• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Nurmi J, Paju A, Brumley BB, Insoll T, Ovaska AK, Soloveva V, Vaaranen-Valkonen N, Aaltonen M, Arroyo D. Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy. Sci Rep 2024;14:7849. [PMID: 38570603 PMCID: PMC10991312 DOI: 10.1038/s41598-024-58346-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/12/2023] [Accepted: 03/27/2024] [Indexed: 04/05/2024]  Open
2
Brumley BB, Tuveri N. Remote Timing Attacks Are Still Practical. Computer Security – ESORICS 2011 2011. [DOI: 10.1007/978-3-642-23822-2_20] [Citation(s) in RCA: 96] [Impact Index Per Article: 7.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA