首页 > 最新文献

International cybersecurity law review最新文献

英文 中文
European information regulation in the Ukraine War 乌克兰战争中的欧洲信息管制
Pub Date : 2023-03-09 DOI: 10.1365/s43439-023-00083-0
Sebastian Louven
{"title":"European information regulation in the Ukraine War","authors":"Sebastian Louven","doi":"10.1365/s43439-023-00083-0","DOIUrl":"https://doi.org/10.1365/s43439-023-00083-0","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"14 1","pages":"249-251"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74839667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285 Ifeoma Nwafor博士:尼日利亚的网络犯罪和法律问题与发展。(2022) CLDS出版社。1 - 285页
Pub Date : 2023-01-30 DOI: 10.1365/s43439-023-00080-3
Sizwe Snail ka Mtuze
{"title":"Dr. Ifeoma Nwafor: Cybercrime and the law: issues and developments in Nigeria. (2022) CLDS Publishing. pp. 1–285","authors":"Sizwe Snail ka Mtuze","doi":"10.1365/s43439-023-00080-3","DOIUrl":"https://doi.org/10.1365/s43439-023-00080-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"8 1","pages":"253-254"},"PeriodicalIF":0.0,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82723757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The curious case of automated decision-making in India 印度自动化决策的奇特案例
Pub Date : 2023-01-27 DOI: 10.1365/s43439-022-00078-3
P. Ashok
{"title":"The curious case of automated decision-making in India","authors":"P. Ashok","doi":"10.1365/s43439-022-00078-3","DOIUrl":"https://doi.org/10.1365/s43439-022-00078-3","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"28 13","pages":"235-248"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72589586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie 被确定者感染了mz
Pub Date : 2023-01-16 DOI: 10.1365/s43439-022-00077-4
Valentin Vogel, Nicolas Ziegler
{"title":"Kritikalität: Von der BSI-KritisV zur NIS2-Richtlinie","authors":"Valentin Vogel, Nicolas Ziegler","doi":"10.1365/s43439-022-00077-4","DOIUrl":"https://doi.org/10.1365/s43439-022-00077-4","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"9 1","pages":"1-19"},"PeriodicalIF":0.0,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83541302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability management as compliance requirement in product security regulation-a game changer for producers' liability and consequential improvement of the level of security in the Internet of Things? 漏洞管理作为产品安全法规的合规要求——改变物联网中生产者责任和安全水平的游戏规则?
Pub Date : 2023-01-01 DOI: 10.1365/s43439-022-00064-9
Roman Dickmann

The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and end user perspective. It starts with civil law and the necessity to address security requirements and specifications in individual contractual terms. Data and consumer protection laws have not helped much, mainly because of missing definitions and levels of applicable security. Two new EU directives reforming the law of obligations may improve the situation for consumers since security is now a named quality requirement, especially for the sale of (digital) goods. Also introduced is the provision of security updates as a contractual duty. But both rule sets address only the traders, not the producers. This is different with the activation of clauses in the radio equipment directive, which sets IT security measures as requirements to be compliant for CE labeling. An important element is the introduction of a vulnerability management system. Details can be found in the draft of technical standard ETSI/EN 303645. The work concludes with a look at the EU's efforts regarding certification schemes and the interaction of all regulation elements, with more liability for insecure products plus the hope for effectiveness.

本文从消费者和最终用户的角度概述了欧盟(EU)对物联网产品中信息技术(IT)安全的监管。它从民法和在个别合同条款中解决安全要求和规范的必要性开始。数据和消费者保护法并没有起到多大作用,主要是因为缺乏适用的安全定义和级别。欧盟改革义务法的两项新指令可能会改善消费者的处境,因为安全现在是一项明确的质量要求,特别是对于(数字)商品的销售。还引入了作为合同义务提供安全更新的规定。但这两套规则都只针对贸易商,而不是生产者。这与无线电设备指令中的激活条款不同,该指令将IT安全措施设置为符合CE标签的要求。一个重要的因素是引入脆弱性管理系统。详细信息可参见技术标准ETSI/EN 303645草案。最后,研究了欧盟在认证计划方面的努力,以及所有监管要素之间的相互作用,对不安全产品承担更多责任,并希望提高有效性。
{"title":"Vulnerability management as compliance requirement in product security regulation-a game changer for producers' liability and consequential improvement of the level of security in the Internet of Things?","authors":"Roman Dickmann","doi":"10.1365/s43439-022-00064-9","DOIUrl":"https://doi.org/10.1365/s43439-022-00064-9","url":null,"abstract":"<p><p>The article outlines the European Union (EU) regulation of information technology (IT) security in Internet of Things products from a consumer and end user perspective. It starts with civil law and the necessity to address security requirements and specifications in individual contractual terms. Data and consumer protection laws have not helped much, mainly because of missing definitions and levels of applicable security. Two new EU directives reforming the law of obligations may improve the situation for consumers since security is now a named quality requirement, especially for the sale of (digital) goods. Also introduced is the provision of security updates as a contractual duty. But both rule sets address only the traders, not the producers. This is different with the activation of clauses in the radio equipment directive, which sets IT security measures as requirements to be compliant for CE labeling. An important element is the introduction of a vulnerability management system. Details can be found in the draft of technical standard ETSI/EN 303645. The work concludes with a look at the EU's efforts regarding certification schemes and the interaction of all regulation elements, with more liability for insecure products plus the hope for effectiveness.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 1","pages":"21-37"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9483465/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10826774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance. 国家数据保护局(ANPD)在其独立形象中的适当结构的替代方案:克服数字治理时代技术挑战的建议。
Pub Date : 2023-01-01 DOI: 10.1365/s43439-023-00081-2
Gabrielle Bezerra Sales Sarlet, Daniel Piñeiro Rodriguez

This article aims to identify the necessary elements for the independent and democratic structuring of the National Data Protection Authority (ANPD) in its definitive legal profile, as an autarchy under a special regime, so that it can achieve the technical and decision-making autonomy that it was granted by the Brazilian Data Protection Law (LGPD). Drawing on documentary research and findings on similar foreign authorities, it is possible to point out, as a partial result of this analysis, the insufficiency of entrusting such a mission to its recent formal separation from the Direct Administration, being also possible to conclude that the success of the state modernization in the Digital Age will depend, to a large extent, on intertemporal choices able to direct the ANPD towards a structure attentive to technological innovations. To this end, the training and continuing education of the institution's staff, as well as possible agreements to be signed by the entity, such as the alternatives sought by the Courts of Accounts in the field of information and communications technology (ICT), emerge as a determining factor.

本文旨在确定国家数据保护局(ANPD)在其明确的法律形象中独立和民主结构的必要要素,作为特殊制度下的专制政权,使其能够实现巴西数据保护法(LGPD)授予的技术和决策自主权。根据文献研究和对类似外国当局的调查结果,有可能指出,作为这一分析的部分结果,将这样的使命委托给其最近与直接行政部门正式分离的不足,也有可能得出结论,国家现代化在数字时代的成功将在很大程度上取决于能够引导ANPD走向一个关注技术创新的结构的跨期选择。为此目的,该机构工作人员的培训和继续教育,以及该实体可能签署的协议,例如审计法院在信息和通信技术领域寻求的替代办法,成为决定因素。
{"title":"Alternatives for an adequate structuring of the national data protection authority (ANPD) in its independent profile: proposals to overcome the technological challenges in the age of digital governance.","authors":"Gabrielle Bezerra Sales Sarlet,&nbsp;Daniel Piñeiro Rodriguez","doi":"10.1365/s43439-023-00081-2","DOIUrl":"https://doi.org/10.1365/s43439-023-00081-2","url":null,"abstract":"<p><p>This article aims to identify the necessary elements for the independent and democratic structuring of the National Data Protection Authority (ANPD) in its definitive legal profile, as an autarchy under a special regime, so that it can achieve the technical and decision-making autonomy that it was granted by the Brazilian Data Protection Law (LGPD). Drawing on documentary research and findings on similar foreign authorities, it is possible to point out, as a partial result of this analysis, the insufficiency of entrusting such a mission to its recent formal separation from the Direct Administration, being also possible to conclude that the success of the state modernization in the Digital Age will depend, to a large extent, on intertemporal choices able to direct the ANPD towards a structure attentive to technological innovations. To this end, the training and continuing education of the institution's staff, as well as possible agreements to be signed by the entity, such as the alternatives sought by the Courts of Accounts in the field of information and communications technology (ICT), emerge as a determining factor.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 2","pages":"197-211"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9924887/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9428864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Canada's proposed Critical Cyber Systems Protection Act with cybersecurity legal requirements in the EU. 比较加拿大提出的关键网络系统保护法与欧盟的网络安全法律要求。
Pub Date : 2023-01-01 DOI: 10.1365/s43439-023-00082-1
Matt Malone, Russell Walton

This article examines the Canadian federal government's proposed Critical Cyber Systems Protection Act (CCSPA), compares it with existing and proposed cybersecurity legal requirements in the European Union (EU), and sets out recommendations to address shortcomings of the proposed Canadian legislation. One of the cornerstone components of Bill C‑26, the CCSPA seeks to regulate critical cyber systems in federally regulated private sectors. It represents a significant overhaul of Canadian cybersecurity regulation. However, the current proposed legislation exhibits many flaws, including a commitment to, and entrenchment of, a patchwork approach to regulation that focuses on formal registration; a lack of oversight of its confidentiality provisions; a weak penalty scheme that focuses solely on compliance, not deterrence; and diluted conduct, reporting, and mitigation obligations. To repair these flaws, this article reviews the provisions of the proposed law and compares them with the EU's Directive Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union, the first EU-wide cybersecurity legislation, as well as its proposed successor, the NIS2 Directive. Where relevant, various other cybersecurity regulations in peer states are discussed. Specific recommendations are put forward.

本文考察了加拿大联邦政府拟议的《关键网络系统保护法》(CCSPA),将其与欧盟(EU)现有的和拟议的网络安全法律要求进行了比较,并提出了解决拟议的加拿大立法缺陷的建议。CCSPA是C - 26法案的基石组成部分之一,旨在监管联邦监管的私营部门的关键网络系统。这代表着加拿大网络安全监管的重大改革。然而,目前拟议的立法显示出许多缺陷,包括承诺并巩固以正式注册为重点的拼凑式监管方法;对其保密规定缺乏监督;一个薄弱的惩罚方案,只注重服从,而不是威慑;并淡化了行为、报告和减轻责任的义务。为了弥补这些缺陷,本文回顾了拟议法律的规定,并将其与欧盟第一个欧盟范围的网络安全立法——欧盟网络和信息系统高共同安全水平措施指令及其拟议的继承者——NIS2指令进行了比较。在相关的情况下,讨论了对等国家的各种其他网络安全法规。提出了具体建议。
{"title":"Comparing Canada's proposed <i>Critical Cyber Systems Protection Act</i> with cybersecurity legal requirements in the EU.","authors":"Matt Malone,&nbsp;Russell Walton","doi":"10.1365/s43439-023-00082-1","DOIUrl":"https://doi.org/10.1365/s43439-023-00082-1","url":null,"abstract":"<p><p>This article examines the Canadian federal government's proposed <i>Critical Cyber Systems Protection Act</i> (CCSPA), compares it with existing and proposed cybersecurity legal requirements in the European Union (EU), and sets out recommendations to address shortcomings of the proposed Canadian legislation. One of the cornerstone components of Bill C‑26, the CCSPA seeks to regulate critical cyber systems in federally regulated private sectors. It represents a significant overhaul of Canadian cybersecurity regulation. However, the current proposed legislation exhibits many flaws, including a commitment to, and entrenchment of, a patchwork approach to regulation that focuses on formal registration; a lack of oversight of its confidentiality provisions; a weak penalty scheme that focuses solely on compliance, not deterrence; and diluted conduct, reporting, and mitigation obligations. To repair these flaws, this article reviews the provisions of the proposed law and compares them with the EU's <i>Directive Concerning Measures for a High Common Level of Security of Network and Information Systems Across the Union</i>, the first EU-wide cybersecurity legislation, as well as its proposed successor, the NIS2 Directive. Where relevant, various other cybersecurity regulations in peer states are discussed. Specific recommendations are put forward.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 2","pages":"165-196"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9975875/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9433082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer security incident response teams: are they legally regulated? The Swiss example. 电脑安全事故应变小组:是否受到法律管制?瑞士的例子。
Pub Date : 2023-01-01 DOI: 10.1365/s43439-022-00070-x
Pauline Meyer, Sylvain Métille

Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling capabilities and are increasingly demanded by organizations such as critical infrastructures. They can hold many different skills and are of great interest to organizations in terms of cyber security and, more concretely, cyber incident management. This contribution seeks to analyze the extent to which their activity is regulated under Swiss law, considering that private CSIRTs are not regulated in the same way as governmental and national CSIRTs such as the Computer Emergency Response Team of the Swiss government and official national CERT of Switzerland (GovCERT).

计算机安全事件响应小组(csirt)或计算机应急响应小组(cert)是事件处理能力的一个组成部分,并且越来越多地被关键基础设施等组织所需要。他们可以掌握许多不同的技能,并且在网络安全和更具体地说,网络事件管理方面对组织非常感兴趣。考虑到私人csirt不像政府和国家csirt(如瑞士政府的计算机应急响应小组和瑞士官方国家CERT (GovCERT))那样以同样的方式进行监管,本贡献试图分析他们的活动在瑞士法律下受到监管的程度。
{"title":"Computer security incident response teams: are they legally regulated? The Swiss example.","authors":"Pauline Meyer,&nbsp;Sylvain Métille","doi":"10.1365/s43439-022-00070-x","DOIUrl":"https://doi.org/10.1365/s43439-022-00070-x","url":null,"abstract":"<p><p>Computer Security Incident Response Teams (CSIRTs) or Computer Emergency Response Teams (CERTs) are an integral part of incident handling capabilities and are increasingly demanded by organizations such as critical infrastructures. They can hold many different skills and are of great interest to organizations in terms of cyber security and, more concretely, cyber incident management. This contribution seeks to analyze the extent to which their activity is regulated under Swiss law, considering that private CSIRTs are not regulated in the same way as governmental and national CSIRTs such as the Computer Emergency Response Team of the Swiss government and official national CERT of Switzerland (GovCERT).</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"4 1","pages":"39-60"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9923885/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10795862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung 服务提供医疗办公室、医院和合同起草信息技术服务时的网络安全需求
Pub Date : 2022-12-09 DOI: 10.1365/s43439-022-00075-6
Ole Ziegler
{"title":"Anforderungen an die Cybersicherheit bei der Erbringung von IT-Dienstleistungen für Arztpraxen sowie Krankenhäuser und Möglichkeiten der Vertragsgestaltung","authors":"Ole Ziegler","doi":"10.1365/s43439-022-00075-6","DOIUrl":"https://doi.org/10.1365/s43439-022-00075-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"60 1","pages":"61-77"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90713237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach 当大量拦截通信侵犯隐私权?国家权力的有限性与欧洲人权法院的做法
Pub Date : 2022-12-02 DOI: 10.1365/s43439-022-00074-7
Veljko Turanjanin
{"title":"When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach","authors":"Veljko Turanjanin","doi":"10.1365/s43439-022-00074-7","DOIUrl":"https://doi.org/10.1365/s43439-022-00074-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"52 1","pages":"115-136"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88518048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International cybersecurity law review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1