default search action
Lo'ai Ali Tawalbeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j43]Yousra Belfaik, Yassine Sadqi, Yassine Maleh, Said Safi, Lo'ai Ali Tawalbeh, Khaled Salah:
A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain. IEEE Access 11: 67660-67678 (2023) - [j42]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Zero-day attack detection: a systematic literature review. Artif. Intell. Rev. 56(10): 10733-10811 (2023) - [c45]Lo'ai Tawalbeh, John Delgado, Steven Solis, Travis Juarez, Justin Duken Tietjen, Fadi Muheidat:
Energy Consumption and Carbon Emissions Data Analysis: Case Study and Future Predictions. ANT/EDI40 2023: 616-623 - 2022
- [j41]Gökay Saldamli, Charit Upadhyay, Devika Jadhav, Rohit Shrishrimal, Bapugouda Patil, Lo'ai Tawalbeh:
Improved gossip protocol for blockchain applications. Clust. Comput. 25(3): 1915-1926 (2022) - [j40]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. Clust. Comput. 25(3): 2125-2141 (2022) - [j39]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A comprehensive deep learning benchmark for IoT IDS. Comput. Secur. 114: 102588 (2022) - [j38]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks. J. Inf. Secur. Appl. 67: 103196 (2022) - [j37]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(2): 1-2 (2022) - [j36]Yassine Maleh, Lo'ai Tawalbeh:
Editorial. J. ICT Stand. 10(3): i-ii (2022) - [j35]Petar Lachkov, Lo'ai Tawalbeh, Smriti Bhatt:
Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing. J. Web Eng. 21(7): 2187-2208 (2022) - [c44]Muammer Eren Sahin, Lo'ai Tawalbeh, Fadi Muheidat:
The Security Concerns On Cyber-Physical Systems And Potential Risks Analysis Using Machine Learning. ANT/EDI40 2022: 527-534 - [c43]Izzat Alsmadi, Lo'ai Tawalbeh:
New Waves of Cyber Attacks in the Time of COVID19. Honoring Professor Mohammad S. Obaidat 2022: 617-630 - [c42]Fadi Muheidat, Khalil Dajani, Lo'ai Ali Tawalbeh:
Security Concerns for 5G/6G Mobile Network Technology and Quantum Communication. FNC/MobiSPC/SEIT 2022: 32-40 - [c41]Lo'ai Ali Tawalbeh, Michael Alicea, Izzat Alsmadi:
New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications. FNC/MobiSPC/SEIT 2022: 111-118 - 2021
- [j34]Ahmed Sedik, Lo'ai Tawalbeh, Mohamed Hammad, Ahmed A. Abd El-Latif, Ghada M. El Banby, Ashraf A. M. Khalaf, Fathi E. Abd El-Samie, Abdullah M. Iliyasu:
Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities. IEEE Access 9: 94780-94788 (2021) - [j33]Amjad Hussain Zahid, Lo'ai Tawalbeh, Musheer Ahmad, Ahmed Alkhayyat, Malik Tahir Hassan, Atif Manzoor, Alaa Kadhim Farhan:
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications. IEEE Access 9: 98460-98475 (2021) - [j32]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity. Big Data 9(2): 146-147 (2021) - [j31]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(3): 149-150 (2021) - [j30]Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Yassine Maleh, Gökay Saldamli:
Call for Special Issue Papers: Big Data Analytics and Intelligent Systems for Cybersecurity: Deadline for Manuscript Submission: September 15, 2021. Big Data 9(4): 322-323 (2021) - [j29]Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Models versus Datasets: Reducing Bias through Building a Comprehensive IDS Benchmark. Future Internet 13(12): 318 (2021) - [j28]Lo'ai Ali Tawalbeh, Gökay Saldamli:
Reconsidering big data security and privacy in cloud and mobile cloud systems. J. King Saud Univ. Comput. Inf. Sci. 33(7): 810-819 (2021) - [j27]Khizar Abbas, Lo'ai Ali Tawalbeh, Ahsan Rafiq, Ammar Muthanna, Ibrahim A. Elgendy, Ahmed A. Abd El-Latif:
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. Secur. Commun. Networks 2021: 5597679:1-5597679:13 (2021) - [c40]Fadi Muheidat, Dhaval Patel, Spandana Tammisetty, Lo'ai Ali Tawalbeh, Mais Tawalbeh:
Emerging Concepts Using Blockchain and Big Data. EUSPN/ICTH 2021: 15-22 - [i1]Ramya Daddanala, Vekata Mannava, Lo'ai Tawalbeh, Mohammad Al-Ramahi:
Vehicle to Vehicle (V2V) Communication Protocol: Components, Benefits, Challenges, Safety and Machine Learning Applications. CoRR abs/2102.07306 (2021) - 2020
- [j26]Fadi Muheidat, Lo'ai Tawalbeh:
In-Home Floor Based Sensor System-Smart Carpet- to Facilitate Healthy Aging in Place (AIP). IEEE Access 8: 178627-178638 (2020) - [j25]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh:
Automated negotiated user profiling across distributed social mobile clouds for resource optimisation. Concurr. Comput. Pract. Exp. 32(1) (2020) - [j24]Lo'ai Tawalbeh, Mohammad Tawalbeh, Monther Aldwairi:
Improving the impact of power efficiency in mobile cloud applications using cloudlet model. Concurr. Comput. Pract. Exp. 32(21) (2020) - [c39]David Zaldivar, Lo'ai Ali Tawalbeh, Fadi Muheidat:
Investigating the Security Threats on Networked Medical Devices. CCWC 2020: 488-493 - [c38]Gökay Saldamli, Ardalan Razavi, Lo'ai Tawalbeh:
Swarm Robotics meets Blockchain to deploy Surveillance missions. ICM 2020: 1-6 - [c37]Sai Mounika Tadaka, Lo'ai Tawalbeh:
Applications of Blockchain in Healthcare, Industry 4, and Cyber-Physical Systems. IoTSMS 2020: 1-8 - [c36]Gökay Saldamli, Vamshi Reddy, Krishna S. Bojja, Manjunatha K. Gururaja, Yashaswi Doddaveerappa, Lo'ai Tawalbeh:
Health Care Insurance Fraud Detection Using Blockchain. SDS 2020: 145-152
2010 – 2019
- 2019
- [c35]Gökay Saldamli, Sumedh Deshpande, Kaustubh Jawalekar, Pritam Gholap, Lo'ai Tawalbeh, Levent Ertaul:
Wildfire Detection using Wireless Mesh Network. FMEC 2019: 229-234 - [c34]Smriti Bhatt, Lo'ai Tawalbeh, Pankaj Chhetri, Paras Bhatt:
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. FMEC 2019: 241-246 - [c33]Wafaa Kanakri, Lo'ai Ali Tawalbeh:
WSN-based Interactive Dynamic Maps for Guidance in Al-Masjid Al-Haram. IoTSMS 2019: 326-330 - [c32]Robert Hughes, Fadi Muheidat, Mason Lee, Lo'ai Ali Tawalbeh:
Floor Based Sensors Walk Identification System Using Dynamic Time Warping with Cloudlet Support. ICSC 2019: 440-444 - 2018
- [j23]Elhadj Benkhelifa, Benjamin E. Thomas, Lo'ai Tawalbeh, Yaser Jararweh:
A framework and a process for digital forensic analysis on smart phones with multiple data logs. Int. J. Embed. Syst. 10(4): 323-333 (2018) - [j22]Yaser Jararweh, Haythem Bany Salameh, Abdallah Alturani, Lo'ai Ali Tawalbeh, Houbing Song:
Anomaly-based framework for detecting dynamic spectrum access attacks in cognitive radio networks. Telecommun. Syst. 67(2): 217-229 (2018) - [c31]Esraa Ahmadoh, Lo'ai Ali Tawalbeh:
Power consumption experimental analysis in smart phones. FMEC 2018: 295-299 - [c30]Suhaila Habeeb, Lo'ai Ali Tawalbeh:
Feasibility study and requirements for mobile cloud healthcare systems in Saudi Arabia. FMEC 2018: 300-304 - [c29]Lo'ai Ali Tawalbeh, Suhaila Habeeb:
An Integrated Cloud Based Healthcare System. IoTSMS 2018: 268-273 - [c28]Fadi Muheidat, Lo'ai Tawalbeh, Harry W. Tyrer:
Context-Aware, Accurate, and Real Time Fall Detection System for Elderly People. ICSC 2018: 329-333 - [c27]Omar Badarneh, Mahmoud Al-Ayyoub, Nouh Alhindawi, Lo'ai Ali Tawalbeh, Yaser Jararweh:
Fine-Grained Emotion Analysis of Arabic Tweets: A Multi-target Multi-label Approach. ICSC 2018: 340-345 - 2017
- [j21]Yaser Jararweh, Mahmoud Al-Ayyoub, Lo'ai Tawalbeh, Ala Darabseh, Houbing Song:
Software-defined systems support for secure cloud computing based on data classification. Ann. des Télécommunications 72(5-6): 335-345 (2017) - [j20]Lo'ai Ali Tawalbeh, Fadi Ababneh, Yaser Jararweh, Fahd M. Al-Dosari:
Trust delegation-based secure mobile cloud computing framework. Int. J. Inf. Comput. Secur. 9(1/2): 36-48 (2017) - [j19]Yaser Jararweh, Mahmoud Al-Ayyoub, Muneera Al-Quraan, Lo'ai Ali Tawalbeh, Elhadj Benkhelifa:
Delay-aware power optimization model for mobile edge computing systems. Pers. Ubiquitous Comput. 21(6): 1067-1077 (2017) - [c26]Anwaar AlDairi, Lo'ai Tawalbeh:
Cyber Security Attacks on Smart Cities and Associated Mobile Technologies. ANT/SEIT 2017: 1086-1091 - [c25]Lo'ai Tawalbeh, Sonia Hashish, Hala Tawalbeh:
Quality of Service requirements and Challenges in Generic WSN Infrastructures. ANT/SEIT 2017: 1116-1121 - [c24]Lo'ai Ali Tawalbeh, Hala Tawalbeh, Houbing Song, Yaser Jararweh:
Intrusion and attacks over mobile networks and cloud health systems. INFOCOM Workshops 2017: 13-17 - [c23]Wafaa Kanakri, Lo'ai Ali Tawalbeh, Ayman Alharbi:
Dos and Donts Integrated System Based on GPS and Cloud Technologies for Pilgrims. MASS 2017: 622-627 - 2016
- [j18]Lo'ai Ali Tawalbeh, Anas Basalamah, Rashid Mehmood, Hala Tawalbeh:
Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption. IEEE Access 4: 858-868 (2016) - [j17]Lo'ai Ali Tawalbeh, Rashid Mehmood, Elhadj Benkhelifa, Houbing Song:
Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications. IEEE Access 4: 6171-6180 (2016) - [j16]Khadijah Bahwaireth, Lo'ai Tawalbeh, Elhadj Benkhelifa, Yaser Jararweh, Mohammad Tawalbeh:
Experimental comparison of simulation tools for efficient cloud and mobile cloud computing applications. EURASIP J. Inf. Secur. 2016: 15 (2016) - [j15]Lo'ai Tawalbeh, Yousef Haddad, Omar Khamis, Elhadj Benkhelifa, Yaser Jararweh, Fahd M. Al-Dosari:
Efficient and secure software-defined mobile cloud computing infrastructure. Int. J. High Perform. Comput. Netw. 9(4): 328-341 (2016) - [j14]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh, Anas Basalamah:
Energy Optimisation for Mobile Device Power Consumption: A Survey and a Unified View of Modelling for a Comprehensive Network Simulation. Mob. Networks Appl. 21(4): 575-588 (2016) - [c22]Majed AlOtaibi, Lo'ai Ali Tawalbeh, Yaser Jararweh:
Integrated sensors system based on IoT and mobile cloud computing. AICCSA 2016: 1-5 - [c21]Lo'ai Ali Tawalbeh, Turki F. Al-Somani:
More secure Internet of Things using robust encryption algorithms against side channel attacks. AICCSA 2016: 1-6 - [c20]Elhadje Benkhelifa, Benjamin E. Thomas, Lo'ai Ali Tawalbeh, Yaser Jararweh:
Framework for Mobile Devices Analysis. ANT/SEIT 2016: 1188-1193 - [c19]Lo'ai Ali Tawalbeh, Waseem Bakheder, Houbing Song:
A Mobile Cloud Computing Model Using the Cloudlet Scheme for Big Data Applications. CHASE 2016: 73-77 - [c18]Muneera Al-Quraan, Mahmoud Al-Ayyoub, Yaser Jararweh, Lo'ai Tawalbeh, Elhadj Benkhelifa:
Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets. FiCloud Workshops 2016: 34-38 - [c17]Lo'ai Ali Tawalbeh, Waseem Bakhader:
A Mobile Cloud System for Different Useful Applications. FiCloud Workshops 2016: 295-298 - [c16]Mohammad Tawalbeh, Alan Eardley, Lo'ai Tawalbeh:
Studying the Energy Consumption in Mobile Devices. FNC/MobiSPC 2016: 183-189 - [c15]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Tawalbeh, Yaser Jararweh, Mahmoud Al-Ayyoub:
Leveraging Software-Defined-Networking for Energy Optimisation in Mobile-Cloud-Computing. FNC/MobiSPC 2016: 479-484 - [c14]Lo'ai Ali Tawalbeh, Waseem Bakhader, Rashid Mehmood, Houbing Song:
Cloudlet-Based Mobile Cloud Computing for Healthcare Applications. GLOBECOM 2016: 1-6 - [c13]Lo'ai Ali Tawalbeh, Turki F. Al-Somani, Hilal Houssain:
Towards secure communications: Review of side channel attacks and countermeasures on ECC. ICITST 2016: 87-91 - [c12]Khadijah Bahwaireth, Lo'ai Tawalbeh:
Cooperative models in cloud and mobile cloud computing. ICT 2016: 1-4 - [c11]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Ali Tawalbeh, Abdallah Khreishah, Yaser Jararweh, Mahmoud Al-Ayyoub:
GA-Based Resource Augmentation Negotation for Energy-Optimised Mobile Ad-hoc Cloud. MobileCloud 2016: 110-116 - 2015
- [j13]Lo'ai Ali Tawalbeh, Yaser Jararweh, Fadi Ababneh, Fahd Dosari:
Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing. J. Networks 10(01): 70-76 (2015) - [j12]Yaser Jararweh, Huda Ababneh, Mohammad Alhammouri, Lo'ai Ali Tawalbeh:
Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers. J. Networks 10(5): 273-280 (2015) - [c10]Khadijah S. Bahwaireth, Lo'ai Tawalbeh, Anas Basalamah, Yaser Jararweh, Mohammad Tawalbeh:
Efficient techniques for energy optimization in Mobile Cloud Computing. AICCSA 2015: 1-8 - [c9]Lo'ai Ali Tawalbeh, Nour S. Darwazeh, Raad S. Al-Qassas, Fahd M. Al-Dosari:
A Secure Cloud Computing Model based on Data Classification. ANT/SEIT 2015: 1153-1158 - [c8]Elhadj Benkhelifa, Thomas Welsh, Lo'ai Ali Tawalbeh, Yaser Jararweh, Anas Basalamah:
User Profiling for Energy Optimisation in Mobile Cloud Computing. ANT/SEIT 2015: 1159-1165 - [c7]Mahmoud Al-Ayyoub, Yaser Jararweh, Lo'ai Ali Tawalbeh, Elhadj Benkhelifa, Anas Basalamah:
Power Optimization of Large Scale Mobile Cloud Computing Systems. FiCloud 2015: 670-674 - [c6]Lo'ai Ali Tawalbeh, Yousef Haddad, Omar Khamis, Fahd M. Aldosari, Elhadj Benkhelifa:
Efficient Software-Based Mobile Cloud Computing Framework. IC2E 2015: 317-322 - [c5]Lo'ai Tawalbeh, Raad S. Al-Qassas, Nour S. Darwazeh, Yaser Jararweh, Fahd M. Al-Dosari:
Secure and Efficient Cloud Computing Framework. ICCAC 2015: 291-295 - 2014
- [j11]Yaser Jararweh, Ola Al-Sharqawi, Nawaf A. Abdulla, Lo'ai Ali Tawalbeh, Mohammad Alhammouri:
High-Throughput Encryption for Cloud Computing Storage System. Int. J. Cloud Appl. Comput. 4(2): 1-14 (2014) - [c4]Yaser Jararweh, Lo'ai Tawalbeh, Fadi Ababneh, Abdallah Khreishah, Fahd Dosari:
Scalable Cloudlet-based Mobile Computing Model. FNC/MobiSPC 2014: 434-441 - 2013
- [j10]Lo'ai Ali Tawalbeh, Moad Mowafi, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2) (2013) - [j9]Omar Banimelhem, Lo'ai Ali Tawalbeh, Moad Mowafi, Mohammed A. Al-Batati:
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. Int. J. Inf. Secur. Priv. 7(3): 1-15 (2013) - [c3]Yaser Jararweh, Lo'ai Ali Tawalbeh, Fadi Ababneh, Fahd Dosari:
Resource Efficient Mobile Computing Using Cloudlet Infrastructure. MSN 2013: 373-377 - 2012
- [j8]Lo'ai Ali Tawalbeh, Yaser Jararweh, Abidalrahman Mohammad:
An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications. Int. Arab J. Inf. Technol. 9(3): 284-290 (2012) - [j7]Lo'ai Ali Tawalbeh, Omar Banimelhem, Mohammed A. Al-Batati:
A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process. Inf. Secur. J. A Glob. Perspect. 21(5): 256-268 (2012) - [j6]Yaser Jararweh, Lo'ai Ali Tawalbeh, Hala Tawalbeh, Abidalrahman Moh'd:
Hardware Performance Evaluation of SHA-3 Candidate Algorithms. J. Information Security 3(2): 69-76 (2012) - [j5]Moad Mowafi, Lo'ai Ali Tawalbeh, Walid A. Aljoby, Mohammad Al-Rousan:
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol. J. Information Security 3(4): 272-280 (2012) - 2011
- [c2]Abidalrahman Moh'd, Yaser Jararweh, Lo'ai Ali Tawalbeh:
AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. IAS 2011: 292-297 - 2010
- [j4]Lo'ai Ali Tawalbeh, Saadeh Sweidan:
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm. Inf. Secur. J. A Glob. Perspect. 19(5): 243-252 (2010) - [j3]Lo'ai Ali Tawalbeh, Abidalrahman Mohammad, Adnan Abdul-Aziz Gutub:
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations. J. Signal Process. Syst. 59(3): 233-244 (2010)
2000 – 2009
- 2009
- [j2]Lo'ai Ali Tawalbeh, Saed Swedan, Adnan Abdul-Aziz Gutub:
Efficient Modular Squaring Algorithms for Hardware Implementation in GF(p). Inf. Secur. J. A Glob. Perspect. 18(3): 131-138 (2009) - 2006
- [j1]Alexandre F. Tenca, Song Park, Lo'ai Ali Tawalbeh:
Carry-Save Representation Is Shift-Unsafe: The Problem and Its Solution. IEEE Trans. Computers 55(5): 630-635 (2006) - 2004
- [c1]Lo'ai Ali Tawalbeh, Alexandre F. Tenca:
An Algorithm and Hardware Architecture for Integrated Modular Division and Multiplication in GF(p) and GF(2n). ASAP 2004: 247-257
Coauthor Index
aka: Elhadje Benkhelifa
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint