首页 > 最新文献

International cybersecurity law review最新文献

英文 中文
Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 人工智能的网络安全认证:错失协调《人工智能法案》和《网络安全法》的机会
Pub Date : 2022-06-01 DOI: 10.1365/s43439-021-00043-6
Federica Casarosa
{"title":"Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-021-00043-6","DOIUrl":"https://doi.org/10.1365/s43439-021-00043-6","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"62 ","pages":"115-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72431079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act 更正:人工智能的网络安全认证:错失了协调《人工智能法案》和《网络安全法》的机会
Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00053-y
Federica Casarosa
{"title":"Correction to: Cybersecurity certification of Artificial Intelligence: a missed opportunity to coordinate between the Artificial Intelligence Act and the Cybersecurity Act","authors":"Federica Casarosa","doi":"10.1365/s43439-022-00053-y","DOIUrl":"https://doi.org/10.1365/s43439-022-00053-y","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"71 1","pages":"245"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88612352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
USA: Department of Justice’s new civil cyber-fraud initiative and its implications 美国:司法部新的民事网络欺诈倡议及其影响
Pub Date : 2022-06-01 DOI: 10.1365/s43439-022-00050-1
A. Spies
{"title":"USA: Department of Justice’s new civil cyber-fraud initiative and its implications","authors":"A. Spies","doi":"10.1365/s43439-022-00050-1","DOIUrl":"https://doi.org/10.1365/s43439-022-00050-1","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"5 1","pages":"139-145"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72501981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity regulation in Brazil and Latin America: an overview 巴西和拉丁美洲的网络安全监管:概述
Pub Date : 2022-05-24 DOI: 10.1365/s43439-022-00055-w
R. Carapeto, Ana Luíza Calil
{"title":"Cybersecurity regulation in Brazil and Latin America: an overview","authors":"R. Carapeto, Ana Luíza Calil","doi":"10.1365/s43439-022-00055-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00055-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"35 1","pages":"385-410"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82018009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm” 人工智能对法律的挑战:以“医生算法”为例
Pub Date : 2022-03-11 DOI: 10.1365/s43439-022-00047-w
Benedikt Buchner
{"title":"Artificial intelligence as a challenge for the law: the example of “Doctor Algorithm”","authors":"Benedikt Buchner","doi":"10.1365/s43439-022-00047-w","DOIUrl":"https://doi.org/10.1365/s43439-022-00047-w","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"20 1","pages":"181 - 190"},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74341482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Cybersecurity in hospitals-Part 1: IT compliance as a management task]. [医院的网络安全第1部分:作为管理任务的信息技术合规性]。
Pub Date : 2022-01-01 Epub Date: 2022-04-13 DOI: 10.1365/s43439-022-00049-8
Diana Nadeborn, Tilmann Dittrich

The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.

网络攻击的威胁在所有行业都是一个紧迫的问题。就医院而言,网络事件不仅会导致患者数据丢失,还会危及患者的生命。因此,根据大量法律,医院有义务保持足够的保护措施。监督遵守这些规定的情况是医院管理人员的责任。这是一项重要的法规遵从性任务。网络保险可能是解决方案的一部分。在发生勒索软件攻击时支付赎金时需要特别小心。
{"title":"[Cybersecurity in hospitals-Part 1: IT compliance as a management task].","authors":"Diana Nadeborn,&nbsp;Tilmann Dittrich","doi":"10.1365/s43439-022-00049-8","DOIUrl":"10.1365/s43439-022-00049-8","url":null,"abstract":"<p><p>The threat of cyber attacks is a burning issue in all industries. In the case of hospitals, a cyber incident can not only lead to the loss of patient data but can also put patients' lives in danger. Hospitals are therefore obliged by a large number of laws to maintain sufficient protective measures. Monitoring compliance with these regulations is the responsibility of hospital managers. This is an important compliance task. Cyber insurance can be part of the solution. Particular caution is required when paying ransoms in the event of ransomware attacks.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"147-161"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9005917/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9913128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Potential security and privacy issues in zero UI touchless technology. 零用户界面无接触技术中潜在的安全和隐私问题。
Pub Date : 2022-01-01 Epub Date: 2022-04-19 DOI: 10.1365/s43439-022-00052-z
Muhammad Zahid Iqbal, Abraham G Campbell

Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.

通常被称为零用户界面(UI)的无接触技术已经开始渗透到我们生活的方方面面,因为公共场所的卫生措施需要使用它。无接触技术取代触摸屏交互的发展最初是一个奢侈的概念,目的是让数字交互看起来更花哨,但现在它作为一种面向健康的交互方法已经获得了真正的价值。切换到无接触界面可以减少常见的接触点,这有助于防止病原体的传播。尽管无接触技术的发展并不新鲜,但在新冠肺炎大流行期间,由于其固有的卫生性质,其使用量大幅增加。然而,这项对新型数字交互形式的投资有几个隐私和安全问题需要关注,以便实现安全的人机交互,以应对安全漏洞和网络攻击,保护我们的凭据。本文概述了在各种技术中采用零用户界面的潜在安全和隐私问题,如果希望采用负责任的技术实践,则需要考虑这些问题。
{"title":"Potential security and privacy issues in zero UI touchless technology.","authors":"Muhammad Zahid Iqbal, Abraham G Campbell","doi":"10.1365/s43439-022-00052-z","DOIUrl":"10.1365/s43439-022-00052-z","url":null,"abstract":"<p><p>Touchless technology often called Zero User Interface (UI) has begun to permeate every aspect of our lives as its use became necessary for hygiene measures in public places. The evolution of touchless technology replacing touchscreen interaction started as a luxury concept to give a fancier look to digital interactions, but now it has gained real value as a health-oriented interaction method. Switching to a touchless interface reduces common touchpoints, which help to safeguard against the spread of pathogens. Although the evolution of touchless technology is not new, its use massively increased due to its inherent hygienic nature during the COVID-19 pandemic. However, this investment in a new form of digital interaction has several privacy and security issues that need attention, in order to allow for safe human-machine interaction to cope with security breaches and cyber-attacks to protect our credentials. This paper outlines the potential security and privacy issues concerning Zero UI adoption in various technologies that need to be considered if one wishes to adopt responsible technology practices with this technology.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"131-137"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9017080/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial. 社论
Pub Date : 2022-01-01 Epub Date: 2022-10-10 DOI: 10.1365/s43439-022-00066-7
Carsten Dochow
{"title":"Editorial.","authors":"Carsten Dochow","doi":"10.1365/s43439-022-00066-7","DOIUrl":"10.1365/s43439-022-00066-7","url":null,"abstract":"","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"247-254"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9549817/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange. 了解西班牙网络安全治理的多元格局:资本交换问题。
Pub Date : 2022-01-01 Epub Date: 2022-11-09 DOI: 10.1365/s43439-022-00069-4
Cristina Del-Real, Antonio M Díaz-Fernández

This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.

本文实证研究了公共和私人行为者对西班牙网络安全提供的贡献和合作网络。这篇文章引用了三个来源的数据:政策和法律文件、德尔福对网络安全专家的研究以及34次采访。本文植根于节点治理和锚定多元主义的理论基础,认为可以通过对资本交换的分析来理解网络安全治理中参与者的地位和公私合作动态。因此,该研究提供了西班牙网络安全最相关节点的列表,评估了它们拥有的资本以及如何通过合作网络进行交换,并探讨了这些合作关系的特点和障碍。分析表明,尽管大型科技公司拥有更大的经济和文化资本,但公共组织在网络安全治理中仍占据着卓越地位。值得注意的是,该论文确定了新公共机构在网络安全节点网络中的中心地位。此外,还发现了阻碍西班牙公私合作的文化障碍。这些结果表明,尽管国家在为网络安全挑战提供公共解决方案方面存在困难,但西班牙是一个通过象征性和社会资本将治理锚定在公共机构中的例子。
{"title":"Understanding the plural landscape of cybersecurity governance in Spain: a matter of capital exchange.","authors":"Cristina Del-Real,&nbsp;Antonio M Díaz-Fernández","doi":"10.1365/s43439-022-00069-4","DOIUrl":"10.1365/s43439-022-00069-4","url":null,"abstract":"<p><p>This paper empirically explores the contribution and collaborative networks of public and private actors to cybersecurity provision in Spain. The article draws on data from three sources: policy and legal documents, a Delphi study with cybersecurity experts, and 34 interviews. Rooted in the theoretical underpinnings of nodal governance and anchored pluralism, the paper argues that the position of actors and public-private collaboration dynamics involved in cybersecurity governance can be understood through the analysis of capital exchange. Therefore, the study provides a list of the most relevant nodes for cybersecurity in Spain, assesses the capital they possess and how they exchange it through collaborative networks and explores the characteristics and barriers of these collaborative relationships. Analyses reveal that public organisations hold a preeminent position in cybersecurity governance despite large technology corporations' greater economic and cultural capital. Remarkably, the paper identifies the central position of new public bodies in the network of cybersecurity nodes. Moreover, cultural barriers that are hindering public-private collaboration in Spain are identified. These results indicate that, despite the state's difficulties in providing public solutions to cybersecurity challenges, Spain is an example of how governance can be anchored in public bodies through symbolic and social capital.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 2","pages":"313-343"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9645327/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10294640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. 确保网络安全的网络治理研究:网络安全治理概述。
Pub Date : 2022-01-01 Epub Date: 2022-01-11 DOI: 10.1365/s43439-021-00045-4
Serkan Savaş, Süleyman Karataş

With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.

随着网络环境中数字数据的指数级增长,安全措施变得越来越重要。网络安全威胁由国家和国际单位揭示,这些威胁的数量每天都在增加。通过有效的网络安全战略,消除网络安全风险是可能的。由于管理的概念还不够,通过网络治理可以实施这一战略,网络治理包括管理过程中的所有利益相关者。本研究强调了网络治理在确保网络安全方面的重要性和必要性。对网络安全治理的研究和结果进行了审查。为此采用了描述性研究模型。在研究哲学方面,在应用方法方面创建了基础研究模式和文献研究模式。研究的范围包括从科学网、EBSCO、Scopus、谷歌学者和TR指数获得的研究。下载了过去5年的研究,并确定了关键词。结果表明,尽管有研究为不同国家的网络安全治理提供了本地解决方案,但总体治理框架尚未建立。相反,为了保留这一地区的管理权,而不是其治理权,存在着一场潜在的斗争。
{"title":"Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.","authors":"Serkan Savaş,&nbsp;Süleyman Karataş","doi":"10.1365/s43439-021-00045-4","DOIUrl":"10.1365/s43439-021-00045-4","url":null,"abstract":"<p><p>With the exponential increase of digital data in cyber environments, security measures have gained more importance. Cybersecurity threats are revealed by national and international units, and the number of these threats is increasing daily. The elimination of cybersecurity risks is possible with an effective cybersecurity strategy. Since the concept of management is not sufficient, the implementation of this strategy is possible with cyber governance, which includes all stakeholders in the management processes. This study emphasizes the importance and necessity of cyber governance in ensuring cybersecurity. The research and results for cybersecurity governance have been examined. A descriptive research model was used to this end. In terms of research philosophy, a basic research model and a documentary research model have been created with regard to the application method. The universe of the research consists of studies obtained from Web of Science, EBSCO, Scopus, Google Scholar, and TR Index. Studies from the last 5 years have been downloaded with the determined keywords. The result showed that although there are studies that produce local solutions for cybersecurity governance in different countries, a general governance framework has not been established as yet. On the contrary, there is a latent struggle to retain the management of this area, not its governance.</p>","PeriodicalId":73412,"journal":{"name":"International cybersecurity law review","volume":"3 1","pages":"7-34"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8750646/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9898016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International cybersecurity law review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1