics: Hadoop 3.2.0 Reconstruction. Digit. Investig. 32 Supplement: 300909 (2020) - [c48]Edward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson:
DFS3: automated distributed file system storage state reconstruction. ARES 2020: 43:1-43:10 - [c47]Talon Flynn, George Grispos, William Bradley Glisson, William Mahoney:
Knock! Knock! Who Is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack. HICSS 2020: 1-10 - [c46]William Bradley Glisson, George Grispos, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics. HICSS 2020: 1-2 - [c45]Bronwyn Hodges, Jeffrey Todd McDonald, William Glisson, Mike Jacobs, Maureen Van Devender, John Harold Pardue:
Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices. HICSS 2020: 1-10 - [c44]Avinash Kumar, William Bradley Glisson, Hyuk Cho:
Network Attack Detection Using an Unsupervised Machine Learning Algorithm. HICSS 2020: 1-10 - [c43]Thanh Nguyen, Jeffrey Todd McDonald, William Bradley Glisson, Todd R. Andel:
Detecting Repackaged Android Applications Using Perceptual Hashing. HICSS 2020: 1-10
2010 – 2019
- 2019
- [c42]Stacy Miller, William Bradley Glisson, Matt Campbell, Scott M. Sittig:
Risk Analysis of Residual Protected Health Information of Android Telehealth Apps. AMCIS 2019 - [c41]George Grispos, William Bradley Glisson, Peter Cooper:
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices. HICSS 2019: 1-10 - [c40]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. HICSS 2019: 1-10 - [c39]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. HICSS 2019: 1-10 - [c38]Thomas Watts, Ryan Benton, William Bradley Glisson, Jordan Shropshire:
Insight from a Docker Container Introspection. HICSS 2019: 1-10 - [i20]George Grispos, William Bradley Glisson, Tim Storer:
How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. CoRR abs/1901.03723 (2019) - [i19]George Grispos, William Bradley Glisson, Peter Cooper:
A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices. CoRR abs/1901.03724 (2019) - [i18]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. CoRR abs/1901.07507 (2019) - 2018
- [j17]Adam J. Brown, William Bradley Glisson, Todd R. Andel, Kim-Kwang Raymond Choo:
Cloud forecasting: Legal visibility issues in saturated environments. Comput. Law Secur. Rev. 34(6): 1278-1290 (2018) - [j16]Kim-Kwang Raymond Choo, Matt Bishop, William Bradley Glisson, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. Comput. Secur. 74: 275-276 (2018) - [j15]Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, Kim-Kwang Raymond Choo:
Identifying 3D printer residual data via open-source documentation. Comput. Secur. 75: 10-23 (2018) - [j14]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson, Ryan Benton, Joel A. Dawson, Blair A. Doyle:
Identifying stealth malware using CPU power consumption and learning algorithms. J. Comput. Secur. 26(5): 589-613 (2018) - [c37]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics. HICSS 2018: 1-2 - [c36]Katherine Seale, Jeffrey Todd McDonald, William Bradley Glisson, John Harold Pardue, Michael Jacobs:
MedDevRisk: Risk Analysis Methodology for Networked Medical Devices. HICSS 2018: 1-10 - [c35]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. TrustCom/BigDataSE 2018: 498-503 - [c34]George W. Clark, Michael V. Doran, William Glisson:
A Malicious Attack on the Machine Learning Policy of a Robotic System. TrustCom/BigDataSE 2018: 516-521 - [c33]Taylor Cloyd, Trey Osborn, Brian Ellingboe, William Bradley Glisson, Kim-Kwang Raymond Choo:
Browser Analysis of Residual Facebook Data. TrustCom/BigDataSE 2018: 1440-1445 - [i17]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation into the Use of Bluetooth Protocols. CoRR abs/1808.02153 (2018) - 2017
- [j13]Arafat Mohammed Rashad Al-Dhaqm, Shukor Abd Razak, Siti Hajar Othman, Kim-Kwang Raymond Choo, William Bradley Glisson, Abdul-Rahman Al-Ali, Mohammad Al-Rousan:
CDBFIP: Common Database Forensic Investigation Processes for Internet of Things. IEEE Access 5: 24401-24416 (2017) - [j12]George Grispos, William Bradley Glisson, Tim Storer:
Enhancing security incident response follow-up efforts with lightweight agile retrospectives. Digit. Investig. 22: 62-73 (2017) - [j11]Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, William Bradley Glisson, Kim-Kwang Raymond Choo:
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps. Mob. Networks Appl. 22(2): 240-254 (2017) - [c32]Maureen Van Devender, William Bradley Glisson, Ryan Benton, George Grispos:
Understanding De-identification of Healthcare Big Data. AMCIS 2017 - [c31]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. AMCIS 2017 - [c30]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CHASE 2017: 108-113 - [c29]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack. HICSS 2017: 1-3 - [c28]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson:
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices. HICSS 2017: 1-10 - [c27]Samuel Bennett Moore, William Bradley Glisson, Mark Yampolskiy:
Implications of Malicious 3D Printer Firmware. HICSS 2017: 1-10 - [c26]Thanh Nguyen, Jeffrey Todd McDonald, William Bradley Glisson:
Exploitation and Detection of a Malicious Mobile Application. HICSS 2017: 1-10 - [c25]Dustin Mink, William Bradley Glisson, Ryan Benton, Kim-Kwang Raymond Choo:
Manipulating the Five V's in the Next Generation Air Transportation System. ATCS/SePrIoT@SecureComm 2017: 271-282 - [c24]Jeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, Yuan Xiang Gu:
Enhanced Operating System Protection to Support Digital Forensic Investigations. TrustCom/BigDataSE/ICESS 2017: 650-659 - [i16]George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller:
Security Incident Recognition and Reporting (SIRR): An Industrial Perspective. CoRR abs/1706.06818 (2017) - [i15]George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo:
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach. CoRR abs/1708.05374 (2017) - [i14]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson:
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices. CoRR abs/1709.05026 (2017) - 2016
- [j10]Nurul Hidayah Ab Rahman, William Bradley Glisson, Yanjiang Yang, Kim-Kwang Raymond Choo:
Forensic-by-Design Framework for Cyber-Physical Cloud Systems. IEEE Cloud Comput. 3(1): 50-59 (2016) - [j9]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In-The-Wild Residual Data Research and Privacy. J. Digit. Forensics Secur. Law 11(1): 7-36 (2016) - [c23]Maureen Van Devender, William Bradley Glisson, Matt Campbell, Michael Finan:
Identifying Opportunities to Compromise Medical Devices. AMCIS 2016 - [c22]Dustin Mink, Alec Yasinsac, Kim-Kwang Raymond Choo, William Bradley Glisson:
Next Generation Aircraft Architecture and Digital Forensic. AMCIS 2016 - [c21]William Bradley Glisson, Kim-Kwang Raymond Choo:
Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack. HICSS 2016: 5478 - [c20]Christos Kynigos, William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald:
Utilizing the Cloud to Store Hijacked Camera Images. HICSS 2016: 5497-5506 - [c19]Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman, Zheng Xu, William Bradley Glisson, Kim-Kwang Raymond Choo:
The role of mobile forensics in terrorism investigations involving the use of cloud apps. MobiMedia 2016: 199-204 - [i13]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Towards Security of Additive Layer Manufacturing. CoRR abs/1602.07536 (2016) - [i12]William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell:
In The Wild Residual Data Research and Privacy. CoRR abs/1610.03229 (2016) - 2015
- [c18]Todd R. Andel, Matt Campbell, William Bradley Glisson, Mike Jacobs, Johnny Mayr, Jeffrey Todd McDonald:
Compromising a Medical Mannequin. AMCIS 2015 - [c17]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. AMCIS 2015 - [c16]Kiyoshi J. Berman, William Bradley Glisson, L. Milton Glisson:
Investigating the Impact of Global Positioning System Evidence. HICSS 2015: 5234-5243 - [p1]George Grispos, William Bradley Glisson, Tim Storer:
Recovering residual forensic data from smartphone interactions with cloud storage providers. The Cloud Security Ecosystem 2015: 347-382 - [i11]Kiyoshi J. Berman, William Bradley Glisson, L. Milton Glisson:
Investigating the Impact of Global Positioning System Evidence. CoRR abs/1503.00364 (2015) - [i10]George Grispos, William Bradley Glisson, Tim Storer:
Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers. CoRR abs/1506.02268 (2015) - [i9]George Grispos, William Bradley Glisson, Tim Storer:
Security Incident Response Criteria: A Practitioner's Perspective. CoRR abs/1508.02526 (2015) - [i8]William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr:
Compromising a Medical Mannequin. CoRR abs/1509.00065 (2015) - 2014
- [j8]William Bradley Glisson, Ray Welland:
Web Engineering Security (WES) Methodology. Commun. Assoc. Inf. Syst. 34: 71 (2014) - [c15]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. PPREW@ACSAC 2014: 7:1-7:9 - [c14]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. AMCIS 2014 - [c13]Karl-Johan Karlsson, William Bradley Glisson:
Android Anti-forensics: Modifying CyanogenMod. HICSS 2014: 4828-4837 - [c12]Sean McKeown, David Maxwell, Leif Azzopardi, William Bradley Glisson:
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. IIiX 2014: 175-184 - [i7]Karl-Johan Karlsson, William Bradley Glisson:
Android Anti-forensics: Modifying CyanogenMod. CoRR abs/1401.6444 (2014) - [i6]George Grispos, William Bradley Glisson, Tim Storer:
Rethinking Security Incident Response: The Integration of Agile Principles. CoRR abs/1408.2431 (2014) - [i5]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. CoRR abs/1410.2123 (2014) - [i4]George Grispos, William Bradley Glisson, John Harold Pardue, Mike Dickson:
Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. CoRR abs/1411.2132 (2014) - 2013
- [j7]William Bradley Glisson, Tim Storer, Joe Buchanan-Wollaston:
An empirical comparison of data recovered from mobile forensic toolkits. Digit. Investig. 10(1): 44-55 (2013) - [c11]William Bradley Glisson, Tim Storer:
Investigating Information Security Risks of Mobile Device Use within Organizations. AMCIS 2013 - [c10]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization. ECIS 2013: 27 - [c9]Jack Euan Ross McMillan, William Bradley Glisson, Michael C. Bromby:
Investigating the Increase in Mobile Phone Evidence in Criminal Activities. HICSS 2013: 4900-4909 - [c8]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services. HICSS 2013: 4910-4919 - [c7]Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson:
Comparison of the Data Recovery Function of Forensic Tools. IFIP Int. Conf. Digital Forensics 2013: 331-347 - [i3]George Grispos, William Bradley Glisson, Tim Storer:
Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services. CoRR abs/1303.4078 (2013) - [i2]George Grispos, William Bradley Glisson, Tim Storer:
Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization. CoRR abs/1306.2477 (2013) - [i1]William Bradley Glisson, Tim Storer:
Investigating Information Security Risks of Mobile Device Use within Organizations. CoRR abs/1309.0521 (2013) - 2012
- [j6]George Grispos, Tim Storer, William Bradley Glisson:
Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. Int. J. Digit. Crime Forensics 4(2): 28-48 (2012) - 2011
- [j5]George Grispos, Tim Storer, William Bradley Glisson:
A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit. Investig. 8(1): 23-36 (2011) - [j4]Khawla Al-Wehaibi, Tim Storer, William Bradley Glisson:
Augmenting password recovery with online profiling. Digit. Investig. 8(Supplement): S25-S33 (2011) - [j3]William Bradley Glisson, Tim Storer, Gavin Mayall, Iain Moug, George Grispos:
Electronic retention: what does your mobile phone reveal about you? Int. J. Inf. Sec. 10(6): 337-349 (2011) - [c6]Andrew Tabona, William Bradley Glisson:
Exploring solutions put forth to solve computer forensic investigations of large storage media. WDFIA 2011: 1-16 - 2010
- [c5]William Bradley Glisson, Ray Welland:
Initial Case Study on "the Good, the Bad and the Ugly" Aspects of a New MSc Program in Computer Forensics and E-Discovery. HICSS 2010: 1-10
2000 – 2009
- 2008
- [b1]William Bradley Glisson:
The Web Engineering Security (WES) methodology. University of Glasgow, UK, 2008 - 2007
- [c4]William Bradley Glisson, L. Milton Glisson, Ray Welland:
Secure Web Application Development and Global Regulation. ARES 2007: 681-688 - [c3]William Bradley Glisson, Ray Welland:
Web Engineering Security: Essential Elements. ARES 2007: 707-714 - 2006
- [j2]Eva K. Lee, Siddhartha Maheshwary, Jacquelyn Mason, William Glisson:
Decision support system for mass dispensing of medications for infectious disease outbreaks and bioterrorist attacks. Ann. Oper. Res. 148(1): 25-53 (2006) - [j1]Eva K. Lee, Siddhartha Maheshwary, Jacquelyn Mason, William Glisson:
Large-Scale Dispensing for Emergency Response to Bioterrorism and Infectious-Disease Outbreak. Interfaces 36(6): 591-607 (2006) - [c2]William Bradley Glisson, Andrew McDonald, Ray Welland:
Web engineering security: a practitioner's perspective. ICWE 2006: 257-264 - 2005
- [c1]William Bradley Glisson, Ray Welland:
Web Development Evolution: The Assimilation of Web Engineering Security. LA-WEB 2005: 49-53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint