default search action
Jeffrey M. Voas
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j260]Jeffrey M. Voas:
Niceties, Necessities, Antiquities, and Ubiquities. Computer 57(1): 16-17 (2024) - [j259]Jeffrey M. Voas, Ron Vetter:
Outlook 2024. Computer 57(1): 18-20 (2024) - [j258]Nir Kshetri, Jeffrey M. Voas:
Data Centers in Your Backyard? Computer 57(1): 82-87 (2024) - [j257]Joanna F. DeFranco, Jeffrey M. Voas:
"Thirsty" Computing. Computer 57(2): 11-13 (2024) - [j256]Jeffrey M. Voas:
In This Issue. Computer 57(2): 12 (2024) - [j255]Jeffrey M. Voas:
The Influencer. Computer 57(3): 11-13 (2024) - [j254]Jeffrey M. Voas:
Also in this Issue. Computer 57(3): 12 (2024) - [j253]Jeffrey M. Voas:
Thoughts on Dependability. Computer 57(4): 11-12 (2024) - [j252]Joanna F. DeFranco, Jeffrey M. Voas:
Internet of Things-Flavored Chips. Computer 57(4): 156-158 (2024) - [j251]Jeffrey M. Voas:
Dissertation, Inc. Computer 57(5): 12-14 (2024) - [j250]Jeffrey M. Voas:
Also in this Issue. Computer 57(5): 13 (2024) - [j249]Joanna F. DeFranco, Jeffrey M. Voas:
"Golden Years" Users. Computer 57(6): 11-14 (2024) - [j248]Jeffrey M. Voas:
In this Issue. Computer 57(6): 12-13 (2024) - [j247]Jeffrey M. Voas:
Letters to the Editor. Computer 57(8): 4 (2024) - [j246]Phil Laplante, Dejan S. Milojicic, Jeffrey M. Voas:
"Cyberpanics" and Global Disinformation Campaigns. Computer 57(8): 12-14 (2024) - [j245]Elena Loukoianova, Jeffrey M. Voas:
Data Submarines. Computer 57(9): 11-12 (2024) - [j244]Nir Kshetri, Jeffrey M. Voas:
Adapting to Generative Artificial Intelligence: Approaches in Higher Education Institutions. Computer 57(9): 128-133 (2024) - [j243]Jeffrey M. Voas:
Mockery, Fake Reviews, and Fake Reviewers. Computer 57(10): 11-13 (2024) - [j242]Jeffrey M. Voas:
In this Issue. Computer 57(10): 12 (2024) - [j241]W. Eric Wong, Jeffrey M. Voas:
Revisiting Software Reliability Modeling and Testing. Computer 57(10): 14-25 (2024) - [j240]Nir Kshetri, Jeffrey M. Voas:
3D Printing the "Tools" of War. Computer 57(11): 11-13 (2024) - [j239]Ravi S. Sharma, Samia Loucif, Nir Kshetri, Jeffrey M. Voas:
Global Initiatives on "Safer" and More "Responsible" Artificial Intelligence. Computer 57(11): 131-137 (2024) - [j238]Jeffrey M. Voas:
Letters. Computer 57(12): 16 (2024) - [j237]Jeffrey M. Voas, D. Richard Kuhn:
"Over Spooked". Computer 57(12): 25-26 (2024) - [j236]Jeffrey M. Voas:
Also In This Issue. Computer 57(12): 26 (2024) - [j235]Joanna F. DeFranco, Jeffrey M. Voas:
Computing for Agricultural and Urban Environments. Computer 57(12): 35-37 (2024) - [j234]Shiuhpyng Winston Shieh, Jeffrey M. Voas, Phil Laplante, Jason W. Rupe, Christian K. Hansen, Yu-Sung Wu, Yi-Ting Chen, Chi-Yu Li, Kai-Chiang Wu:
Reliability Engineering in a Time of Rapidly Converging Technologies. IEEE Trans. Reliab. 73(1): 73-82 (2024) - 2023
- [j233]Joanna F. DeFranco, Jeffrey M. Voas:
Machining a Sixth Sense: Intuition. Computer 56(1): 14-15 (2023) - [j232]Jeffrey M. Voas, Ron Vetter:
Outlook 2023. Computer 56(1): 16-18 (2023) - [j231]Joanna F. DeFranco, Jeffrey M. Voas:
Computing New Medicines. Computer 56(2): 12-13 (2023) - [j230]Joanna F. DeFranco, Jeffrey M. Voas:
Perfect Strangers. Computer 56(3): 10-12 (2023) - [j229]Jeffrey M. Voas:
In This Issue. Computer 56(3): 11-12 (2023) - [j228]Joanna F. DeFranco, Jeffrey M. Voas:
Thoughts on Automotive IoT. Computer 56(3): 13-18 (2023) - [j227]Jeffrey M. Voas:
Good Enough. Computer 56(4): 11-12 (2023) - [j226]Nir Kshetri, Jeffrey M. Voas, Ralf Bebenroth:
Nations Play Their Chips. Computer 56(4): 110-114 (2023) - [j225]Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas:
Sustainable Blockchain? Computer 56(5): 11-12 (2023) - [j224]Phil Laplante, Jeffrey M. Voas:
"Frameworking" Carbon-Aware Computing Research. Computer 56(5): 105-108 (2023) - [j223]Jeffrey M. Voas:
Disappearing. Computer 56(6): 11-12 (2023) - [j222]Jeffrey M. Voas:
In This Issue. Computer 56(6): 12 (2023) - [j221]Nir Kshetri, Joanna F. DeFranco, Jeffrey M. Voas:
Is It Live, or Is It Deepfake? Computer 56(7): 14-16 (2023) - [j220]Nir Kshetri, Joanna F. DeFranco, Jeffrey M. Voas:
Dusting Off Your Resume. Computer 56(8): 15-18 (2023) - [j219]Jeffrey M. Voas:
In This Issue. Computer 56(8): 16-17 (2023) - [j218]Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas:
Are We Writing for Bots or Humans? Computer 56(9): 13-14 (2023) - [j217]Hsiao-Ying Lin, Jeffrey M. Voas:
Lower Energy Large Language Models (LLMs). Computer 56(10): 14-16 (2023) - [j216]Jeffrey M. Voas:
In This Issue. Computer 56(10): 15 (2023) - [j215]Nir Kshetri, Jeffrey M. Voas, Yogesh K. Dwivedi, Diana Rojas-Torres, Gayle O'Keefe:
Metaverse's Rise and Decline. Computer 56(10): 77-82 (2023) - [j214]Joanna F. DeFranco, Jeffrey M. Voas:
Social Media's Mental Health Quagmire. Computer 56(10): 83-85 (2023) - [j213]Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas:
"Sensoring" the Farm. Computer 56(10): 108-112 (2023) - [j212]Jeffrey M. Voas:
Hiding in the Shadows: Do Shadows Still Exist? Computer 56(11): 14-16 (2023) - [j211]Jeffrey M. Voas:
In this Issue. Computer 56(11): 15 (2023) - [j210]Jeffrey M. Voas:
"Propagating" Disinformation. Computer 56(12): 25-26 (2023) - [j209]Irena Bojanova, Rick Kuhn, Jeffrey M. Voas:
Emerging Disruptive Technologies. Computer 56(12): 27-30 (2023) - [c49]Bernhard Garn, Dominik-Philip Schreiber, Dimitris E. Simos, Rick Kuhn, Jeffrey M. Voas, Raghu Kacker:
Summary of Combinatorial methods for testing Internet of Things smart home systems. ICSTW 2023: 266-267 - 2022
- [j208]Nir Kshetri, Jeffrey M. Voas:
Cryptojacking. Computer 55(1): 18-19 (2022) - [j207]Joseph Williams, Jeffrey M. Voas:
Outlook: Forward Thinking for 2022. Computer 55(1): 30-32 (2022) - [j206]Phil Laplante, Jeffrey M. Voas:
Zero-Trust Artificial Intelligence? Computer 55(2): 10-12 (2022) - [j205]Nir Kshetri, Jeffrey M. Voas:
Ransomware: Pay to Play? Computer 55(3): 11-13 (2022) - [j204]Joanna F. DeFranco, Jeffrey M. Voas, Nir Kshetri:
Algorithms: Society's Invisible Puppeteers. Computer 55(4): 12-14 (2022) - [j203]Jeffrey M. Voas:
"Dumbing Down". Computer 55(5): 13 (2022) - [j202]Joanna F. DeFranco, Jeffrey M. Voas:
Revisiting Software Metrology. Computer 55(6): 12-14 (2022) - [j201]Joanna F. DeFranco, Jeffrey M. Voas:
"Smarter" Seeking "Wiser". Computer 55(7): 13-14 (2022) - [j200]Jeffrey M. Voas, Elena Loukoianova:
Warming Your Chicken. Computer 55(8): 14-15 (2022) - [j199]Jeffrey M. Voas:
In This Issue. Computer 55(8): 15 (2022) - [j198]Nir Kshetri, Jeffrey M. Voas:
Blockchain's Carbon and Environmental Footprints. Computer 55(8): 89-94 (2022) - [j197]Nir Kshetri, Jeffrey M. Voas:
Cyber Olympics: Game On! Computer 55(9): 13-15 (2022) - [j196]Jeffrey M. Voas:
Crying "Cybersecurity!". Computer 55(10): 14-15 (2022) - [j195]Charles Li, Jeffrey M. Voas:
Carbon "Footprinting" IT. Computer 55(11): 12-14 (2022) - [j194]Jeffrey M. Voas, Patrick McConnell, Nir Kshetri:
Energy Considerations. Computer 55(12): 4-5 (2022) - [j193]Nir Kshetri, Jeffrey M. Voas:
RegTech's Rise. Computer 55(12): 24-26 (2022) - [j192]Nir Kshetri, Jeffrey M. Voas:
Ransomware as a Business (RaaB). IT Prof. 24(2): 83-87 (2022) - [j191]Bernhard Garn, Dominik-Philip Schreiber, Dimitris E. Simos, Rick Kuhn, Jeffrey M. Voas, Raghu Kacker:
Combinatorial methods for testing Internet of Things smart home systems. Softw. Test. Verification Reliab. 32(2) (2022) - 2021
- [j190]Jeffrey M. Voas, Nir Kshetri:
Scarcity. Computer 54(1): 26-28 (2021) - [j189]Joseph Williams, Jeffrey M. Voas:
Outlook 2021. Computer 54(1): 40-41 (2021) - [j188]Jeffrey M. Voas, Nir Kshetri:
Monetizing You. Computer 54(2): 13-15 (2021) - [j187]Jeffrey M. Voas:
In This Issue. Computer 54(2): 14 (2021) - [j186]Nir Kshetri, Jeffrey M. Voas, Ravi Sharma:
Computing and Socioeconomic Transformations. Computer 54(2): 26-29 (2021) - [j185]Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas:
Rearchitecting the Malls: The Shifting U.S. Retail Landscape. Computer 54(2): 86-90 (2021) - [j184]Jeffrey M. Voas, Nir Kshetri:
Online Eats "Food Courts". Computer 54(3): 14-17 (2021) - [j183]Jeffrey M. Voas:
In This Issue. Computer 54(3): 15 (2021) - [j182]Jeffrey M. Voas, Keith W. Miller:
Confronting Your Digital Accuser. Computer 54(4): 11-13 (2021) - [j181]Jeffrey M. Voas:
In This Issue. Computer 54(4): 12 (2021) - [j180]Nir Kshetri, Jeffrey M. Voas:
Major Computing Technologies of the Past 75 Years. Computer 54(5): 15-21 (2021) - [j179]Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael, John Viega, Jeffrey M. Voas:
Hackathons 101. Computer 54(5): 65-69 (2021) - [j178]Jeffrey M. Voas, Nir Kshetri:
Homework [EIC'S Message]. Computer 54(6): 10-12 (2021) - [j177]Jeffrey M. Voas:
About This Issue. Computer 54(6): 11 (2021) - [j176]Jeffrey M. Voas, Nir Kshetri:
Lost and Never Found. Computer 54(7): 12-13 (2021) - [j175]Nir Kshetri, Jeffrey M. Voas:
Where's the Silicon? Computer 54(8): 11-12 (2021) - [j174]Jeffrey M. Voas, Phil Laplante:
"Opening" Banking. Computer 54(9): 13-14 (2021) - [j173]Jeffrey M. Voas:
Tell Me a Story. Computer 54(10): 13 (2021) - [j172]Jeffrey M. Voas:
Is Anybody Listening? Computer 54(11): 15-16 (2021) - [j171]Joanna F. DeFranco, Jeffrey M. Voas:
Reproducibility, Fabrication, and Falsification. Computer 54(12): 24-26 (2021) - [j170]Joanna F. DeFranco, Nir Kshetri, Jeffrey M. Voas:
Piracy's Impact on "the Silver Screen". IT Prof. 23(3): 7-11 (2021) - [j169]Jeffrey M. Voas, Nir Kshetri, Joanna F. DeFranco:
Scarcity and Global Insecurity: The Semiconductor Shortage. IT Prof. 23(5): 78-82 (2021) - 2020
- [j168]Jeffrey M. Voas:
A Value-Added Gem. Computer 53(1): 13-14 (2020) - [j167]Jeffrey M. Voas:
Outlooks on Diverse Technologies. Computer 53(1): 16-17 (2020) - [j166]Nir Kshetri, Jeffrey M. Voas:
Thoughts on General Data Protection Regulation and Online Human Surveillance. Computer 53(1): 86-90 (2020) - [j165]Jeffrey M. Voas:
Reinventing Wheels. Computer 53(2): 12-13 (2020) - [j164]Nir Kshetri, Jeffrey M. Voas:
5G, Security, and You. Computer 53(3): 62-66 (2020) - [j163]Jeffrey M. Voas:
Thoughts on Complexity, Trust, and Truth. Computer 53(4): 13-14 (2020) - [j162]Jeffrey M. Voas:
In This Issue. Computer 53(4): 17 (2020) - [j161]Jeffrey M. Voas, Phil Laplante:
Cyberpandemics. Computer 53(6): 13-15 (2020) - [j160]Jeffrey M. Voas:
In This Issue. Computer 53(6): 14 (2020) - [j159]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Cyberthreats in 2025. Computer 53(6): 16-27 (2020) - [j158]Jeffrey M. Voas:
The "Patching" Mentality. Computer 53(7): 12-13 (2020) - [j157]Jeffrey M. Voas:
Citations and Letters. Computer 53(9): 18-19 (2020) - [j156]James Bret Michael, D. Richard Kuhn, Jeffrey M. Voas:
Security or Privacy: Can You Have Both? Computer 53(9): 20-30 (2020) - [j155]Jeffrey M. Voas, Phil Laplante:
Rethinking Home, Office, School. Computer 53(10): 11-12 (2020) - [j154]James Bret Michael, Jeffrey M. Voas:
Algorithms, Algorithms, Algorithms. Computer 53(11): 13-15 (2020) - [j153]Jeffrey M. Voas:
In This Issue. Computer 53(11): 14 (2020) - [j152]Jeffrey M. Voas, Hsiao-Ying Lin:
Is Artificial Intelligence/Machine Learning the Anticipated Silver Bullet? Computer 53(12): 18-19 (2020) - [c48]Temure Saidkhodjaev, Jeffrey M. Voas, Rick Kuhn, Joanna F. DeFranco, Phillip A. Laplante:
Aggregating Atomic Clocks for Time-Stamping. SOSE 2020: 1-6
2010 – 2019
- 2019
- [j151]Nir Kshetri, Jeffrey M. Voas:
Online Advertising Fraud. Computer 52(1): 58-61 (2019) - [j150]Rick Kuhn, Dylan Yaga, Jeffrey M. Voas:
Rethinking Distributed Ledger Technology. Computer 52(2): 68-72 (2019) - [j149]Nir Kshetri, Jeffrey M. Voas:
Trusting Pirated Software. Computer 52(3): 87-90 (2019) - [j148]Nir Kshetri, Jeffrey M. Voas:
Thoughts on Cyberbullying. Computer 52(4): 64-68 (2019) - [j147]Rick Kuhn, Jeffrey M. Voas, Phillip A. Laplante:
Taking Score on the Success of Blockchain, So Far. Computer 52(9): 24-34 (2019) - [j146]Jeffrey M. Voas:
Predictions on Predictions. Computer 52(12): 80-82 (2019) - [j145]Jeffrey M. Voas:
No Preconceptions. IT Prof. 21(2): 4-5 (2019) - [j144]Nir Kshetri, Jeffrey M. Voas:
Supply Chain Trust. IT Prof. 21(2): 6-10 (2019) - [j143]Jeffrey M. Voas, Jinan Fiaidhi:
Innovations Using Blockchain-Part 1. IT Prof. 21(4): 14-15 (2019) - [j142]Jeffrey M. Voas, Jinan Fiaidhi:
Innovations Using Blockchain-Part 2. IT Prof. 21(5): 16-17 (2019) - 2018
- [j141]Jeffrey M. Voas, Rick Kuhn, Celia Paulsen, Kim Schaffer:
Educating Next-Gen Computer Scientists. Computer 51(1): 80-88 (2018) - [j140]Nir Kshetri, Jeffrey M. Voas:
Hackings Brand-Equity Nexus. Computer 51(3): 74-77 (2018) - [j139]Jeffrey M. Voas, Phillip A. Laplante:
IoT's Certification Quagmire. Computer 51(4): 86-89 (2018) - [j138]Nir Kshetri, Jeffrey M. Voas:
Cyberthreats under the Bed. Computer 51(5): 92-95 (2018) - [j137]Jeffrey M. Voas, Rick Kuhn, Constantinos Kolias, Angelos Stavrou, Georgios Kambourakis:
Cybertrust in the IoT Age. Computer 51(7): 12-15 (2018) - [j136]Jeffrey M. Voas, Rick Kuhn, Celia Paulsen, Kim Schaffer:
Computer Science Education in 2018. IT Prof. 20(1): 9-14 (2018) - [j135]Nir Kshetri, Jeffrey M. Voas:
Blockchain in Developing Countries. IT Prof. 20(2): 11-14 (2018) - [j134]Jeffrey M. Voas, Rick Kuhn, Phillip A. Laplante:
IoT Metrology. IT Prof. 20(3): 6-10 (2018) - [j133]Jeffrey M. Voas, William W. Agresti, Phillip A. Laplante:
A Closer Look at IoTs Things. IT Prof. 20(3): 11-14 (2018) - [j132]Joanna F. DeFranco, Mohamad Kassab, Jeffrey M. Voas:
How Do You Create an Internet of Things Workforce? IT Prof. 20(4): 8-12 (2018) - [j131]Mohamad Kassab, Joanna F. DeFranco, Jeffrey M. Voas:
Smarter Education. IT Prof. 20(5): 20-24 (2018) - [j130]Nancy L. Laplante, Phillip A. Laplante, Jeffrey M. Voas:
Stakeholder Identification and Use Case Representation for Internet-of-Things Applications in Healthcare. IEEE Syst. J. 12(2): 1589-1597 (2018) - [j129]Phillip A. Laplante, Mohamad Kassab, Nancy L. Laplante, Jeffrey M. Voas:
Building Caring Healthcare Systems in the Internet of Things. IEEE Syst. J. 12(3): 3030-3037 (2018) - [j128]Nir Kshetri, Jeffrey M. Voas:
Blockchain-Enabled E-Voting. IEEE Softw. 35(4): 95-99 (2018) - [c47]Jeffrey M. Voas:
Keynote Talk #1. DSC 2018: 13 - [c46]Jeffrey M. Voas, Rick Kuhn, Phillip A. Laplante:
Testing IoT Systems. SOSE 2018: 48-52 - 2017
- [j127]Jeffrey M. Voas, Phillip A. Laplante:
Curriculum Considerations for the Internet of Things. Computer 50(1): 72-75 (2017) - [j126]Nir Kshetri, Jeffrey M. Voas:
Banking on Availability. Computer 50(1): 76-80 (2017) - [j125]Angelos Stavrou, Jeffrey M. Voas:
Verified Time. Computer 50(3): 78-82 (2017) - [j124]Jeffrey M. Voas, Rick Kuhn:
What Happened to Software Metrics? Computer 50(5): 88-98 (2017) - [j123]Jeffrey M. Voas, Phillip A. Laplante:
The IoT Blame Game. Computer 50(6): 69-73 (2017) - [j122]Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, Jeffrey M. Voas:
DDoS in the IoT: Mirai and Other Botnets. Computer 50(7): 80-84 (2017) - [j121]Hyunji Chung, Michaela Iorga, Jeffrey M. Voas, Sangjin Lee:
"Alexa, Can I Trust You?". Computer 50(9): 100-104 (2017) - [j120]Jeffrey M. Voas, Nir Kshetri:
Human Tagging. Computer 50(10): 78-85 (2017) - [j119]Nir Kshetri, Jeffrey M. Voas:
Hacking Power Grids: A Current Problem. Computer 50(12): 91-95 (2017) - [j118]Nir Kshetri, Jeffrey M. Voas:
Do Crypto-Currencies Fuel Ransomware? IT Prof. 19(5): 11-15 (2017) - [j117]Irena Bojanova, Jeffrey M. Voas:
Trusting the Internet of Things. IT Prof. 19(5): 16-19 (2017) - [j116]Nir Kshetri, Jeffrey M. Voas:
The Economics of "Fake News". IT Prof. 19(6): 8-12 (2017) - 2016
- [j115]Ying-Dar Lin, Jeffrey M. Voas, Antonio Pescapè, Peter Mueller:
Communications and Privacy under Surveillance. Computer 49(3): 10-13 (2016) - [j114]Phillip A. Laplante, Jeffrey M. Voas, Nancy L. Laplante:
Standards for the Internet of Things: A Case Study in Disaster Response. Computer 49(5): 87-90 (2016) - [j113]Jeffrey M. Voas, Kim Schaffer:
Insights on Formal Methods in Cybersecurity. Computer 49(5): 102-105 (2016) - [j112]Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey M. Voas, Zhi Quan Zhou:
Metamorphic Testing for Cybersecurity. Computer 49(6): 48-55 (2016) - [j111]Jeffrey M. Voas:
Demystifying the Internet of Things. Computer 49(6): 80-83 (2016) - [j110]Kim Schaffer, Jeffrey M. Voas:
What Happened to Formal Methods for Security? Computer 49(8): 70-79 (2016) - [j109]Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas, Irena Bojanova, D. Richard Kuhn:
Learning Internet-of-Things Security "Hands-On". IEEE Secur. Priv. 14(1): 37-46 (2016) - [j108]Irena Bojanova, Jeffrey M. Voas, J. Morris Chang, Linda Wilbanks:
Cybersecurity or Privacy [Guest editors' introduction]. IT Prof. 18(5): 16-17 (2016) - [j107]George F. Hurlburt, Jeffrey M. Voas:
Software is Driving Software Engineering? IEEE Softw. 33(1): 101-104 (2016) - [j106]Nancy L. Laplante, Phillip A. Laplante, Jeffrey M. Voas:
Caring: An Undiscovered "Super -ility" of Smart Healthcare. IEEE Softw. 33(6): 16-19 (2016) - [c45]Jeffrey M. Voas:
Decoding the Mystery of the Internet of Things. CODASPY 2016: 1-2 - [c44]Jeffrey M. Voas:
Building Blocks of the Internet of Things. SOSE 2016: 1-2 - 2015
- [j105]D. Frank Hsu, Dorothy Marinucci, Jeffrey M. Voas:
Cybersecurity: Toward a Secure and Sustainable Cyber Ecosystem. Computer 48(4): 12-14 (2015) - [j104]Jeffrey M. Voas:
Vetting Mobile App Vendors. Computer 48(6): 69-71 (2015) - [j103]Constantinos Kolias, Angelos Stavrou, Jeffrey M. Voas:
Securely Making "Things" Right. Computer 48(9): 84-88 (2015) - [j102]Jeffrey M. Voas, George F. Hurlburt:
Third-Party Software's Trust Quagmire. Computer 48(12): 80-87 (2015) - [j101]Irena Bojanova, Jeffrey M. Voas, George F. Hurlburt:
The Internet of Anything and Sustainability. IT Prof. 17(3): 14-16 (2015) - [j100]Jeffrey M. Voas:
So Where Are We? A Guest Opinion Editorial. IEEE Trans. Reliab. 64(2): 538 (2015) - 2014
- [j99]George F. Hurlburt, Jeffrey M. Voas:
Big Data, Networked Worlds. Computer 47(4): 84-87 (2014) - [j98]Irena Bojanova, George F. Hurlburt, Jeffrey M. Voas:
Imagineering an Internet of Anything. Computer 47(6): 72-77 (2014) - [j97]Jeffrey M. Voas, Irena Bojanova:
NIST: Building a Solid Foundation. IT Prof. 16(2): 13-16 (2014) - 2013
- [j96]James Bret Michael, Phillip A. Laplante, Jeffery E. Payne, Paul E. Black, Jeffrey M. Voas:
Does Security Trump Reliability? Computer 46(11): 84-86 (2013) - [j95]George F. Hurlburt, Jeffrey M. Voas:
Beyond the Cloud: Cyberphysical Systems. IT Prof. 15(2): 2-4 (2013) - [j94]Irena Bojanova, Jia Zhang, Jeffrey M. Voas:
Cloud Computing. IT Prof. 15(2): 12-14 (2013) - [j93]George F. Hurlburt, Jeffrey M. Voas:
STEM's Grand Challenge: Reviving Applied Mathematics. IT Prof. 15(5): 51-55 (2013) - 2012
- [j92]Angelos Stavrou, Jeffrey M. Voas, Tom Karygiannis, Steve Quirolgico:
Building Security into Off-the-Shelf Smartphones. Computer 45(2): 82-84 (2012) - [j91]Tom Costello, Phillip A. Laplante, Jeffrey M. Voas:
NASA Contributions to IT. IT Prof. 14(2): 2-3 (2012) - [j90]David F. Ferraiolo, Jeffrey M. Voas, George F. Hurlburt:
A Matter of Policy. IT Prof. 14(2): 4-7 (2012) - [j89]Jeffrey M. Voas, Keith W. Miller:
Software Testing: What Goes Around Comes Around. IT Prof. 14(3): 4-5 (2012) - [j88]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
The Internet of Things: A Reality Check. IT Prof. 14(3): 56-59 (2012) - [j87]Keith W. Miller, Jeffrey M. Voas, George F. Hurlburt:
BYOD: Security and Privacy Considerations. IT Prof. 14(5): 53-55 (2012) - [j86]Keith W. Miller, Jeffrey M. Voas:
Who Owns What? The Social Media Quagmire. IT Prof. 14(6): 4-5 (2012) - [j85]Jeffrey M. Voas, J. Bret Michael, Michiel van Genuchten:
The Mobile Software App Takeover. IEEE Softw. 29(4): 25-27 (2012) - [c43]Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey M. Voas:
Mobile Application and Device Power Usage Measurements. SERE 2012: 147-156 - 2011
- [j84]Phillip A. Laplante, George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
Certainty through Uncertainty? Computer 44(2): 79-81 (2011) - [j83]Jeffrey M. Voas, George F. Hurlburt, Keith W. Miller, Phillip A. Laplante, Bret Michael:
Thoughts on Higher Education and Scientific Research. IT Prof. 13(2): 6-9 (2011) - [j82]George F. Hurlburt, Jeffrey M. Voas:
Timing Matters: Tackling Intractable Problems. IT Prof. 13(3): 4-6 (2011) - [j81]Steve Quirolgico, Jeffrey M. Voas, Rick Kuhn:
Vetting Mobile Apps. IT Prof. 13(4): 9-11 (2011) - [j80]George F. Hurlburt, Jeffrey M. Voas:
The Evolution of Ubiquitously Intelligent Computing. IT Prof. 13(4): 56-60 (2011) - [j79]George F. Hurlburt, Jeffrey M. Voas:
Storytelling: From Cave Art to Digital Media. IT Prof. 13(5): 4-7 (2011) - [j78]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile-App Addiction: Threat to Security? IT Prof. 13(6): 9-11 (2011) - 2010
- [j77]Keith W. Miller, Jeffrey M. Voas, Phillip A. Laplante:
In Trust We Trust. Computer 43(10): 85-87 (2010) - [j76]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller, Phillip A. Laplante, Bret Michael:
A Nonlinear Perspective on Higher Education. Computer 43(12): 90-92 (2010) - [j75]Ram Chillarege, Jeffrey M. Voas:
Guest Editors' Introduction: Reliability of Embedded and Cyber-Physical Systems. IEEE Secur. Priv. 8(5): 12-13 (2010) - [j74]Jeffrey M. Voas, Phillip A. Laplante:
Effectively Defining "Shall Not" Requirements. IT Prof. 12(3): 46-53 (2010) - [j73]Keith W. Miller, Jeffrey M. Voas:
Ethics and the Cloud. IT Prof. 12(5): 4-5 (2010) - [j72]Keith W. Miller, Jeffrey M. Voas, Tom Costello:
Free and Open Source Software. IT Prof. 12(6): 14-16 (2010) - [j71]George F. Hurlburt, Jeffrey M. Voas, Keith W. Miller:
Mobile Applications: The Fifth Cycle. IT Prof. 12(6): 56-60 (2010)
2000 – 2009
- 2009
- [j70]Bret Michael, Jeffrey M. Voas, Phillip A. Laplante:
Cyberpandemics: History, Inevitability, Response. IEEE Secur. Priv. 7(1): 63-67 (2009) - [j69]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas:
An Ethical Analysis of Automation, Risk, and the Financial Crises of 2008. IT Prof. 11(1): 14-19 (2009) - [j68]Jeffrey M. Voas, Jia Zhang:
Cloud Computing: New Wine or Just a New Bottle? IT Prof. 11(2): 15-17 (2009) - [j67]Keith W. Miller, Jeffrey M. Voas:
The Metaphysics of Software Trust. IT Prof. 11(2): 52-55 (2009) - [j66]George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day:
Privacy and/or Security: Take Your Pick. IT Prof. 11(4): 52-55 (2009) - [j65]John Harauz, Jeffrey M. Voas, George F. Hurlburt:
Trustworthiness in Software Environments. IT Prof. 11(5): 35-40 (2009) - [c42]Desmond J. Meacham, James Bret Michael, Man-tak Shing, Jeffrey M. Voas:
Standards interoperability: Applying software safety assurance standards to the evolution of legacy software. SoSE 2009: 1-8 - 2008
- [j64]Jeffrey M. Voas, Phillip A. Laplante:
Standards Confusion and Harmonization. Computer 40(7): 94-96 (2008) - [j63]Jeffrey M. Voas, Linda Wilbanks:
Information and Quality Assurance: An Unsolved, Perpetual Problem for Past and Future Generations. IT Prof. 10(3): 10-13 (2008) - [j62]Phillip A. Laplante, Jia Zhang, Jeffrey M. Voas:
What's in a Name? Distinguishing between SaaS and SOA. IT Prof. 10(3): 46-50 (2008) - [j61]Keith W. Miller, Jeffrey M. Voas:
Computer Scientist, Software Engineer, or IT Professional: Which Do You Think You Are? IT Prof. 10(4): 4-6 (2008) - [j60]Keith W. Miller, Jeffrey M. Voas:
IT as a Profession: Is Competent Creation the Primary Goal? IT Prof. 10(6): 15-17 (2008) - [j59]Keith W. Miller, Jeffrey M. Voas:
Information Integrity and IT Professionals' Integrity, Intertwined. IT Prof. 10(6): 35-40 (2008) - [c41]Jeffrey M. Voas:
Thirteen rules for trust. CSIIRW 2008: 7:1 - [p1]Jeffrey M. Voas:
Software Product Certification. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j58]Jeffrey M. Voas:
A Baker's Dozen: 13 Software Engineering Challenges. IT Prof. 9(2): 48-53 (2007) - [j57]Jeffrey M. Voas, Phillip A. Laplante:
The Services Paradigm: Who Can You Trust? IT Prof. 9(3): 58-61 (2007) - [c40]Jeffrey M. Voas, Keith W. Miller:
One in a Baker's Dozen: Debugging Debugging. HASE 2007: 75-81 - 2006
- [j56]Keith W. Miller, Jeffrey M. Voas:
Software test cases: is one ever enough? IT Prof. 8(1): 44-48 (2006) - [j55]Jeffrey M. Voas, Keith W. Miller:
Software Certification Services: Encouraging Trust and Reasonable Expectations. IT Prof. 8(5): 39-44 (2006) - [j54]Brian A. Malloy, Nicholas A. Kraft, Jason O. Hallstrom, Jeffrey M. Voas:
Improving the Predictable Assembly of Service-Oriented Architectures. IEEE Softw. 23(2): 12-15 (2006) - [c39]Ann Miller, John McLean, O. Sami Saydjari, Jeffrey M. Voas:
COMPSAC Panel Session on Trustworthy Computing. COMPSAC (1) 2006: 31 - [c38]Jeffrey M. Voas:
Reliability and Fault Tolerance in Trust. COMPSAC (1) 2006: 35-36 - 2005
- [j53]James Bret Michael, Steven E. Roberts, Jeffrey M. Voas, Thomas C. Wingfield:
The Role of Policy in Balancing Outsourcing and Homeland Security. IT Prof. 7(4): 19-23 (2005) - 2004
- [j52]Jeffrey M. Voas, William W. Agresti:
Software Quality from a Behavioral Perspective. IT Prof. 6(4): 46-50 (2004) - [j51]Brian A. Malloy, Jeffrey M. Voas:
Programming with Assertions: A Prospectus. IT Prof. 6(5): 53-59 (2004) - [j50]Jeffrey M. Voas:
Software Engineering's Role in Business. IEEE Softw. 21(5): 26-27 (2004) - [j49]Jeffrey M. Voas:
Software's Secret Sauce: The "-ilities". IEEE Softw. 21(6): 14-15 (2004) - [j48]Terry Bollinger, Jeffrey M. Voas, Maarten Boasson:
Persistent Software Attributes. IEEE Softw. 21(6): 16-18 (2004) - [c37]Jia Zhang, Carl K. Chang, Jeffrey M. Voas:
A Uniform Meta-Model for Mediating Formal Electronic Conferences. COMPSAC 2004: 376-383 - 2003
- [j47]Jeffrey M. Voas:
Guest Editor's Introduction: Assuring Software Quality Assurance. IEEE Softw. 20(3): 48-49 (2003) - [j46]Jeffrey M. Voas:
Trusted Software's Holy Grail. Softw. Qual. J. 11(1): 9-17 (2003) - [c36]Stephen S. Yau, Carl E. Landwehr, Jeffrey M. Voas, Thomas J. Weigert:
Challenges and Recent Advances in Developing Trustworthy Software-Based Systems. COMPSAC 2003: 208- - [c35]Jeffrey M. Voas:
Trusted Software's Holy Grail. HICSS 2003: 338 - [c34]Jeffrey M. Voas:
Adaptive Software Quality. ICEIS (1) 2003: 586-589 - 2001
- [j45]Jeffrey M. Voas:
Discovering Unanticipated Software Output Modes. Ann. Softw. Eng. 11(1): 79-88 (2001) - [j44]Jeffrey M. Voas:
Why testing software under expected operational profiles is not sufficient. Softw. Focus 2(1): 13-14 (2001) - [j43]Jeffrey M. Voas:
Quality Time - Faster, Better, and Cheaper. IEEE Softw. 18(3): 96-97 (2001) - [j42]Jeffrey M. Voas:
Composing Software Component "ilities". IEEE Softw. 18(4): 16-17 (2001) - [j41]Jeffrey M. Voas:
Guest Editor's Introduction: Software Fault Tolerance-Making Software Behave. IEEE Softw. 18(4): 18-19 (2001) - [j40]Jeffrey M. Voas:
Fault Tolerance. IEEE Softw. 18(4): 54-57 (2001) - [c33]Jeffrey M. Voas:
Why Testing under Expected Operational Scenarios is Not Sufficient. HASE 2001: 5-10 - [c32]Allen P. Nikora, Raphael R. Some, Jeffrey M. Voas, Victor L. Winter, Jie Xu:
Software Dependability in Distributed and Mobile Computing Environments. HASE 2001: 7-10 - [c31]Jeffrey M. Voas:
Discovering Unanticipated Software Output Modes. RE 2001: 277 - [c30]Jeffrey M. Voas:
Why Is It So Hard to Predict Software System Trustworthiness from Software Component Trustworthiness?. SRDS 2001: 179- - 2000
- [j39]Colleen K. Vossler, Jeffrey M. Voas:
Defective software: An overview of legal remedies and technical measures available to consumers. Adv. Comput. 53: 451-497 (2000) - [j38]Jeffrey M. Voas:
Developing a Usage-Based Software Certification Process. Computer 33(8): 32-37 (2000) - [j37]James A. Whittaker, Jeffrey M. Voas:
Toward a More Reliable Theory of Software Reliability. Computer 33(12): 36-42 (2000) - [j36]Jeffrey M. Voas, Jeffery E. Payne:
Dependability certification of software components. J. Syst. Softw. 52(2-3): 165-172 (2000) - [j35]Jeffrey M. Voas:
Quality Time - A New Generation of Software Quality Conferences. IEEE Softw. 17(1): 22-23 (2000) - [j34]Jeffrey M. Voas:
Quality Time - Will the Real Operational Profile Please Stand Up? IEEE Softw. 17(2): 87-89 (2000) - [j33]Jeffrey M. Voas:
Quality Time - Can Chaotic Methods Improve Software Quality Predictions? IEEE Softw. 17(5): 20-22 (2000) - [j32]Jeffrey M. Voas, Nancy R. Mead:
Malicious IT - Guest Editors' Introduction. IEEE Softw. 17(5): 23-25 (2000) - [j31]John Viega, Jeffrey M. Voas:
Quality Time - Can Aspect-Oriented Programming Lead to More Reliable Software? IEEE Softw. 17(6): 19-21 (2000) - [c29]Jeffrey M. Voas:
Disposable COTS-Intensive Software Systems (A Position Statement). CSMR 2000: 239-241 - [c28]Jeffrey M. Voas:
Limited Software Warranties. ECBS 2000: 56-63
1990 – 1999
- 1999
- [j30]Anup K. Ghosh, Jeffrey M. Voas:
Inoculating Software for Survivability. Commun. ACM 42(7): 38-44 (1999) - [j29]Jeffrey M. Voas:
The Future of Computer Assurance. Computer 32(1): 76-77 (1999) - [j28]Jeffrey M. Voas:
Disposable information systems: the future of software maintenance? J. Softw. Maintenance Res. Pract. 11(2): 143-150 (1999) - [j27]Jeffrey M. Voas:
Quality Time - Protecting Against What? The Achilles Heel of Information Assurance. IEEE Softw. 16(1): 28-29 (1999) - [j26]Jeffrey M. Voas:
Quality Time - Does Untested Software Threaten Infrastructures? IEEE Softw. 16(2): 89-90 (1999) - [j25]Jeffrey M. Voas:
Quality Time - A US Government-Regulated Software Industry. IEEE Softw. 16(3): 94-95 (1999) - [j24]Jeffrey M. Voas:
Guest Editor's Introduction: Certification-Reducing the Hidden Costs of Poor Quality. IEEE Softw. 16(4): 22-25 (1999) - [j23]Jeffrey M. Voas:
Certifying Software for High-Assurance Environments. IEEE Softw. 16(4): 48-54 (1999) - [j22]Jeffrey M. Voas:
Software Quality's Eight Greatest Myths. IEEE Softw. 16(5): 118-120 (1999) - [c27]Jeffrey M. Voas:
Can Generic Software Be Assured? COMPSAC 1999: 94-95 - [c26]Jeffrey M. Voas:
User Participation-based Software Certification. EUROVAV 1999: 267-276 - [c25]Jeffrey M. Voas:
COTS and High Assurance: An Oxymoron? HASE 1999: 119-122 - [c24]Jeffrey M. Voas:
A World Without Risks: Let Me Out! HASE 1999: 274- - 1998
- [j21]Jeffrey M. Voas:
The Challenges of Using COTS Software in Component-Based Development (Guest Editor's Introduction). Computer 31(6): 44-45 (1998) - [j20]Jeffrey M. Voas:
Certifying Off-the-Shelf Software Components. Computer 31(6): 53-59 (1998) - [j19]Jeffrey M. Voas:
COTS Software: The Economical Choice? IEEE Softw. 15(2): 16-19 (1998) - [j18]Jeffrey M. Voas:
Maintaining Component-Based Systems. IEEE Softw. 15(4): 22-27 (1998) - [c23]Jeffrey M. Voas:
Certifying High Assurance Software. COMPSAC 1998: 99-105 - [c22]Lora Kassab, Jeffrey M. Voas:
Agent Trustworthiness. ECOOP Workshops 1998: 300 - [c21]Jeffrey M. Voas:
Are COTS Products and Component Packaging Killing Software Malleability? ICSM 1998: 156- - [c20]Jeffrey M. Voas, M. M. Lehman, Lionel C. Briand, Norman F. Schneidewind:
Maintaining COTS-Based Systems: Is it Possible? (Panel). ICSM 1998: 220-221 - [c19]Jeffrey M. Voas:
Does software reliability engineering (SRE) offer any benefits to mobile code's security woes? ISSRE 1998: 180 - 1997
- [j17]Christoph C. Michael, Jeffrey M. Voas:
The Ability of Directed Tests to Predict Software Quality. Ann. Softw. Eng. 4: 31-64 (1997) - [j16]Jeffrey M. Voas, Gary McGraw, Lora Kassab, Larry Voas:
A 'Crystal Ball' for Software Liability. Computer 30(6): 29-36 (1997) - [j15]Jeffrey M. Voas:
Fault Injection for the Masses. Computer 30(12): 129-130 (1997) - [j14]Jeffrey M. Voas:
Quality Time: How Assertions Can Increase Test Effectiveness. IEEE Softw. 14(2): 118-122 (1997) - [j13]Jeffrey M. Voas, Frank Charron, Gary McGraw, Keith W. Miller, Michael Friedman:
Predicting How Badly "Good" Software Can Behave. IEEE Softw. 14(4): 73-83 (1997) - [j12]Jeffrey M. Voas:
Quality Time: Can Clean Pipes Produce Dirty Water? IEEE Softw. 14(4): 93-95 (1997) - [j11]Jeffrey M. Voas:
Software testability measurement for intelligent assertion placement. Softw. Qual. J. 6(4): 327-336 (1997) - [c18]Jeffrey M. Voas:
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis. COMPSAC 1997: 505-510 - [c17]Jeffrey M. Voas, Chuck Howell, Bill Everett:
Panel: Qualifying The Reliability Of COTS Software Components. ISSRE 1997: 144 - [c16]Jeffrey M. Voas, Anup K. Ghosh, Frank Charron, Lora Kassab:
Reducing uncertainty about common-mode failures. ISSRE 1997: 308-319 - 1996
- [c15]Jeffrey M. Voas, Keith W. Miller:
The Avalanche Paradigm: An Experimental Software Programming Technique for Improving Fault-tolerance. ECBS 1996: 142-147 - [c14]Jeffrey M. Voas, Frank Charron, Keith W. Miller:
Investigating rare-event failure tolerance: reductions in future uncertainty. HASE 1996: 78-85 - [c13]Jeffrey M. Voas, Frank Charron, Keith W. Miller:
Tolerant Software Interfaces: Can COTS-based Systems be Trusted Without Them? SAFECOMP 1996: 126-135 - 1995
- [j10]Jeffrey M. Voas, Keith W. Miller:
Software Testability: The New Verification. IEEE Softw. 12(3): 17-28 (1995) - [c12]Jeffrey M. Voas:
Software Testability Measurement for Assertion Placement and Fault Localization. AADEBUG 1995: 133-144 - [c11]Taghi M. Khoshgoftaar, Robert M. Szabo, Jeffrey M. Voas:
Detecting program modules with low testability. ICSM 1995: 242-250 - [c10]Jeffrey M. Voas, Keith W. Miller:
Predicting software's minimum-time-to-hazard and mean-time-to-hazard for rare input events. ISSRE 1995: 229-238 - [c9]Jeffrey M. Voas, Keith W. Miller:
An Automated Code-Based Fault-Tree Mitigation Technique. SAFECOMP 1995: 59-72 - [c8]Jeffrey M. Voas, Jeffery E. Payne, R. Mills, John McManus:
Software Testability: An Experiment in Measuring Simulation Reusability. SSR 1995: 247-255 - 1994
- [c7]Jeffrey M. Voas, Keith W. Miller:
Putting assertions in their place. ISSRE 1994: 152-157 - [c6]Timothy J. Shimeall, Michael Friedman, John Chilenski, Jeffrey M. Voas:
Views on Software Testability (Panel Abstract). ISSTA 1994: 240 - 1993
- [j9]Jeffrey M. Voas, Jeffery E. Payne, Frederick B. Cohen:
A model for detecting the existence of software corruption in real time. Comput. Secur. 12(3): 275-283 (1993) - [j8]Jeffrey M. Voas, Jeffery E. Payne, Keith W. Miller:
Designing programs that are less likely to hide faults. J. Syst. Softw. 20(1): 93-100 (1993) - [j7]Jeffrey M. Voas, Keith W. Miller:
Semantic metrics for software testability. J. Syst. Softw. 20(3): 207-216 (1993) - [j6]Larry J. Morell, Jeffrey M. Voas:
A framework for defining semantic metrics. J. Syst. Softw. 20(3): 245-251 (1993) - [c5]Jeffrey M. Voas, Keith W. Miller, Jeffery E. Payne:
A software analysis technique for quantifying reliability in high-risk medical devices. CBMS 1993: 64-69 - [c4]Richard G. Hamlet, Jeffrey M. Voas:
Faults on Its Sleeve: Amplifying Software Reliability Testing. ISSTA 1993: 89-98 - [c3]Jeffrey M. Voas, Christoph C. Michael, Keith W. Miller:
Confidently Assessing a Zero Probability of Software Failure. SAFECOMP 1993: 197-206 - 1992
- [j5]Jeffrey M. Voas, Keith W. Miller:
The Revealing Power of a Test Case. Softw. Test. Verification Reliab. 2(1): 25-42 (1992) - [j4]Keith W. Miller, Larry J. Morell, Robert E. Noonan, Stephen K. Park, David M. Nicol, Branson W. Murrill, Jeffrey M. Voas:
Estimating the Probability of Failure When Testing Reveals No Failures. IEEE Trans. Software Eng. 18(1): 33-43 (1992) - [j3]Jeffrey M. Voas:
PIE: A Dynamic Failure-Based Technique. IEEE Trans. Software Eng. 18(8): 717-727 (1992) - [c2]Jeffrey M. Voas, Keith W. Miller:
Improving the software development process using testability research. ISSRE 1992: 114-121 - 1991
- [j2]Larry J. Morell, Jeffrey M. Voas:
On the inadequacies of data state space sampling as a measure of the trustworthiness of programs. ACM SIGSOFT Softw. Eng. Notes 16(2): 73-74 (1991) - [j1]Jeffrey M. Voas, Larry J. Morell, Keith W. Miller:
Predicting Where Faults Can Hide from Testing. IEEE Softw. 8(2): 41-48 (1991) - [c1]Jeffrey M. Voas:
A Dynamic Failure Model for Predicting the Impact that a Program Location has on the Program. ESEC 1991: 308-331
Coauthor Index
aka: Rick Kuhn
aka: Phil Laplante
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-15 02:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint