default search action
Zouheir Trabelsi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Omar Mubin, Fady Alnajjar, Zouheir Trabelsi, Luqman Ali, Medha Mohan Ambali Parambil, Zhao Zou:
Tracking ChatGPT Research: Insights From the Literature and the Web. IEEE Access 12: 30518-30532 (2024) - [j36]Zouheir Trabelsi, Muhammad Ali, Tariq Qayyum:
Fuzzy-based task offloading in Internet of Vehicles (IoV) edge computing for latency-sensitive applications. Internet Things 28: 101392 (2024) - [c65]Ban Al-Omar, Zouheir Trabelsi, Tariq Qayyum, Medha Mohan Ambali Parambil:
AI and Network Security Curricula: Minding the Gap. EDUCON 2024: 1-7 - [c64]Tariq Qayyum, Zouheir Trabelsi, Ban Al-Omar, Medha Mohan Ambali Parambil:
Enhancing Fog/Edge Computing Education Using Extended Network Simulator Omnet++ (xFogSim). EDUCON 2024: 1-9 - [c63]Zouheir Trabelsi, Medha Mohan Ambali Parambil, Tariq Qayyum, Ban Al-Omar:
Teaching DNS Spoofing Attack Using a Hands-on Cybersecurity Approach Based on Virtual Kali Linux Platform. EDUCON 2024: 1-8 - 2023
- [j35]Zouheir Trabelsi, Fady Alnajjar, Medha Mohan Ambali Parambil, Munkhjargal Gochoo, Luqman Ali:
Real-Time Attention Monitoring System for Classroom: A Deep Learning Approach for Student's Behavior Recognition. Big Data Cogn. Comput. 7(1): 48 (2023) - [j34]Kadhim Hayawi, Zahid Anwar, Asad W. Malik, Zouheir Trabelsi:
Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities. IEEE Internet Things J. 10(21): 18941-18950 (2023) - [c62]Tariq Qayyum, Zouheir Trabelsi, Assadullah Tariq, Abdelkader Nasreddine Belkacem, Mohamed Adel Serhani:
Diagnosis of Schizophrenia from EEG signals Using ML Algorithms. BIBM 2023: 2564-2570 - [c61]Ban Al-Omar, Zouheir Trabelsi:
Intrusion Detection Using Attention-Based CNN-LSTM Model. AIAI (1) 2023: 515-526 - [c60]Medha Mohan Ambali Parambil, Amna Mohammed Abdulla Alhammadi, Fady Alnajjar, Zouheir Trabelsi, Luqman Ali, Muhammed Swavaf:
Visualizing Student Attention in Smart Classrooms: A Preliminary Study. IIT 2023: 262-267 - 2022
- [j33]Sujith Samuel Mathew, Kadhim Hayawi, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi:
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey. Clust. Comput. 25(6): 4129-4149 (2022) - [j32]Firas Saidi, Zouheir Trabelsi, Eswari Thangaraj:
A novel framework for semantic classification of cyber terrorist communities on Twitter. Eng. Appl. Artif. Intell. 115: 105271 (2022) - [j31]Abdulrahman Majed Renawi, Fady Alnajjar, Medha Mohan Ambali Parambil, Zouheir Trabelsi, Munkhjargal Gochoo, Sumaya Khalid, Omar Mubin:
A simplified real-time camera-based attention assessment system for classrooms: pilot study. Educ. Inf. Technol. 27(4): 4753-4770 (2022) - [j30]Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, Kadhim Hayawi:
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT). J. Cloud Comput. 11: 72 (2022) - [j29]Tariq Qayyum, Zouheir Trabelsi, Asad W. Malik, Kadhim Hayawi:
Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming. Sensors 22(1): 37 (2022) - [j28]Hesham El-Sayed, Henry Alexander Ignatious, Parag Kulkarni, Manzoor Ahmed Khan, Rafidah Md Noor, Zouheir Trabelsi:
A Novel Multifaceted Trust Management Framework for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(11): 20084-20097 (2022) - [c59]Zouheir Trabelsi:
Investigating the Robustness of IoT Security Cameras against Cyber Attacks. CIoT 2022: 17-23 - [c58]Zouheir Trabelsi, Tariq Qayyum, Kadhim Hayawi, Muhammad Ali:
Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs). COINS 2022: 1-6 - 2021
- [j27]Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, Kadhim Hayawi:
Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities. IEEE Access 9: 21859-21869 (2021) - [c57]Zouheir Trabelsi:
IoT based Smart Home Security Education using a Hands-on Approach. EDUCON 2021: 294-301 - 2020
- [j26]Kadhim Hayawi, Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss. IEEE Access 8: 78029-78043 (2020) - [j25]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézela:
Fuzzy IDS as a service on the cloud for malicious TCP port scanning traffic detection. Intell. Decis. Technol. 14(2): 171-180 (2020) - [c56]Zouheir Trabelsi:
Teaching Network Covert Channels using a Hands-on Approach. EDUCON 2020: 323-328 - [c55]Zouheir Trabelsi, Fady Alnajjar, Mariam Aljaberi, Shamma Aldhaheri, Hend Alkhateri, Fatema Alkhateri:
Robot Security Education: Hands-on Lab Activities Based Teaching Approach. RiE 2020: 61-75 - [p1]Zouheir Trabelsi:
Android-Based Mobile Apps for Hands-on Education. Encyclopedia of Education and Information Technologies 2020: 1-15
2010 – 2019
- 2019
- [j24]Zouheir Trabelsi, Safaa Zeidan, Kadhim Hayawi:
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack. IEEE Access 7: 61596-61609 (2019) - [c54]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection. AICCSA 2019: 1-9 - [c53]Zouheir Trabelsi, Safaa Zeidan:
Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack. AICCSA 2019: 1-8 - [c52]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézela:
An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels. CRiSIS 2019: 177-192 - [c51]Zouheir Trabelsi, Ezedin Barka:
A Basic Course Model on Information Security for High School IT Curriculum. EDUCON 2019: 63-70 - [c50]Zouheir Trabelsi, Heba Saleous:
Exploring the Opportunities of Cisco Packet Tracer For Hands-on Security Courses on Firewalls. EDUCON 2019: 411-418 - [c49]Zouheir Trabelsi, Safaa Zeidan, Heba Saleous:
Teaching Emerging DDoS Attacks on Firewalls: A Case Study of the BlackNurse Attack. EDUCON 2019: 977-985 - [c48]Nuha Almasalmeh, Firas Saidi, Zouheir Trabelsi:
A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection. IWCMC 2019: 877-882 - [c47]Heba Saleous, Zouheir Trabelsi:
Enhancing Firewall Filter Performance Using Neural Networks. IWCMC 2019: 1853-1859 - 2018
- [j23]Zouheir Trabelsi, Safaa Zeidan, Khaled Shuaib, Khaled Salah:
Improved Session Table Architecture for Denial of Stateful Firewall Attacks. IEEE Access 6: 35528-35543 (2018) - [c46]Zouheir Trabelsi, Heba Saleous:
Teaching keylogging and network eavesdropping attacks: Student threat and school liability concerns. EDUCON 2018: 437-444 - [c45]Zouheir Trabelsi, Safaa Zeidan:
Enhanced Session Table Architecture for Stateful Firewalls. ICC 2018: 1-7 - [c44]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining. ICCTA 2018: 55-59 - [c43]N. AlRayhi, Khaled Salah, N. Al-Kork, Ahmed Bentiba, Zouheir Trabelsi, M. Ajmal Azad:
Cloud Automation to Run Large-Scale Quantum Chemical Simulations. IIT 2018: 75-80 - [c42]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
A novel approach for terrorist sub-communities detection based on constrained evidential clustering. RCIS 2018: 1-8 - [c41]Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification. TrustCom/BigDataSE 2018: 436-443 - 2017
- [j22]Firas Saidi, Zouheir Trabelsi, Khaled Salah, Henda Ben Ghézala:
Approaches to analyze cyber terrorist communities: Survey and challenges. Comput. Secur. 66: 66-80 (2017) - [j21]Zouheir Trabelsi, Mohammed Al Matrooshi, Saeed Al Bairaq, Walid Ibrahim, Mohammad M. Masud:
Android based mobile apps for information security hands-on education. Educ. Inf. Technol. 22(1): 125-144 (2017) - [j20]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. IET Inf. Secur. 11(2): 104-113 (2017) - 2016
- [j19]Zouheir Trabelsi, Margaret McCoey:
Ethical Hacking in Information Security Curricula. Int. J. Inf. Commun. Technol. Educ. 12(1): 1-10 (2016) - [j18]Zouheir Trabelsi, Mohammad M. Masud:
An extended identity-based cryptography protocol based on biometric. Int. J. Inf. Priv. Secur. Integr. 2(3): 232-256 (2016) - [j17]Zouheir Trabelsi:
Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network. Inf. Secur. J. A Glob. Perspect. 25(1-3): 68-82 (2016) - [j16]Tahseen Al-Khateeb, Mohammad M. Masud, Khaled Al-Naami, Sadi Evren Seker, Ahmad M. Mustafa, Latifur Khan, Zouheir Trabelsi, Charu C. Aggarwal, Jiawei Han:
Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream. IEEE Trans. Knowl. Data Eng. 28(10): 2752-2764 (2016) - [j15]Imad Hussein Jawhar, Nader Mohamed, Zouheir Trabelsi, Jameela Al-Jaroodi:
Architectures and Strategies for Efficient Communication in Wireless Sensor Networks Using Unmanned Aerial Vehicles. Unmanned Syst. 4(4): 289-305 (2016) - [c40]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud:
Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching. AINA 2016: 808-815 - [c39]Zouheir Trabelsi, Vasiqullah Molvizadah:
Edu-firewall device: An advanced firewall hardware device for information security education. CCNC 2016: 278-279 - [c38]Zouheir Trabelsi:
The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacks. CCNC 2016: 1074-1079 - [c37]Shamma Al Kaabi, Nouf Al Kindi, Shaikha Al Fazari, Zouheir Trabelsi:
Virtualization based ethical educational platform for hands-on lab activities on DoS attacks. EDUCON 2016: 273-280 - [c36]Zouheir Trabelsi, Mohammed Al Matrooshi, Saeed Al Bairaq:
A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation. SIGITE 2016: 48-53 - 2015
- [j14]Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud, Kilani Ghoudi:
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement. Comput. Secur. 53: 109-131 (2015) - [j13]Zouheir Trabelsi, Mohamed Al-Hemairy, Mohammad M. Masud:
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal. J. Intell. Syst. 24(2): 199-213 (2015) - [c35]Khaled Shuaib, Zouheir Trabelsi, Mohammed Abed-Hafez, Ahmed M. Gaouda, Mahmoud A. Alahmad:
Resiliency of Smart Power Meters to Common Security Attacks. ANT/SEIT 2015: 145-152 - 2014
- [j12]Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:
Dynamic rule and rule-field optimisation for improving firewall performance and security. IET Inf. Secur. 8(4): 250-257 (2014) - [j11]Imad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi:
Towards more reliable and secure source routing in mobile ad hoc and sensor networks. Telecommun. Syst. 55(1): 81-91 (2014) - [c34]Zouheir Trabelsi, Umniya Mustafa:
A Web-based Firewall Simulator Tool for Information Security Education. ACE 2014: 83-90 - [c33]Mohammad M. Masud, Umniya Mustafa, Zouheir Trabelsi:
A data driven firewall for faster packet filtering. COMNET 2014: 1-5 - [c32]Zouheir Trabelsi, Safaa Zeidan:
IDS performance enhancement technique based on dynamic traffic awareness histograms. ICC 2014: 975-980 - [c31]Zouheir Trabelsi:
Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach. SIGITE 2014: 39-44 - 2013
- [j10]Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi:
Dynamic traffic awareness statistical model for firewall performance enhancement. Comput. Secur. 39: 160-172 (2013) - [j9]Zouheir Trabelsi, Walid Ibrahim:
A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study. J. Inf. Technol. Educ. Innov. Pract. 12: 299-319 (2013) - [c30]Zouheir Trabelsi, Walid Ibrahim:
Teaching ethical hacking in information security curriculum: A case study. EDUCON 2013: 130-137 - [c29]Zouheir Trabelsi, Latifa Alketbi:
Using network packet generators and snort rules for teaching denial of service attacks. ITiCSE 2013: 285-290 - [c28]Umniya Mustafa, Mohammad M. Masud, Zouheir Trabelsi, Timothy Wood, Zainab Al Harthi:
Firewall performance optimization using data mining techniques. IWCMC 2013: 934-940 - 2012
- [c27]Zouheir Trabelsi, Hishem El Sayed, Safaa Zeidan:
Firewall packet matching optimization using network traffic behavior and packet matching statistics. COMNET 2012: 1-7 - [c26]Zouheir Trabelsi, Safaa Zeidan:
Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement. ICC 2012: 1074-1078 - [c25]Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test. ICICS 2012: 81-92 - 2011
- [j8]Wassim El-Hajj, Hazem M. Hajj, Zouheir Trabelsi, Fadi A. Aloul:
Updating snort with a customized controller to thwart port scanning. Secur. Commun. Networks 4(8): 807-814 (2011) - [c24]Zouheir Trabelsi, Liren Zhang, Safaa Zeidan:
Packet flow histograms to improve firewall efficiency. ICICS 2011: 1-5 - [c23]Zouheir Trabelsi:
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. InfoSecCD 2011: 74-83 - [c22]Zouheir Trabelsi, Safaa Zeidan:
Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule. WIFS 2011: 1-6 - 2010
- [j7]Zouheir Trabelsi, Wassim El-Hajj:
On investigating ARP spoofing security solutions. Int. J. Internet Protoc. Technol. 5(1/2): 92-100 (2010) - [c21]Zouheir Trabelsi, Riham Hamdy:
Implementation of a DNA-based anomaly identification system utilizing associative string processor (ASP). AICCSA 2010: 1-8 - [c20]Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim M. Baggili, Saad Ali Amin:
Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. ICDF2C 2010: 65-77
2000 – 2009
- 2009
- [c19]Wassim El-Hajj, Hazem M. Hajj, Zouheir Trabelsi:
On fault tolerant ad hoc network design. IWCMC 2009: 201-206 - [c18]Senda Hammouda, Zouheir Trabelsi:
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. IWCMC 2009: 942-946 - 2008
- [j6]Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed Anis Benelbahri:
Firewall filtering rules analysis for anomalies detection. Int. J. Secur. Networks 3(3): 161-172 (2008) - [c17]Lilia Frikha, Zouheir Trabelsi:
A new covert channel in WIFI networks. CRiSIS 2008: 255-260 - [c16]Zouheir Trabelsi, Wassim El-Hajj, Safuat Hamdy:
Implementation of an ICMP-based covert channel for file and message transfer. ICECS 2008: 894-897 - [c15]Imad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi:
RAS: A Reliable Routing Protocol for Wireless Ad Hoc and Sensor Networks★. WSAN 2008: 269-279 - [c14]Imad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi:
Towards More Reliable Source Routing in Wireless Networks. NAS 2008: 167-168 - [c13]Senda Hammouda, Lilia Maalej, Zouheir Trabelsi:
Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration. NTMS 2008: 1-5 - 2007
- [j5]Wassim El-Hajj, Zouheir Trabelsi, Dionysios Kountanis:
Fast distributed dominating set based routing in large scale MANETs. Comput. Commun. 30(14-15): 2880-2891 (2007) - [j4]Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie:
A novel covert channel based on the IP header record route option. Int. J. Adv. Media Commun. 1(4): 328-350 (2007) - [c12]Zouheir Trabelsi, Wassim El-Hajj:
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache. ICC 2007: 1355-1360 - [c11]Wassim El-Hajj, Zouheir Trabelsi:
Using a Fuzzy Logic Controller to Thwart Data Link Layer Attacks in Ethernet Networks. WCNC 2007: 2547-2552 - 2006
- [c10]Zouheir Trabelsi, Khaled Shuaib:
Man in the Middle Intrusion Detection. GLOBECOM 2006 - [c9]Zouheir Trabelsi, Khaled Shuaib:
Spoofed ARP Packets Detection in Switched LAN Networks. ICETE (Selected Papers) 2006: 81-91 - [c8]Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie:
Traceroute Based IP Channel for Sending Hidden Short Messages. IWSEC 2006: 421-436 - [c7]Zouheir Trabelsi, Khaled Shuaib:
Spoofed ARP Packets Detection in Switched LAN Networks. SECRYPT 2006: 40-47 - 2005
- [j3]Zouheir Trabelsi, Hamza Rahmani:
An Anti-Sniffer Based on ARP Cache Poisoning Attack. Inf. Secur. J. A Glob. Perspect. 13(6): 23-36 (2005) - [j2]Zouheir Trabelsi:
Switched Network Sniffers Detection Technique Based on IP Packet Routing. Inf. Secur. J. A Glob. Perspect. 14(4): 51-60 (2005) - 2004
- [j1]Zouheir Trabelsi:
A Generic Multimodal Architecture for Integrating Voice and Ink XML Formats. Int. Arab J. Inf. Technol. 1(1) (2004) - [c6]Zouheir Trabelsi, Hamza Rahmani:
Detection of Sniffers in an Ethernet Network. ISC 2004: 170-182 - [c5]Zouheir Trabelsi, Hamza Rahmani, Kamel Kaouech, Mounir Frikha:
Malicious Sniffing Systems Detection Platform. SAINT 2004: 201-207 - [c4]Zouheir Trabelsi, Hamza Rahmani:
Promiscuous Mode Detection Platform. WOSIS 2004: 279-292 - 2002
- [c3]Zouheir Trabelsi, Sung-Hyuk Cha, Darshan Desai, Charles C. Tappert:
Multimodal Integration of Voice and Ink for Pervasive Computing. ISMSE 2002: 222- - [c2]Zouheir Trabelsi, Sung-Hyuk Cha, Darshan Desai, Charles C. Tappert:
A voice and ink XML multimodal architecture for mobile e-commerce systems. Workshop Mobile Commerce 2002: 100-104
1990 – 1999
- 1993
- [c1]Zouheir Trabelsi, Yoshiyuki Kotani, Hirohiko Nisimura:
Heuristics for Generating Informative Responses to Failing User's Queries in Natural Language Database Interfaces. HCI (2) 1993: 362-367
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint