Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 167 matches
- 2023
- Massimo Marelli:
The law and practice of international organizations' interactions with personal data protection domestic regulation: At the crossroads between the international and domestic legal orders. Comput. Law Secur. Rev. 50: 105849 (2023) - Shuxia Peng, Bo Li, Shuang Wu:
Presence of piracy and legal protection: Decisions in the digital goods market under different contracts. Eur. J. Oper. Res. 309(2): 578-596 (2023) - Alaeldin Alkhasawneh, Fawaz A. Khasawneh:
Legal issues of consumer privacy protection in the cloud computing environment: analytic study in GDPR, and USA legislations. Int. J. Cloud Comput. 12(1): 40-62 (2023) - Amy M. Pienta, Joy Jang, Margaret Levenstein:
Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection. J. Priv. Confidentiality 13(2) (2023) - YunZhe Wang, FengLan Su:
Risk assessment for commercial crime and legal protection based on modularity-optimized LM and SCA-optimized CNN. PeerJ Comput. Sci. 9: e1683 (2023) - Huiqing Wen:
The Impact of HCI on the Protection of the Rights and Interests of Minors in China and Legal Responses. HCI (12) 2023: 297-305 - Foteini Bageri:
Legal Protection Issues for Sustainable Waterfront Development: The Athenian Riviera, Greece. ICCSA (Workshops 2) 2023: 269-287 - Fang Yuan, Lei Wang:
Research on Text Mechanism of the Legal Protection of Personal Information Based on Big Data. ICISE 2023: 163-166 - Youssef Al Mouatamid, Jihad Zahir, Marie Bonnin, Hajar Mousannif:
Assessing Ocean's Legal Protection Using AI: A New Dataset and a BERT-Based Classifier. JURIX 2023: 263-268 - 2022
- Nino Tskhovrebashvili:
La protection automatisée des données à caractère personnel et la vérification automatisée d'actes juridiques. (Protection of personal data And the automated verification of legal acts). Pantheon-Sorbonne University, Paris, France, 2022 - Francesca Mazzi, Abid Adonis, Josh Cowls, Andreas Tsamados, Mariarosaria Taddeo, Luciano Floridi:
The UK reform of data protection: key changes and their ethical, social and legal implications. Int. J. Law Inf. Technol. 30(3): 269-279 (2022) - Danica Zendulková, Otmane Azeroual:
Legal aspects and data protection in relation to the CRIS system. CRIS 2022: 17-27 - Nicolas Boltz, Leonie Sterz, Christopher Gerking, Oliver Raabe:
A Model-Based Framework for Simplified Collaboration of Legal and Software Experts in Data Protection Assessments. GI-Jahrestagung 2022: 521-532 - Sun Xin, Zhaobin Pei, Qu Jing:
Legal Analysis of the Right to Privacy Protection in the Age of Artificial Intelligence. ICIC (1) 2022: 617-626 - George Valença, Maria Wanick Sarinho, Vinícius Polito, Fernando Lins:
Do Platforms Care About Your Child's Data? A Proposal of Legal Requirements for Children's Privacy and Protection. WER 2022 - Nils Wehkamp:
Internalization of Privacy Externalities through Negotiation: Social costs of third-party web-analytic tools and the limits of the legal data protection framework. WWW (Companion Volume) 2022: 525-533 - Tommaso Crepax, Jan Tobias Mühlberg:
Upgrading the protection of children from manipulative and addictive strategies in online games: Legal and technical solutions beyond privacy regulation. CoRR abs/2207.09928 (2022) - 2021
- Valentina Leone:
Legal knowledge extraction in the data protection domain based on ontology design patterns. University of Luxembourg, Luxembourg City, Luxembourg, 2021 - Jozef Andrasko, Matús Mesarcík, Ondrej Hamulák:
The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework. AI Soc. 36(2): 623-636 (2021) - Magdalena Brewczynska:
Financial Intelligence Units: Reflections on the applicable data protection legal framework. Comput. Law Secur. Rev. 43: 105612 (2021) - Shujie Cui, Peng Qi:
The legal construction of personal information protection and privacy under the Chinese Civil Code. Comput. Law Secur. Rev. 41: 105560 (2021) - David Erdos:
Dead ringers? Legal persons and the deceased in European data protection law. Comput. Law Secur. Rev. 40: 105495 (2021) - Athena Christofi, Ellen Wauters, Peggy Valcke:
Smart Cities, Data Protection and the Public Interest Conundrum: What Legal Basis for Smart City Processing? Eur. J. Law Technol. 12(1) (2021) - Kamil Mamak:
Whether to Save a Robot or a Human: On the Ethical and Legal Limits of Protections for Robots. Frontiers Robotics AI 8: 712427 (2021) - Eric Martínez, Christoph Winter:
Protecting Sentient Artificial Intelligence: A Survey of Lay Intuitions on Standing, Personhood, and General Legal Protection. Frontiers Robotics AI 8: 788355 (2021) - Peiqing Han:
CNS: Application of Distributed Indexing Based on Large-Scale Graph Data in Legal Protection of Network Personal Information. Int. J. Cooperative Inf. Syst. 30(1-4): 2150003:1-2150003:19 (2021) - Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos:
Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems. ARES 2021: 132:1-132:9 - Xuemei Bai, Ling Zhong:
Legal Protection of Blockchain from the Perspective of the Cybersecurity Law: Legislation and Practice of China. BlockSys 2021: 585-592 - Junke Xu, Tang Ying:
Legal Protection of Personal Data in China. DASC/PiCom/CBDCom/CyberSciTech 2021: 837-842 - Krystyna Niziol:
The challenges of consumer protection law connected with the development of artificial intelligence on the example of financial services (chosen legal aspects). KES 2021: 4103-4111
skipping 137 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 07:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint