default search action
Bill Hancock
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2002
- [j186]Bill Hancock:
Security crisis management the basics. Comput. Secur. 21(5): 397-401 (2002) - 2001
- [j185]Bill Hancock:
Y2K & Security A Low Priority Year. Comput. Secur. 20(1): 4-5 (2001) - [j184]Bill Hancock:
Voodoo is Alive and Well on Your Computer. Comput. Secur. 20(1): 5-6 (2001) - [j183]Bill Hancock:
Hand-held Virii On The Way. Comput. Secur. 20(1): 6-7 (2001) - [j182]Bill Hancock:
China Passes Law to Promote Internet Security Supposedly. Comput. Secur. 20(1): 7 (2001) - [j181]Bill Hancock:
Smarter Marines. Comput. Secur. 20(1): 7 (2001) - [j180]Bill Hancock:
E-tailers Batten Down the Hatches. Comput. Secur. 20(1): 8 (2001) - [j179]Bill Hancock:
Information Warfare Highlighted as a Concern by US Government. Comput. Secur. 20(1): 8-9 (2001) - [j178]Bill Hancock:
E-mail Spammers Jailed. Comput. Secur. 20(1): 9-10 (2001) - [j177]Bill Hancock:
The Chief Security Officer's Top Ten List for 2001. Comput. Secur. 20(1): 10-14 (2001) - [j176]Bill Hancock:
'Safe Harbor' Provision Adopters Few and Far Between. Comput. Secur. 20(1): 14-15 (2001) - [j175]Bill Hancock:
The Wireless Great Divide But Getting Smaller. Comput. Secur. 20(1): 15-17 (2001) - [j174]Bill Hancock:
It's a Privacy Thing in 2001. Comput. Secur. 20(1): 17-18 (2001) - [j173]Bill Hancock:
Fighting SPAM in Europe. Comput. Secur. 20(1): 18-19 (2001) - [j172]Bill Hancock:
Privacy Advocates Grow in Europe. Comput. Secur. 20(1): 19-20 (2001) - [j171]Bill Hancock:
A Practical Risk. Comput. Secur. 20(2): 98-126 (2001) - [j170]Bill Hancock:
Security Views. Comput. Secur. 20(3): 188-201 (2001) - [j169]Bill Hancock:
Security Views. Comput. Secur. 20(4): 278-294 (2001) - [j168]Bill Hancock:
Security Views. Comput. Secur. 20(5): 348-363 (2001) - [j167]Bill Hancock:
U.S. DoD Puts Up Blocks to Code Red. Comput. Secur. 20(6): 451-467 (2001) - [j166]Bill Hancock:
Security View. Comput. Secur. 20(7): 546-560 (2001) - [j165]Bill Hancock:
Security Views. Comput. Secur. 20(8): 643-656 (2001) - 2000
- [j164]Bill Hancock:
Mass Network Flooding Attacks (Distributed Denial of Service - DDoS) Surface in the Wild. Comput. Secur. 19(1): 6-7 (2000) - [j163]Bill Hancock:
Cell Phone Crypto Cracked. Comput. Secur. 19(1): 7-8 (2000) - [j162]Bill Hancock:
Clinton's Proposed Crypto Regulations Under Attack. Comput. Secur. 19(1): 8-9 (2000) - [j161]Bill Hancock:
Overhauling the National Security Agency? Comput. Secur. 19(1): 9-10 (2000) - [j160]Bill Hancock:
Down Under, Hacking Private Computers by the Government is Legal. Comput. Secur. 19(1): 10-12 (2000) - [j159]Bill Hancock:
The "S" in SAP Doesn't Stand for Security. Comput. Secur. 19(1): 12-13 (2000) - [j158]Bill Hancock:
New York Times Fires Employees for Violating Internal E-mail Policies. Comput. Secur. 19(1): 12 (2000) - [j157]Bill Hancock:
'Anonymizing' Software Causes Law Enforcement Concerns. Comput. Secur. 19(1): 13-14 (2000) - [j156]Bill Hancock:
Melissa Virus Creator Pleads Guilty. Comput. Secur. 19(1): 13 (2000) - [j155]Bill Hancock:
Security Problems Go Mobile In Your Next Car. Comput. Secur. 19(1): 14-16 (2000) - [j154]Bill Hancock:
The L0pht Goes Corporate and becomes @Stake. Comput. Secur. 19(1): 16-17 (2000) - [j153]Bill Hancock:
Alliance Formed to Fight Internet Attacks. Comput. Secur. 19(2): 108-109 (2000) - [j152]Bill Hancock:
Security Views. Comput. Secur. 19(2): 108 (2000) - [j151]Bill Hancock:
Code Paranoia about FBI Offerings to Detect DoS Infiltration. Comput. Secur. 19(2): 109-110 (2000) - [j150]Bill Hancock:
CIA says Russia and China are Building CyberSpy Organization. Comput. Secur. 19(2): 110-111 (2000) - [j149]Bill Hancock:
The SEC Hires CyberInvestigators to Search for Fraud. Comput. Secur. 19(2): 111 (2000) - [j148]Bill Hancock:
FBI Investigating Copycat Operations in Wake of February, 2000, DDoS Attacks. Comput. Secur. 19(2): 111-113 (2000) - [j147]Bill Hancock:
Industry Teaming on ISACs. Comput. Secur. 19(2): 113 (2000) - [j146]Bill Hancock:
In Wake of Attacks, FBI Using Racketeering Laws for Prosecution. Comput. Secur. 19(2): 113-114 (2000) - [j145]Bill Hancock:
Mafiaboy Hacker Eyed In Attacks. Comput. Secur. 19(2): 114-115 (2000) - [j144]Bill Hancock:
Japan Web Hackers Use Chinese and US Servers. Comput. Secur. 19(2): 115 (2000) - [j143]Bill Hancock:
US Pentagon Defense Messaging System Shows Deficiencies in Security. Comput. Secur. 19(2): 116-117 (2000) - [j142]Bill Hancock:
Y2Hack Get-Together in Israel Under Political Attack. Comput. Secur. 19(2): 116 (2000) - [j141]Bill Hancock:
Security Managers Cite Need for Real-Time Security. Comput. Secur. 19(2): 117 (2000) - [j140]Bill Hancock:
Security Views. Comput. Secur. 19(3): 202-203 (2000) - [j139]Bill Hancock:
Network Warfare On The Rise. Comput. Secur. 19(3): 203-204 (2000) - [j138]Bill Hancock:
FBI Source Convicted of Hackin. Comput. Secur. 19(3): 204-205 (2000) - [j137]Bill Hancock:
Microsoft "Whistler" Release Posted to Internet. Comput. Secur. 19(3): 205-206 (2000) - [j136]Bill Hancock:
US Senate Passes Bill to Tighten Up Government Network. Comput. Secur. 19(3): 206-207 (2000) - [j135]Bill Hancock:
Cyberpatrol Reverse Engineering: Round 2. Comput. Secur. 19(3): 207 (2000) - [j134]Bill Hancock:
First Cybercrime Task Force City - Pittsburgh. Comput. Secur. 19(3): 208 (2000) - [j133]Bill Hancock:
US Army Warns of Cyberattackers Gaining Access to Military Weapons Systems. Comput. Secur. 19(3): 208 (2000) - [j132]Bill Hancock:
More on the January, 2000, NSA Computer Problems. Comput. Secur. 19(3): 209-211 (2000) - [j131]Bill Hancock:
Mexico's President Under Cyberattack - Again. Comput. Secur. 19(3): 211 (2000) - [j130]Bill Hancock:
Another Insider Job on Wall Stree. Comput. Secur. 19(3): 211-212 (2000) - [j129]Bill Hancock:
FBI Identifies Hacker Who Stole More than 485 000 Credit Card Numbers. Comput. Secur. 19(3): 212 (2000) - [j128]Bill Hancock:
USDOJ Goes Prime Time With Cybercrime Web Sit. Comput. Secur. 19(3): 212-213 (2000) - [j127]Bill Hancock:
EU and US Reach Agreement on Privacy Issues. Comput. Secur. 19(3): 213-214 (2000) - [j126]Bill Hancock:
Warning from the US Government: Companies Get Secure or... Comput. Secur. 19(3): 214-215 (2000) - [j125]Bill Hancock:
China Relaxes Encryption Rules. Comput. Secur. 19(3): 215 (2000) - [j124]Bill Hancock:
French Card Forgery Note Could Work. Comput. Secur. 19(3): 216 (2000) - [j123]Bill Hancock:
US Law Enforcement Needs You! Comput. Secur. 19(3): 216-217 (2000) - [j122]Bill Hancock:
UK Law Enforcement Bemoans Criminal Activities on Interne. Comput. Secur. 19(3): 217-218 (2000) - [j121]Bill Hancock:
Intel Creates New Plans for Notebook Security. Comput. Secur. 19(3): 218 (2000) - [j120]Bill Hancock:
Kevin Mitnick Gets His Day in Congres. Comput. Secur. 19(3): 218-219 (2000) - [j119]Bill Hancock:
Web Site Owners Seek Security People Apply Now! Comput. Secur. 19(3): 219-220 (2000) - [j118]Bill Hancock:
Generation X Hackers? Comput. Secur. 19(3): 220-221 (2000) - [j117]Bill Hancock:
Suspected Hackers Arrested in Russian Credit-Card Fraud. Comput. Secur. 19(4): 296 (2000) - [j116]Bill Hancock:
Intel Eliminates ID from New Chips. Comput. Secur. 19(4): 296-297 (2000) - [j115]Bill Hancock:
European Parliament Doesn't Like Anonymity Online. Comput. Secur. 19(4): 297 (2000) - [j114]Bill Hancock:
DOD Finds Plans Online Reserve Unit Assesses Risk. Comput. Secur. 19(4): 297-298 (2000) - [j113]Bill Hancock:
Agencies Are "Own Worst Enemy". Comput. Secur. 19(4): 298 (2000) - [j112]Bill Hancock:
US Department of Energy Security Criticized - Again. Comput. Secur. 19(4): 298-300 (2000) - [j111]Bill Hancock:
This is What Happens When You Lose Your Computer With Classified Data On It.... Comput. Secur. 19(4): 300-301 (2000) - [j110]Bill Hancock:
Not Everyone Wants PKI NSF Opts for Digital Signature Alternativ. Comput. Secur. 19(4): 301-302 (2000) - [j109]Bill Hancock:
Justice Department Conducting Criminal Probe in Former CIA Director Activities. Comput. Secur. 19(4): 302-303 (2000) - [j108]Bill Hancock:
Apache Site Defaced. Comput. Secur. 19(4): 303-305 (2000) - [j107]Bill Hancock:
US and Europe Cybercrime Agreement Problems. Comput. Secur. 19(4): 306-307 (2000) - [j106]Bill Hancock:
Cyberstalking on the Rise. Comput. Secur. 19(4): 307-308 (2000) - [j105]Bill Hancock:
Large Child Pornography Ring Busted in Texas. Comput. Secur. 19(4): 308-309 (2000) - [j104]Bill Hancock:
New Denial of Service Attack on Internet. Comput. Secur. 19(4): 309-310 (2000) - [j103]Bill Hancock:
US Supreme Court Confirms ISPs Not Liable in E-mail Messages. Comput. Secur. 19(4): 310 (2000) - [j102]Bill Hancock:
Software Scam - 17 Indicted. Comput. Secur. 19(4): 310-311 (2000) - [j101]Bill Hancock:
Security Views. Comput. Secur. 19(5): 382-383 (2000) - [j100]Bill Hancock:
"I Agree" Legal Agreements Get Legislated. Comput. Secur. 19(5): 383-384 (2000) - [j99]Bill Hancock:
The US Government Tells Its Users to Clean Up Their E-mail. Comput. Secur. 19(5): 385-387 (2000) - [j98]Bill Hancock:
Home PC's Targeted by Hackers (Duh!). Comput. Secur. 19(5): 387-388 (2000) - [j97]Bill Hancock:
CIO's Get Serious About Best Security Practices. Comput. Secur. 19(5): 388 (2000) - [j96]Bill Hancock:
Yahoo Faces Identity Crisis. Comput. Secur. 19(5): 389 (2000) - [j95]Bill Hancock:
Microsoft a Popular Virus Target Due to Ubiquity. Comput. Secur. 19(5): 389-391 (2000) - [j94]Bill Hancock:
UK's RIP Bill Creates Official Snooping. Comput. Secur. 19(5): 391-392 (2000) - [j93]Bill Hancock:
Extortion Going Online. Comput. Secur. 19(5): 392-393 (2000) - [j92]Bill Hancock:
Office 2000 Patch Recommended by CERT. Comput. Secur. 19(5): 393 (2000) - [j91]Bill Hancock:
Self-Regulation for Privacy Doesn't Work Says FTC. Comput. Secur. 19(5): 393-394 (2000) - [j90]Bill Hancock:
...But the Industry Wants Self-Regulation. Comput. Secur. 19(5): 394-395 (2000) - [j89]Bill Hancock:
US Senate Wakes Up to Need for Cybertools for Law Enforcers. Comput. Secur. 19(5): 395-396 (2000) - [j88]Bill Hancock:
PGP V5.0 Keys Potentially Insecure. Comput. Secur. 19(5): 396-397 (2000) - [j87]Bill Hancock:
Canadian Credit Card Conundrum Caused by a Cracker. Comput. Secur. 19(5): 397-398 (2000) - [j86]Bill Hancock:
Suspect Charged in 'Love Bug' Worm has Charges Dropped. Comput. Secur. 19(5): 398 (2000) - [j85]Bill Hancock:
Network Solutions Re-evaluates Security. Comput. Secur. 19(5): 398-400 (2000) - [j84]Bill Hancock:
CMU Sets Up a Sister to CERT. Comput. Secur. 19(5): 400-401 (2000) - [j83]Bill Hancock:
Speedy Response Yields Success at DOE. Comput. Secur. 19(5): 401 (2000) - [j82]Bill Hancock:
AOL Gets Busted - Again. Comput. Secur. 19(5): 402 (2000) - [j81]Bill Hancock:
Who's to Blame? Comput. Secur. 19(5): 402-403 (2000) - [j80]Bill Hancock:
Wireless Ubiquity for E-Biz. Comput. Secur. 19(5): 403 (2000) - [j79]Bill Hancock:
And Now, the Bug-in-Your-Site Award Goes To.... Comput. Secur. 19(5): 404 (2000) - [j78]Bill Hancock:
Isn't It Interesting What You Can Buy At An Auction Site? TV's, Computers, Drugs. Comput. Secur. 19(5): 404-405 (2000) - [j77]Bill Hancock:
G8 Thinks About Cybercrime (It's About Time, Too). Comput. Secur. 19(5): 405-407 (2000) - [j76]Bill Hancock:
A Need for a Network Security Czar. Comput. Secur. 19(6): 476-477 (2000) - [j75]Bill Hancock:
US Government Fighting for Expanded Wiretap Laws. Comput. Secur. 19(6): 477 (2000) - [j74]Bill Hancock:
E-Commerce Paranoia: Flaws in Code. Comput. Secur. 19(6): 477-479 (2000) - [j73]Bill Hancock:
Truly Certified: Security Certifications Updat. Comput. Secur. 19(6): 479-480 (2000) - [j72]Bill Hancock:
Digital Certificates Get Creative. Comput. Secur. 19(6): 480-487 (2000) - [j71]Bill Hancock:
Health Care Security: A Hard Look at a Growing Problem. Comput. Secur. 19(6): 482 (2000) - [j70]Bill Hancock:
Safeway UK's Website Shut Down. Comput. Secur. 19(6): 483 (2000) - [j69]Bill Hancock:
Philippine Government Creates Incident Response Team. Comput. Secur. 19(6): 483 (2000) - [j68]Bill Hancock:
DDoS Defence Gets Regulatory. Comput. Secur. 19(6): 483-485 (2000) - [j67]Bill Hancock:
Visa's Ten Commandments for E-Security Online. Comput. Secur. 19(6): 485-486 (2000) - [j66]Bill Hancock:
'Porngate'? Comput. Secur. 19(6): 486-487 (2000) - [j65]Bill Hancock:
What You Sell Online in France Could Be Restricted.... Comput. Secur. 19(6): 487 (2000) - [j64]Bill Hancock:
Hackers Still Love to Attack the Pentago. Comput. Secur. 19(6): 488 (2000) - [j63]Bill Hancock:
Spying At Home: A New Pastime to Detect Online Romanc. Comput. Secur. 19(6): 488-491 (2000) - [j62]Bill Hancock:
Is a Convicted Hacker Really Reformed and Should You Hire Them? Comput. Secur. 19(6): 491-493 (2000) - [j61]Bill Hancock:
DefCon Recruiting JamFest. Comput. Secur. 19(6): 493-494 (2000) - [j60]Bill Hancock:
Hacker Target: Mobile Phones. Comput. Secur. 19(6): 494-495 (2000) - [j59]Bill Hancock:
E-Mail Privacy Issues Escalate. Comput. Secur. 19(6): 495 (2000) - [j58]Bill Hancock:
GeoCities Ordered to Report on Information Poste. Comput. Secur. 19(6): 495-496 (2000) - [j57]Bill Hancock:
Hackers Breach Firewall. Comput. Secur. 19(6): 496-497 (2000) - [j56]Bill Hancock:
Lotus Domino Holes Up. Comput. Secur. 19(6): 497-498 (2000) - [j55]Bill Hancock:
New Classes of Unix/Linux Attacks. Comput. Secur. 19(7): 570-571 (2000) - [j54]Bill Hancock:
American Express Creates Disposable Credit Card Number. Comput. Secur. 19(7): 571-572 (2000) - [j53]Bill Hancock:
Microsoft Releases New IIS Security Tool. Comput. Secur. 19(7): 572 (2000) - [j52]Bill Hancock:
Baltimore Releases Security Developer Freeware. Comput. Secur. 19(7): 572-573 (2000) - [j51]Bill Hancock:
'Files Streams' Virus Infects in an Old and New Way. Comput. Secur. 19(7): 573-574 (2000) - [j50]Bill Hancock:
Trinity v3, a DDoS Tool, Hits the Streets. Comput. Secur. 19(7): 574 (2000) - [j49]Bill Hancock:
Hacker Insurance Now Part of the Business Risk Management Kit. Comput. Secur. 19(7): 574-575 (2000) - [j48]Bill Hancock:
Wireless Crazed? No Security For You! Comput. Secur. 19(7): 575-577 (2000) - [j47]Bill Hancock:
White House Supporting Open Source Code. Comput. Secur. 19(7): 577-578 (2000) - [j46]Bill Hancock:
White House Security Summit Builds Towards a B2B Security Standard. Comput. Secur. 19(7): 578-579 (2000) - [j45]Bill Hancock:
Cellular Security Hazards. Comput. Secur. 19(7): 579 (2000) - [j44]Bill Hancock:
UK Fuel Taxes Protestor Accused of Mass Hacking. Comput. Secur. 19(7): 580 (2000) - [j43]Bill Hancock:
US Government Board Setting Up Security Metrics. Comput. Secur. 19(7): 580 (2000) - [j42]Bill Hancock:
Privacy Group Wants 'Web Bugs' Disclosures. Comput. Secur. 19(7): 581 (2000) - [j41]Bill Hancock:
Site Spoofing Becomes More Popular. Comput. Secur. 19(7): 581-583 (2000) - [j40]Bill Hancock:
First PDA Virus Hits the Airwaves. Comput. Secur. 19(7): 583-584 (2000) - [j39]Bill Hancock:
From Stones in the Street to Cyberspace - Israeli and Palestinians Continue Their Virtual Battles 24 x 7. Comput. Secur. 19(8): 664-665 (2000) - [j38]Bill Hancock:
Feeling Sorry for Microsoft? Comput. Secur. 19(8): 665-666 (2000) - [j37]Bill Hancock:
However, Microsoft Could Use Some Sympathy - Dutch Hacker Busts Microsoft Web Site - Again. Comput. Secur. 19(8): 666-667 (2000) - [j36]Bill Hancock:
Wireless Big Brother. Comput. Secur. 19(8): 667-668 (2000) - [j35]Bill Hancock:
NASA Hacker Pleads Guilty. Comput. Secur. 19(8): 668-669 (2000) - [j34]Bill Hancock:
Canadian Teen Mafiaboy Pleads Guilty. Comput. Secur. 19(8): 669 (2000) - [j33]Bill Hancock:
Getting the Laws to Help Combat Cybercrime (There's a grand idea). Comput. Secur. 19(8): 669-670 (2000) - [j32]Bill Hancock:
Internet Biz Group Calls for Cybercrime Treaty Delay. Comput. Secur. 19(8): 671 (2000) - [j31]Bill Hancock:
Laptop Theft Now Targeted Towards Data and Not Necessarily Hardware. Comput. Secur. 19(8): 671-673 (2000) - [j30]Bill Hancock:
Hacktivism Increasing. Comput. Secur. 19(8): 673-674 (2000) - [j29]Bill Hancock:
US Department of Defense Prepares Cybercrime Database. Comput. Secur. 19(8): 674 (2000) - [j28]Bill Hancock:
CIA Chat Room Causes Grief. Comput. Secur. 19(8): 674-676 (2000) - [j27]Bill Hancock:
Japan Creates Cyberconditions for IT National Revolution. Comput. Secur. 19(8): 676-677 (2000) - [j26]Bill Hancock:
US Privacy Law Proposals Cause Concerns. Comput. Secur. 19(8): 677-678 (2000) - 1999
- [j25]Bill Hancock:
From the editor. Comput. Secur. 18(1): 2-3 (1999) - [j24]Bill Hancock:
Elliptical curve cryptography and standards for efficient cryptography group. Comput. Secur. 18(1): 4-15 (1999) - [j23]Bill Hancock:
From the editor. Comput. Secur. 18(2): 88-89 (1999) - [j22]Bill Hancock:
From the editor. Comput. Secur. 18(3): 182-183 (1999) - [j21]Bill Hancock:
From the editor. Comput. Secur. 18(4): 276-277 (1999) - [j20]Bill Hancock:
From the editor. Comput. Secur. 18(5): 370-371 (1999) - [j19]Bill Hancock:
From the editor. Comput. Secur. 18(6): 456-457 (1999) - [j18]Bill Hancock:
From the editor. Comput. Secur. 18(7): 550-552 (1999) - [j17]Bill Hancock:
Security views. Comput. Secur. 18(7): 553-564 (1999) - 1998
- [j16]Bill Hancock:
From the editor. Comput. Secur. 17(1): 2-4 (1998) - [j15]Bill Hancock:
Security goes prime-time. Comput. Secur. 17(1): 5-13 (1998) - [j14]Bill Hancock:
From the Editor. Comput. Secur. 17(2): 96-97 (1998) - [j13]Bill Hancock:
Who do you call for, CISSP. Comput. Secur. 17(2): 99-109 (1998) - [j12]Bill Hancock:
From the editor. Comput. Secur. 17(3): 190-191 (1998) - [j11]Bill Hancock:
Security Views. Comput. Secur. 17(3): 192-200 (1998) - [j10]Bill Hancock:
From the editor. Comput. Secur. 17(4): 278-279 (1998) - [j9]Bill Hancock:
Security views. Comput. Secur. 17(4): 280-292 (1998) - [j8]Bill Hancock:
From the editor. Comput. Secur. 17(5): 368-369 (1998) - [j7]Bill Hancock:
From the editor. Comput. Secur. 17(6): 460-461 (1998) - [j6]Bill Hancock:
Security tradeshows - Good or bad? Comput. Secur. 17(6): 462-474 (1998) - [j5]Bill Hancock:
From the editor. Comput. Secur. 17(7): 562-563 (1998) - [j4]Bill Hancock:
Windows-98, RIP and my Adrenaline Rush. Comput. Secur. 17(7): 564-574 (1998) - [j3]Bill Hancock:
From the editor. Comput. Secur. 17(8): 652-653 (1998) - [j2]Bill Hancock:
Security views. Comput. Secur. 17(8): 654-666 (1998) - 1997
- [j1]Bill Hancock:
Stop that e-mail! you are probably breaking the law! Inf. Secur. Tech. Rep. 2(1): 8-9 (1997)
Informal and Other Publications
- 1995
- [i1]Bill Hancock:
The 12-Days of Technology Before Christmas. RFC 1882: 1-5 (1995)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint