


default search action
Christian W. Probst
Person information
- affiliation: Unitec Institute of Technology, High Tech Transdisciplinary Research Network, Auckland, New Zealand
- affiliation (former): Technical University of Denmark, Department of Applied Mathematics and Computer Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c49]Raúl Pardo, Willard Rafnsson, Gregor Steinhorn, Denis Lavrov, Thomas Lumley, Christian W. Probst, Ilze Ziedins, Andrzej Wasowski
:
Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores. DPM/CBT@ESORICS 2022: 103-119 - [i18]Raúl Pardo, Willard Rafnsson, Gregor Steinhorn
, Denis Lavrov, Thomas Lumley, Christian W. Probst, Ilze Ziedins, Andrzej Wasowski
:
Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores. CoRR abs/2208.12497 (2022) - 2021
- [c48]Raúl Pardo, Willard Rafnsson, Christian W. Probst, Andrzej Wasowski
:
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis. ESORICS (2) 2021: 417-438 - 2020
- [i17]Raúl Pardo, Willard Rafnsson, Christian W. Probst, Andrzej Wasowski:
Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis. CoRR abs/2011.08742 (2020)
2010 – 2019
- 2019
- [c47]Heiko Mantel, Christian W. Probst:
On the Meaning and Purpose of Attack Trees. CSF 2019: 184-199 - [e11]Massimiliano Albanese, Ross Horne, Christian W. Probst:
Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. Lecture Notes in Computer Science 11720, Springer 2019, ISBN 978-3-030-36536-3 [contents] - [i16]Florian Kammüller, Oladapo O. Ogunyanwo, Christian W. Probst:
Designing Data Protection for GDPR Compliance into IoT Healthcare Systems. CoRR abs/1901.02426 (2019) - 2018
- [j17]Weizhi Meng
, Kim-Kwang Raymond Choo
, Steven Furnell, Athanasios V. Vasilakos
, Christian W. Probst
:
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 761-773 (2018) - [c46]Weizhi Meng
, Yu Wang, Wenjuan Li
, Zhe Liu, Jin Li, Christian W. Probst
:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - [c45]René Rydhof Hansen
, Christian W. Probst:
Modelling and Analysing Overlay Networks by Ambients with Wormholes. ICMU 2018: 1-4 - [c44]Ahmed Seid Yesuf, Christian W. Probst:
Estimating the Risk of Fraud Against E-Services. NordSec 2018: 306-322 - 2017
- [j16]Florian Kammüller, Manfred Kerber, Christian W. Probst:
Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 44-78 (2017) - [j15]Florian Kammüller, Christian W. Probst
:
Modeling and Verification of Insider Threats Using Logical Analysis. IEEE Syst. J. 11(2): 534-545 (2017) - [c43]Jason Perno, Christian W. Probst
:
Behavioural Profiling in Cyber-Social Systems. HCI (22) 2017: 507-517 - 2016
- [j14]Wolter Pieters, Jeroen Barendse, Margaret Ford, Claude P. R. Heath, Christian W. Probst
, Ruud Verbij:
The Navigation Metaphor in Security Economics. IEEE Secur. Priv. 14(3): 14-21 (2016) - [c42]Christian W. Probst
, Florian Kammüller, René Rydhof Hansen
:
Formal Modelling and Analysis of Socio-Technical Systems. Semantics, Logics, and Calculi 2016: 54-73 - [c41]Florian Kammueller, Manfred Kerber, Christian W. Probst:
Towards Formal Analysis of Insider Threats for Auctions. MIST@CCS 2016: 23-34 - [c40]Taolue Chen
, Tingting Han, Florian Kammueller, Ibrahim Nemli, Christian W. Probst
:
Model based analysis of insider threats. Cyber Security And Protection Of Digital Services 2016: 1-3 - [c39]Florian Kammüller, Jason R. C. Nurse, Christian W. Probst
:
Attack Tree Analysis for Insider Threats on the IoT Using Isabelle. HCI (20) 2016: 234-246 - [c38]Christian W. Probst
:
Guaranteeing Privacy-Observing Data Exchange. ISoLA (1) 2016: 958-969 - [c37]Min Gu, Zaruhi Aslanyan, Christian W. Probst
:
Understanding How Components of Organisations Contribute to Attacks. NordSec 2016: 54-66 - [c36]Muhammad Aufeef Chauhan
, Muhammad Ali Babar, Christian W. Probst
:
A Process Framework for Designing Software Reference Architectures for Providing Tools as a Service. PROFES 2016: 111-126 - [e10]Christian W. Probst
, Chris Hankin
, René Rydhof Hansen
:
Semantics, Logics, and Calculi - Essays Dedicated to Hanne Riis Nielson and Flemming Nielson on the Occasion of Their 60th Birthdays. Lecture Notes in Computer Science 9560, Springer 2016, ISBN 978-3-319-27809-4 [contents] - [i15]Tyler W. Moore, Christian W. Probst, Kai Rannenberg, Michel van Eeten:
Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461). Dagstuhl Reports 6(11): 63-89 (2016) - 2015
- [c35]Zaruhi Aslanyan, Marieta Georgieva Ivanova, Flemming Nielson, Christian W. Probst:
Modelling and Analysing Socio-Technical Systems. STPIS@CAiSE 2015: 121-124 - [c34]Nicolas David, Alexandre David, René Rydhof Hansen
, Kim Guldstrand Larsen
, Axel Legay, Mads Chr. Olesen, Christian W. Probst
:
Modelling Social-Technical Attacks with Timed Automata. MIST@CCS 2015: 21-28 - [c33]Christian W. Probst
, Jan Willemson, Wolter Pieters:
The Attack Navigator. GraMSec@CSF 2015: 1-17 - [c32]Marieta Georgieva Ivanova, Christian W. Probst
, René Rydhof Hansen
, Florian Kammüller:
Transforming Graphical System Models to Graphical Attack Models. GraMSec@CSF 2015: 82-96 - [c31]Steffen Helke, Florian Kammüller, Christian W. Probst
:
Secure Refactoring with Java Information Flow. DPM/QASA@ESORICS 2015: 264-272 - [c30]Taolue Chen
, Florian Kammüller, Ibrahim Nemli, Christian W. Probst
:
A Probabilistic Analysis Framework for Malicious Insider Threats. HCI (22) 2015: 178-189 - [c29]Lars Frydendal Bonnichsen, Christian Wilhelm Probst
, Sven Karlsson
:
Hardware Transactional Memory Optimization Guidelines, Applied to Ordered Maps. TrustCom/BigDataSE/ISPA (3) 2015: 124-131 - [c28]Marieta Georgieva Ivanova, Christian W. Probst
, René Rydhof Hansen
, Florian Kammüller:
Attack Tree Generation by Policy Invalidation. WISTP 2015: 249-259 - [p3]Michael Nidd, Marieta Georgieva Ivanova, Christian W. Probst, Axel Tanner:
Tool-based risk assessment of cloud infrastructures as socio-technical systems. The Cloud Security Ecosystem 2015: 495-517 - [i14]Lars F. Bonnichsen, Christian W. Probst, Sven Karlsson:
Implementation of BT-trees. CoRR abs/1505.01210 (2015) - 2014
- [j13]Florian Kammüller, Christian W. Probst:
Invalidating Policies using Structural Information. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 59-79 (2014) - [c27]Andreas Erik Hindborg, Pascal Schleuniger, Nicklas Bo Jensen, Maxwell Walter, Laust Brock-Nannestad, Lars F. Bonnichsen, Christian W. Probst
, Sven Karlsson
:
Automatic generation of application specific FPGA multicore accelerators. ACSSC 2014: 1440-1444 - [c26]Jose Quaresma, Christian W. Probst, Flemming Nielson
:
The Guided System Development Framework: Modeling and Verifying Communication Systems. ISoLA (2) 2014: 509-523 - [c25]Florian Kammüller, Christian W. Probst
:
Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis. IEEE Symposium on Security and Privacy Workshops 2014: 229-235 - [c24]Christian W. Probst, René Rydhof Hansen:
Model-based Abstraction of Data Provenance. TAPP 2014 - 2013
- [j12]Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Externalizing Behaviour for Analysing System Models. J. Internet Serv. Inf. Secur. 3(3/4): 52-62 (2013) - [j11]Christian W. Probst, René Rydhof Hansen:
Reachability-based Impact as a Measure for Insiderness. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 38-48 (2013) - [j10]Markus Aleksy
, Ralf Gitzel, Andreas Krall, Hanspeter Mössenböck
, Christian W. Probst
, Ben Stephenson
:
Foreword. Sci. Comput. Program. 78(5): 423-424 (2013) - [c23]Florian Kammüller, Christian W. Probst
:
Invalidating Policies using Structural Information. IEEE Symposium on Security and Privacy Workshops 2013: 76-81 - [i13]Lars F. Bonnichsen, Sven Karlsson, Christian W. Probst:
ELB-Trees, An Efficient and Lock-free B-tree Derivative. CoRR abs/1308.6145 (2013) - 2012
- [c22]Wolter Pieters, Sanne H. G. van der Ven, Christian W. Probst:
A move in the security measurement stalemate: elo-style ratings to quantify vulnerability. NSPW 2012: 1-14 - [p2]Christian W. Probst
, Martina Angela Sasse, Wolter Pieters, Trajce Dimkov, Erik Luysterborg, Michel Arnaud:
Privacy Penetration Testing: How to Establish Trust in Your Cloud Provider. European Data Protection 2012: 251-265 - [i12]Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert
, Christian W. Probst:
Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501). Dagstuhl Reports 2(12): 37-48 (2012) - 2011
- [j9]Christian W. Probst:
Identifying and Mitigating Insider Threats. it Inf. Technol. 53(4): 202-206 (2011) - [j8]Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai:
Addressing Insider Threats and Information Leakage. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 1-3 (2011) - [j7]Jeffrey Hunker, Christian W. Probst:
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 4-27 (2011) - [c21]Matthieu Quéva, Tomi Männistö, Laurent Ricci, Christian W. Probst:
Modelling Configuration Knowledge in Heterogeneous Product Families. Configuration Workshop 2011 - [c20]Martin Schoeberl
, Pascal Schleuniger, Wolfgang Puffitsch
, Florian Brandner, Christian W. Probst:
Towards a Time-predictable Dual-Issue Microprocessor: The Patmos Approach. PPES 2011: 11-21 - [e9]Christian W. Probst, Christian Wimmer:
Proceedings of the 9th International Conference on Principles and Practice of Programming in Java, PPPJ 2011, Kongens Lyngby, Denmark, August 24-26, 2011. ACM 2011, ISBN 978-1-4503-0935-6 [contents] - [i11]Sabrina De Capitani di Vimercati, Wolter Pieters, Christian W. Probst:
Secure Architectures in the Cloud (Dagstuhl Seminar 11492). Dagstuhl Reports 1(12): 11-26 (2011) - 2010
- [j6]Rocco De Nicola
, Daniele Gorla
, René Rydhof Hansen
, Flemming Nielson
, Hanne Riis Nielson
, Christian W. Probst
, Rosario Pugliese
:
From Flow Logic to static type systems for coordination languages. Sci. Comput. Program. 75(6): 376-397 (2010) - [c19]Sören Bleikertz, Matthias Schunter, Christian W. Probst
, Dimitrios Pendarakis, Konrad Eriksson:
Security audits of multi-tier virtual infrastructures in public infrastructure clouds. CCSW 2010: 93-102 - [c18]Jose Quaresma, Christian W. Probst
:
Protocol Implementation Generator. NordSec 2010: 256-268 - [c17]Matthieu Quéva, Christian W. Probst
, Laurent Ricci:
Maintaining Arc Consistency in Non-Binary Dynamic CSPs using Simple Tabular Reduction. STAIRS 2010: 251-263 - [p1]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Aspects of Insider Threats. Insider Threats in Cyber Security 2010: 1-15 - [e8]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010. Dagstuhl Seminar Proceedings 10341, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2010 [contents] - [e7]Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - [i10]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010 - [i9]Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Insider Threats: Strategies for Prevention, Mitigation, and Response 2010
2000 – 2009
- 2009
- [c16]Christian W. Probst
, René Rydhof Hansen
:
Fluid information systems. NSPW 2009: 125-132 - [c15]Christian W. Probst
, René Rydhof Hansen
:
Analysing Access Control Specifications. SADFE 2009: 22-33 - [c14]Christian W. Probst, Jeffrey Hunker:
The Risk of Risk Analysis-And its relation to the Economics of Insider Threats. WEIS 2009 - [e6]Ben Stephenson, Christian W. Probst:
Proceedings of the 7th International Conference on Principles and Practice of Programming in Java, PPPJ 2009, Calgary, Alberta, Canada, August 27-28, 2009. ACM 2009, ISBN 978-1-60558-598-7 [contents] - 2008
- [j5]Christian W. Probst
, René Rydhof Hansen
:
An extensible analysable system model. Inf. Secur. Tech. Rep. 13(4): 235-246 (2008) - [j4]Andreas Gal, Christian W. Probst
, Michael Franz:
Java bytecode verification via static single assignment form. ACM Trans. Program. Lang. Syst. 30(4): 21:1-21:21 (2008) - [c13]René Rydhof Hansen
, Flemming Nielson
, Hanne Riis Nielson
, Christian W. Probst
:
Static Validation of Licence Conformance Policies. ARES 2008: 1104-1111 - [c12]Rocco De Nicola
, Daniele Gorla
, René Rydhof Hansen
, Flemming Nielson
, Hanne Riis Nielson
, Christian W. Probst
, Rosario Pugliese
:
From Flow Logic to Static Type Systems for Coordination Languages. COORDINATION 2008: 100-116 - [e5]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
Countering Insider Threats, 20.07. - 25.07.2008. Dagstuhl Seminar Proceedings 08302, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [e4]Matt Bishop, Christian W. Probst, Angelos D. Keromytis, Anil Somayaji:
Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008. ACM 2008, ISBN 978-1-60558-341-9 [contents] - [i8]Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst:
08302 Abstracts Collection - Countering Insider Threats. Countering Insider Threats 2008 - [i7]Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann:
08302 Summary - Countering Insider Threats. Countering Insider Threats 2008 - 2007
- [j3]Christian W. Probst
, Ulrich Kremer, Luca Benini
, Peter Schelkens
:
Power-aware computing systems. Int. J. Embed. Syst. 3(1/2): 3-7 (2007) - [j2]Vasanth Venkatachalam, Michael Franz, Christian W. Probst
:
A new way of estimating compute-boundedness and its application to dynamic voltage scaling. Int. J. Embed. Syst. 3(1/2): 17-30 (2007) - [c11]Michael Franz, Andreas Gal, Christian W. Probst:
Automatic generation of machine emulators: Efficient synthesis of robust virtual machines for legacy software migration. Software Engineering 2007: 83-94 - [e3]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst:
Power-aware Computing Systems, 21.01. - 26.01.2007. Dagstuhl Seminar Proceedings 07041, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i6]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst:
07041 Summary - Power-aware Computing Systems. Power-aware Computing Systems 2007 - [i5]Luca Benini, Naehyuck Chang, Ulrich Kremer, Christian W. Probst:
07041 Abstracts Collection - Power-aware Computing Systems. Power-aware Computing Systems 2007 - [i4]Chris J. Bleakley, Tom Clerckx, Harald Devos, Matthias Grumer, Alex Janek, Ulrich Kremer, Christian W. Probst, Phillip Stanley-Marbell, Christian Steger, Vasanth Venkatachalam, Manuel Wendt:
07041 Working Group - Towards Interfaces for Integrated Performance and Power Analysis and Simulation. Power-aware Computing Systems 2007 - 2006
- [c10]René Rydhof Hansen
, Christian W. Probst
, Flemming Nielson
:
Sandboxing in myKlaim. ARES 2006: 174-181 - [c9]Christian W. Probst
, Andreas Gal, Robert Grimm
, Olaf Spinczyk:
Linguistic support for modern operating systems workshop on programming languages and operating systems 2006 (PLOS 2006). PLOS 2006: 1 - [c8]Julia L. Lawall, Christian W. Probst
, Ulrik Pagh Schultz
:
Issues in holistic system design. PLOS 2006: 12 - [c7]Christian W. Probst, René Rydhof Hansen
, Flemming Nielson:
Where Can an Insider Attack? Formal Aspects in Security and Trust 2006: 127-142 - [c6]Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen
:
Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184 - [c5]Andreas Gal, Christian W. Probst, Michael Franz:
HotpathVM: an effective JIT compiler for resource-constrained devices. VEE 2006: 144-153 - [e2]Christian W. Probst:
Proceedings of the 3rd Workshop on Programming Languages and Operating Systems: Linguistic Support for Modern Operating Systems, PLOS 2006, San Jose, California, USA, October 22, 2006. ACM 2006, ISBN 1-59593-577-0 [contents] - 2005
- [j1]Michael Franz, Deepak Chandra, Andreas Gal, Vivek Haldar, Christian W. Probst
, Fermín Reig, Ning Wang:
A portable virtual machine target for proof-carrying code. Sci. Comput. Program. 57(3): 275-294 (2005) - [c4]Christian W. Probst, Andreas Gal, Michael Franz:
Average case vs. worst case: margins of safety in system design. NSPW 2005: 25-32 - [c3]Andreas Gal, Christian W. Probst
, Michael Franz:
Integrated Java Bytecode Verification. AIOOL@VMCAI 2005: 27-38 - [c2]Andreas Gal, Christian W. Probst
, Michael Franz:
Structural Encoding of Static Single Assignment Form. COCV@ETAPS 2005: 85-102 - [e1]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens:
Power-aware Computing Systems, 3.-8. April 2005. Dagstuhl Seminar Proceedings 05141, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany 2005 [contents] - [i3]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens:
05141 Summary - Power-aware Computing Systems. Power-aware Computing Systems 2005 - [i2]Luca Benini, Ulrich Kremer, Christian W. Probst, Peter Schelkens:
05141 Abstracts Collection - Power-aware Computing Systems. Power-aware Computing Systems 2005 - [i1]Vasanth Venkatachalam, Christian W. Probst, Michael Franz:
A Multilevel Introspective Dynamic Optimization System For Holistic Power-Aware Computing. Power-aware Computing Systems 2005 - 2002
- [b1]Christian W. Probst:
A demand-driven solver for constraint-based control flow analysis. Saarland University, Saarbrücken, Germany, COD Verlag 2002, ISBN 978-3-9807096-0-6, pp. I-XVI, 1-133 - [c1]Christian W. Probst
:
Modular Control Flow Analysis for Libraries. SAS 2002: 165-179
Coauthor Index
aka: Florian Kammueller

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint