Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 91 matches
- 2011
- Mark Taylor, John Haggerty, David Gresty, Tom Berry:
Digital evidence from peer-to-peer networks. Comput. Law Secur. Rev. 27(6): 647-652 (2011) - José R. Agustina, Gemma Galdon Clavell:
The impact of CCTV on fundamental rights and crime prevention strategies: The case of the Catalan Control Commission of Video surveillance Devices. Comput. Law Secur. Rev. 27(2): 168-174 (2011) - José R. Agustina, Fredesvinda Insa:
Challenges before crime in a digital era: Outsmarting cybercrime offenders - Workshop on Cybercrime, Computer Crime Prevention and the Surveillance Society. Comput. Law Secur. Rev. 27(2): 211-212 (2011) - Ida Madieha bt. Abdul Ghani Azmi:
Bioinformatics and genetic privacy: The impact of the Personal Data Protection Act 2010. Comput. Law Secur. Rev. 27(4): 394-401 (2011) - Tushar Kumar Biswas:
Data and information theft in e-commerce, jurisdictional challenges, related issues and response of Indian laws. Comput. Law Secur. Rev. 27(4): 385-393 (2011) - Ben Buckley, Matt Hunter:
Say cheese! Privacy and facial recognition. Comput. Law Secur. Rev. 27(6): 637-640 (2011) - Carmen Burgos, Beatriz Pavón:
Spanish Supreme Court provides limited relief for data controllers. Comput. Law Secur. Rev. 27(1): 83-85 (2011) - Clare Chambers:
How virtual are virtual economies? An exploration into the legal, social and economic nature of virtual world economies. Comput. Law Secur. Rev. 27(4): 377-384 (2011) - Warren B. Chik:
The Google conundrum: Perpetrator or facilitator on the net? - Forging a fair copyright framework of rights, liability and responsibility in response to search engine 2.0 - Part I: The Google Images Search Engine. Comput. Law Secur. Rev. 27(2): 111-132 (2011) - Warren B. Chik:
The Google conundrum: Perpetrator or facilitator on the net? - Forging a fair copyright framework of rights, liability and responsibility in response to search engine 2.0 - Part II: The Google Books Search Project. Comput. Law Secur. Rev. 27(4): 331-347 (2011) - Richard Cumbley, Peter Church:
A simpler solution for offshoring personal information? Comput. Law Secur. Rev. 27(1): 58-60 (2011) - Colin R. Davies:
An evolutionary step in intellectual property rights - Artificial intelligence and intellectual property. Comput. Law Secur. Rev. 27(6): 601-619 (2011) - Sara Dethridge, Michael Dizon, Jaimini Chauhan, Harriet Robinson:
EU update. Comput. Law Secur. Rev. 27(6): 659-662 (2011) - Sara Dethridge, Michael Dizon, Harriet Robinson, Lauren Stewart:
EU update. Comput. Law Secur. Rev. 27(4): 427-430 (2011) - Sara Dethridge, Michael Dizon, Emily Sweetman, Lauren Hurtley:
EU update. Comput. Law Secur. Rev. 27(5): 551-556 (2011) - Sara Dethridge, Michael Dizon, Joanna Thompson, Sarah Philpott:
EU update. Comput. Law Secur. Rev. 27(3): 308-312 (2011) - Hasan A. Deveci:
Hyperlinks citations, reproducing original works. Comput. Law Secur. Rev. 27(5): 465-478 (2011) - Ian Edwards:
English High Court decides that "making available" over the internet only occurs in the jurisdiction where the servers are based. Comput. Law Secur. Rev. 27(2): 189-190 (2011) - Kathy Eivazi:
Computer use monitoring and privacy at work. Comput. Law Secur. Rev. 27(5): 516-523 (2011) - Keiran Hardy:
WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws. Comput. Law Secur. Rev. 27(2): 152-161 (2011) - Kamal Halili Hassan:
Information and Communication Technology Law, State, Internet and Information, Legal & Regulatory Challenges. Comput. Law Secur. Rev. 27(6): 679-680 (2011) - Paul de Hert, Monika Kopcheva:
International mutual legal assistance in criminal law made redundant: A comment on the Belgian Yahoo! case. Comput. Law Secur. Rev. 27(3): 291-297 (2011) - Pessi Honkasalo:
Links and copyright law. Comput. Law Secur. Rev. 27(3): 258-266 (2011) - Paul Hunton:
The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Comput. Law Secur. Rev. 27(1): 61-67 (2011) - Noriswadi Ismail:
Cursing the Cloud (or) Controlling the Cloud? Comput. Law Secur. Rev. 27(3): 250-257 (2011) - Noriswadi Ismail:
Personal data protection in Malaysia - law and practice. Comput. Law Secur. Rev. 27(4): 447-448 (2011) - Ameen Jauhar:
All talk and no bite: Copyright infringement and piracy trends in India. Comput. Law Secur. Rev. 27(5): 537-541 (2011) - Andrew Joint, Edwin Baker:
Knowing the past to understand the present1 - issues in the contracting for cloud based services. Comput. Law Secur. Rev. 27(4): 407-415 (2011) - Richard Jones, Dalal Tahri:
Online selling and contracting: An overview of EU rules. Comput. Law Secur. Rev. 27(4): 402-406 (2011) - Richard Jones, Dalal Tahri:
An overview of EU data protection rules on use of data collected online. Comput. Law Secur. Rev. 27(6): 630-636 (2011)
skipping 61 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-10 03:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint