default search action
Ketil Stølen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Ketil Stølen:
Development of parallel programs on shared data-structures - Revised version. CoRR abs/2404.16624 (2024) - 2023
- [b4]Ketil Stølen:
Technology Research Explained - Design of Software, Architectures, Methods, and Technology in General. Springer 2023, ISBN 978-3-031-25816-9, pp. 1-167 - [c72]Shukun Tokas, Gencer Erdogan, Ketil Stølen:
Privacy-Aware IoT: State-of-the-Art and Challenges. ICISSP 2023: 450-461
2010 – 2019
- 2018
- [c71]Roman Wirtz, Maritta Heisel, Rene Meis, Aida Omerovic, Ketil Stølen:
Problem-based Elicitation of Security Requirements - The ProCOR Method. ENASE 2018: 26-38 - [c70]Roman Wirtz, Maritta Heisel, Angela Borchert, Rene Meis, Aida Omerovic, Ketil Stølen:
Risk-Based Elicitation of Security Requirements According to the ISO 27005 Standard. ENASE (Selected Papers) 2018: 71-97 - [e5]Peng Liu, Sjouke Mauw, Ketil Stølen:
Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10744, Springer 2018, ISBN 978-3-319-74859-7 [contents] - 2016
- [c69]Erik G. Nilsson, Ketil Stølen:
A case-based assessment of the FLUIDE framework for specifying emergency response user interfaces. EICS 2016: 97-107 - [c68]Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal:
Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. ICISSP 2016: 219-226 - [c67]Erik G. Nilsson, Ketil Stølen:
The FLUIDE Framework for Specifying Emergency Response User Interfaces Employed to a Search and Rescue Case. ISCRAM 2016 - [c66]Gencer Erdogan, Ketil Stølen:
Design Decisions in the Development of a Graphical Language for Risk-Driven Security Testing. RISK 2016: 99-114 - [p3]Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen:
Mandatory and Potential Choice: Comparing Event-B and STAIRS. From Action Systems to Distributed Systems 2016: 15-27 - 2015
- [b3]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
Cyber-Risk Management. Springer Briefs in Computer Science, Springer 2015, ISBN 978-3-319-23569-1, pp. 1-131 - [j19]Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal:
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies. Int. J. Secur. Softw. Eng. 6(2): 90-112 (2015) - [j18]Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen:
Stepwise refinement of sequence diagrams with soft real-time constraints. J. Comput. Syst. Sci. 81(7): 1221-1251 (2015) - [j17]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
Security risk analysis of system changes exemplified within the oil and gas domain. Int. J. Softw. Tools Technol. Transf. 17(3): 251-266 (2015) - 2014
- [j16]Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen:
Approaches for the combined use of risk analysis and testing: a systematic literature review. Int. J. Softw. Tools Technol. Transf. 16(5): 627-642 (2014) - [c65]Gencer Erdogan, Atle Refsdal, Ketil Stølen:
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions. ISSRE Workshops 2014: 305-310 - [p2]Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen:
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. Engineering Secure Future Internet Services and Systems 2014: 315-344 - [p1]Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, Ketil Stølen:
Divide and Conquer - Towards a Notion of Risk Model Encapsulation. Engineering Secure Future Internet Services and Systems 2014: 345-365 - [e4]Thomas Bauer, Jürgen Großmann, Fredrik Seehusen, Ketil Stølen, Marc-Florian Wendland:
Risk Assessment and Risk-Driven Testing - First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8418, Springer 2014, ISBN 978-3-319-07075-9 [contents] - 2013
- [j15]Ragnhild Kobro Runde, Atle Refsdal, Ketil Stølen:
Relating computer systems to sequence diagrams: the impact of underspecification and inherent nondeterminism. Formal Aspects Comput. 25(2): 159-187 (2013) - [c64]Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:
An Approach to Select Cost-Effective Risk Countermeasures. DBSec 2013: 266-273 - [c63]Gencer Erdogan, Atle Refsdal, Ketil Stølen:
A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams. RISK@ICTSS 2013: 93-108 - [i3]Le Minh Sang Tran, Bjørnar Solhaug, Ketil Stølen:
An Approach to Select Cost-Effective Risk Countermeasures Exemplified in CORAS. CoRR abs/1302.4689 (2013) - 2012
- [j14]Aida Omerovic, Bjørnar Solhaug, Ketil Stølen:
Assessing practical usefulness and performance of the PREDIQT method: An industrial case study. Inf. Softw. Technol. 54(12): 1377-1395 (2012) - [c62]Aslak Wegner Eide, Ketil Stølen:
Geographic Visualization of Risk as Decision Support in Emergency Situations. HSI 2012: 81-88 - [c61]André Alexandersen Hauge, Ketil Stølen:
A Pattern-Based Method for Safe Control Systems Exemplified within Nuclear Power Production. SAFECOMP 2012: 13-24 - 2011
- [b2]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Model-Driven Risk Analysis - The CORAS Approach. Springer 2011, ISBN 978-3-642-12322-1, pp. I-XVI, 1-460 - [j13]Bjørnar Solhaug, Ketil Stølen:
Preservation of Policy Adherence under Refinement. Int. J. Softw. Informatics 5(1-2): 139-157 (2011) - [c60]Olav S. Ligaarden, Atle Refsdal, Ketil Stølen:
Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis. Metrisec@ESEM 2011: 88-95 - [c59]Gyrd Brændeland, Atle Refsdal, Ketil Stølen:
A Denotational Model for Component-Based Risk Analysis. FACS 2011: 12-41 - [c58]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Risk Analysis of Changing and Evolving Systems Using CORAS. FOSAD 2011: 231-274 - [c57]André Alexandersen Hauge, Ketil Stølen:
Towards Patterns for Handling Safety Critical Adaptive Control Software. ICINCO (1) 2011: 211-214 - [c56]Fredrik Seehusen, Ketil Stølen:
An Evaluation of the Graphical Modeling Framework (GMF) Based on the Development of the CORAS Tool. ICMT@TOOLS 2011: 152-166 - [c55]Olav S. Ligaarden, Mass Soldal Lund, Atle Refsdal, Fredrik Seehusen, Ketil Stølen:
An architectural pattern for enterprise level monitoring tools. MESOCA 2011: 1-10 - [c54]Erik G. Nilsson, Ketil Stølen:
Generic functionality in user interfaces for emergency response. OZCHI 2011: 233-242 - [c53]André Alexandersen Hauge, Ketil Stølen:
SACS: a pattern language for safe adaptive control software. PLoP 2011: 7:1-7:22 - [c52]Aida Omerovic, Bjørnar Solhaug, Ketil Stølen:
Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case Study. SSIRI 2011: 137-146 - [c51]Bjørnar Solhaug, Ketil Stølen:
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. STM 2011: 1-5 - 2010
- [j12]Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen:
Evolution in Relation to Risk and Trust Management. Computer 43(5): 49-55 (2010) - [j11]Tormod V. Håvaldsrud, Olav S. Ligaarden, Per Myrseth, Atle Refsdal, Ketil Stølen, Jon Ølnes:
Experiences from using a UML-based method for trust analysis in an industrial project on electronic procurement. Electron. Commer. Res. 10(3-4): 441-467 (2010) - [j10]Gyrd Brændeland, Atle Refsdal, Ketil Stølen:
Modular analysis and modelling of risk scenarios with dependencies. J. Syst. Softw. 83(10): 1995-2013 (2010) - [c50]Erik G. Nilsson, Ketil Stølen:
Ad Hoc Networks and Mobile Devices in Emergency Response - A Perfect Match? - (Invited Paper). ADHOCNETS 2010: 17-33 - [c49]Aida Omerovic, Anette Andresen, Håvard Grindheim, Per Myrseth, Atle Refsdal, Ketil Stølen, Jon Ølnes:
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. ESSoS 2010: 231-240
2000 – 2009
- 2009
- [j9]Fredrik Seehusen, Ketil Stølen:
Information flow security, abstraction and composition. IET Inf. Secur. 3(1): 9-33 (2009) - [j8]Fredrik Seehusen, Bjørnar Solhaug, Ketil Stølen:
Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies. Softw. Syst. Model. 8(1): 45-65 (2009) - [c48]Atle Refsdal, Ketil Stølen:
Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence. IFIPTM 2009: 215-233 - [c47]Aida Omerovic, Ketil Stølen:
Simplifying Parametrization of Bayesian Networks in Prediction of System Quality. SSIRI 2009: 447-448 - 2008
- [j7]Atle Refsdal, Ketil Stølen:
Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis. Sci. Comput. Program. 74(1-2): 34-42 (2008) - [c46]Bjørnar Solhaug, Ketil Stølen:
Compositional Refinement of Policies in UML - Exemplified for Access Control. ESORICS 2008: 300-316 - [c45]Atle Refsdal, Bjørnar Solhaug, Ketil Stølen:
A UML-based Method for the Development of Policies to Support Trust Management. IFIPTM 2008: 33-49 - [c44]Fredrik Seehusen, Ketil Stølen:
A Transformational Approach to Facilitate Monitoring of High-Level Policies. POLICY 2008: 70-73 - [e3]Andy Ozment, Ketil Stølen:
Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-321-1 [contents] - 2007
- [c43]Gyrd Brændeland, Heidi E. I. Dahl, Iselin Engan, Ketil Stølen:
Using Dependent CORAS Diagrams to Analyse Mutual Dependency. CRITIS 2007: 135-148 - [c42]Mass Soldal Lund, Atle Refsdal, Ketil Stølen:
Semantics of UML Models for Dynamic Behavior - A Survey of Different Approaches. Model-Based Engineering of Embedded Real-Time Systems 2007: 77-103 - [c41]Bjørnar Solhaug, Dag Elgesem, Ketil Stølen:
Specifying Policies Using UML Sequence Diagrams - An Evaluation Based on a Case Study. POLICY 2007: 19-28 - [c40]Atle Refsdal, Ketil Stølen:
Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis. STM@ESORICS 2007: 15-29 - [e2]Günter Karjoth, Ketil Stølen:
Proceedings of the 3th ACM Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007. ACM 2007, ISBN 978-1-59593-885-5 [contents] - 2006
- [c39]Gyrd Brændeland, Ketil Stølen:
Using model-based security analysis in component-oriented system development. QoP 2006: 11-18 - [c38]Mass Soldal Lund, Ketil Stølen:
A Fully General Operational Semantics for UML 2.0 Sequence Diagrams with Potential and Mandatory Choice. FM 2006: 380-395 - [c37]Atle Refsdal, Ragnhild Kobro Runde, Ketil Stølen:
Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams. FMOODS 2006: 138-155 - [c36]Mass Soldal Lund, Ketil Stølen:
Deriving Tests from UML 2.0 Sequence Diagrams with neg and assert. AST 2006: 22-28 - [c35]Michael D. Wilson, Alvaro Arenas, David W. Chadwick, Theo Dimitrakos, Jürgen Doser, Pablo Giambiagi, David Golby, Christian Geuer-Pollmann, Jochen Haller, Ketil Stølen, Tobias Mahler, Lorenzo Martino, Xavier Parent, Santi Ristol, J. Sairamesh, Lutz Schubert, Nilufer Tuptuk:
The TrustCoM Approach to Enforcing Agreements between Interoperating Enterprises. I-ESA 2006: 365-375 - [c34]Gyrd Brændeland, Ketil Stølen:
A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. Formal Aspects in Security and Trust 2006: 31-46 - [c33]Fredrik Seehusen, Ketil Stølen:
Maintaining Information Flow Security Under Refinement and Transformation. Formal Aspects in Security and Trust 2006: 143-157 - [c32]Ida Hogganvik, Ketil Stølen:
A Graphical Approach to Risk Identification, Motivated by Empirical Investigations. MoDELS 2006: 574-588 - [c31]Fredrik Seehusen, Ketil Stølen:
Information flow property preserving transformation of UML interaction diagrams. SACMAT 2006: 150-159 - [e1]Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio Massacci:
Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings. Lecture Notes in Computer Science 3986, Springer 2006, ISBN 3-540-34295-8 [contents] - 2005
- [j6]Folker den Braber, Arne Bjørn Mildal, Jone Nes, Ketil Stølen, Fredrik Vraalsen:
Experiences from Using the CORAS Methodology to Analyze a Web Application. J. Cases Inf. Technol. 7(3): 110-130 (2005) - [j5]Ragnhild Kobro Runde, Øystein Haugen, Ketil Stølen:
Refining UML Interactions with Underspecification and Nondeterminism. Nord. J. Comput. 12(2): 157-188 (2005) - [j4]Øystein Haugen, Knut Eilif Husa, Ragnhild Kobro Runde, Ketil Stølen:
STAIRS towards formal design with sequence diagrams. Softw. Syst. Model. 4(4): 355-367 (2005) - [c30]Ragnhild Kobro Runde, Øystein Haugen, Ketil Stølen:
The Pragmatics of STAIRS. FMCO 2005: 88-114 - [c29]Atle Refsdal, Knut Eilif Husa, Ketil Stølen:
Specification and Refinement of Soft Real-Time Requirements Using Sequence Diagrams. FORMATS 2005: 32-48 - [c28]Fredrik Seehusen, Ketil Stølen:
Graphical Specification of Dynamic Network Structure. ICEIS (3) 2005: 203-210 - [c27]Ida Hogganvik, Ketil Stølen:
Risk analysis terminology for IT-systems: does it match intuition? ISESE 2005: 13-22 - [c26]Fredrik Vraalsen, Mass Soldal Lund, Tobias Mahler, Xavier Parent, Ketil Stølen:
Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language. iTrust 2005: 45-60 - [c25]Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, Ketil Stølen:
The CORAS Tool for Security Risk Analysis. iTrust 2005: 402-405 - [c24]Ida Hogganvik, Ketil Stølen:
On the Comprehension of Security Risk Scenarios. IWPC 2005: 115-124 - [r1]Folker den Braber, Mass Soldal Lund, Ketil Stølen, Fredrik Vraalsen:
Integrating Security in the Development Process with UML. Encyclopedia of Information Science and Technology (III) 2005: 1560-1566 - 2004
- [c23]Gyrd Brændeland, Ketil Stølen:
Using Risk Analysis to Assess User Trust: A Net-Bank Scenario. iTrust 2004: 146-160 - 2003
- [c22]Mass Soldal Lund, Folker den Braber, Ketil Stølen:
Maintaining Results from Security Assessment. CSMR 2003: 341-350 - [c21]Øystein Haugen, Knut Eilif Husa, Ragnhild Kobro Runde, Ketil Stølen:
Why Timed Sequence Diagrams Require Three-Event Semantics. Scenarios: Models, Transformations and Tools 2003: 1-25 - [c20]Yannis C. Stamatiou, Eva Skipenes, Eva Henriksen, Nikos Stathiakis, Adamantios Sikianakis, Eliana Charalambous, Nikos Antonakis, Ketil Stølen, Folker den Braber, Mass Soldal Lund, Katerina Papadaki, George Valvis:
The CORAS approach for model-based risk management applied to a telemedicine service. MIE 2003: 206-211 - [c19]Øystein Haugen, Ketil Stølen:
STAIRS - Steps to Analyze Interactions with Refinement Semantics. UML 2003: 388-402 - 2002
- [c18]Dimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen:
The coras approach for model-based risk management applied to e-commerce domain. Communications and Multimedia Security 2002: 169-181 - [c17]Jan Øyvind Aagedal, Folker den Braber, Theodosis Dimitrakos, Bjørn Axel Gran, Dimitris Raptis, Ketil Stølen:
Model-Based Risk Assessment to Improve Enterprise Security. EDOC 2002: 51- - [c16]Theodosis Dimitrakos, Dimitris Raptis, Brian Ritchie, Ketil Stølen:
Model Based Security Risk Analysis for Web Applications. EuroWeb 2002 - [c15]Theodosis Dimitrakos, Brian Ritchie, Dimitris Raptis, Jan Øyvind Aagedal, Folker den Braber, Ketil Stølen, Siv Hilde Houmb:
Integrating Model-based Security Risk Management into eBusiness Systems Development: The CORAS Approach. I3E 2002: 159-175 - [c14]Rune Fredriksen, Monica Kristiansen, Bjørn Axel Gran, Ketil Stølen, Tom Arthur Opperud, Theodosis Dimitrakos:
The CORAS Framework for a Model-Based Risk Management Process. SAFECOMP 2002: 94-105 - 2001
- [b1]Manfred Broy, Ketil Stølen:
Specification and Development of Interactive Systems - Focus on Streams, Interfaces, and Refinement. Monographs in Computer Science, Springer 2001, ISBN 978-1-4612-6518-4, pp. 1-348 - [j3]Radu Grosu, Ketil Stølen:
Stream-Based Specification of Mobile Systems. Formal Aspects Comput. 13(1): 1-31 (2001) - 2000
- [c13]Ketil Stølen, P. Mohn:
Experience from Using MSC, UML and SDL in the Development of the FAME Communication Manager. SAM 2000: 276-
1990 – 1999
- 1999
- [c12]Ketil Stølen:
Specification of Dynamic Reconfiguration in the Context of Input/Output Relations. FMOODS 1999 - 1998
- [c11]Ketil Stølen, Max Fuchs:
An Exercise in Conditional Refinement. Prospects for Hardware Foundations 1998: 390-420 - 1996
- [j2]Ketil Stølen, Frank Dederichs, Rainer Weber:
Specification and Refinement of Networks of Asynchronously Communicating Agents Using the Assumption/Commitment Paradigm. Formal Aspects Comput. 8(2): 127-161 (1996) - [j1]Ketil Stølen:
Refinement Principles Supporting the Transition from Asynchronous to Synchronous Communication. Sci. Comput. Program. 26(1-3): 255-272 (1996) - [c10]Radu Grosu, Ketil Stølen:
A Model for Mobile Point-to-Point Data-flow Networks without Channel Sharing. AMAST 1996: 504-519 - [c9]Ketil Stølen:
Assumption/Commitment Rules for Dataflow Networks - With an Emphasis on Completeness. ESOP 1996: 356-372 - 1995
- [c8]Ketil Stølen:
A Refinement Relation Supporting the Transition from Unbounded to Bounded Communication Buffers. MPC 1995: 423-451 - 1994
- [c7]Ketil Stølen:
Using Relations to Solve the RPC-Memory Specification Problem. Formal Systems Specification 1994: 477-520 - [c6]Eckhardt Holz, Ketil Stølen:
An attempt to embed a restricted version of SDL as a target language in Focus. FORTE 1994: 324-339 - [c5]Manfred Broy, Ketil Stølen:
Specification and Refinement of Finite Dataflow Networks - a Relational Approach. FTRTFT 1994: 247-267 - 1993
- [i2]Ketil Stølen, Frank Dederichs, Rainer Weber:
Assumption, commitment rules for networks of asynchronously communicating agents. Forschungsberichte, TU Munich TUM I 9303: 1-47 (1993) - [i1]Max Fuchs, Ketil Stølen:
Development of a distributed min max component. Forschungsberichte, TU Munich TUM I 9338: 1-26 (1993) - 1992
- [c4]Ketil Stølen:
Shared-state design modulo weak and strong process fairness. FORTE 1992: 479-498 - [c3]Ketil Stølen:
Proving Total Correctness with Respect to a Fair (Shared-State) Parallel Language. Refine 1992: 320-341 - 1991
- [c2]Ketil Stølen:
A Method for the Development of Totally Correct Shared-State Parallel Programs. CONCUR 1991: 510-525 - [c1]Ketil Stølen:
An Attempt to Reason about Shared-State Concurrency in the Style of VDM. VDM Europe (1) 1991: 324-342
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-05 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint