Subjects -> LAW (Total: 1397 journals)
    - CIVIL LAW (30 journals)
    - CONSTITUTIONAL LAW (52 journals)
    - CORPORATE LAW (65 journals)
    - CRIMINAL LAW (28 journals)
    - CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)
    - FAMILY AND MATRIMONIAL LAW (23 journals)
    - INTERNATIONAL LAW (161 journals)
    - JUDICIAL SYSTEMS (23 journals)
    - LAW (843 journals)
    - LAW: GENERAL (11 journals)

CRIMINOLOGY AND LAW ENFORCEMENT (161 journals)                     

Showing 1 - 160 of 160 Journals sorted alphabetically
Acta Criminologica : Southern African Journal of Criminology     Full-text available via subscription  
Advances in Cement Research     Hybrid Journal   (Followers: 7)
African Safety Promotion     Full-text available via subscription   (Followers: 4)
African Security Review     Partially Free   (Followers: 7)
Aggression and Violent Behavior     Hybrid Journal   (Followers: 364)
Aggressive Behavior     Hybrid Journal   (Followers: 17)
Annual Review of Criminology     Full-text available via subscription   (Followers: 9)
Asian Journal of Criminology     Hybrid Journal   (Followers: 9)
Australian and New Zealand Journal of Criminology     Hybrid Journal   (Followers: 408)
Australian Journal of Forensic Sciences     Hybrid Journal   (Followers: 354)
Biometric Technology Today     Full-text available via subscription   (Followers: 3)
Boletín Criminológico     Open Access  
Brill Research Perspectives in Transnational Crime     Full-text available via subscription   (Followers: 1)
British Journal of Criminology     Hybrid Journal   (Followers: 401)
Campbell Systematic Reviews     Open Access   (Followers: 6)
Canadian Graduate Journal of Sociology and Criminology     Open Access   (Followers: 6)
Canadian Journal of Criminology and Criminal Justice / La Revue canadienne de criminologie et de justice pénale     Full-text available via subscription   (Followers: 15)
Canadian Society of Forensic Science Journal     Hybrid Journal   (Followers: 259)
Champ pénal/Penal field     Open Access  
Computer Fraud & Security     Full-text available via subscription   (Followers: 375)
Computer Law & Security Review     Hybrid Journal   (Followers: 22)
Contemporary Challenges : The Global Crime, Justice and Security Journal     Open Access   (Followers: 3)
Contemporary Justice Review: Issues in Criminal, Social, and Restorative Justice     Hybrid Journal   (Followers: 38)
Corrections : Policy, Practice and Research     Hybrid Journal   (Followers: 1)
Crime & Delinquency     Hybrid Journal   (Followers: 83)
Crime and Justice     Full-text available via subscription   (Followers: 27)
Crime Prevention and Community Safety     Hybrid Journal   (Followers: 115)
Crime Psychology Review     Hybrid Journal   (Followers: 2)
Crime Science     Open Access   (Followers: 56)
Crime, Histoire & Sociétés     Open Access   (Followers: 10)
Crime, Security and Society     Open Access   (Followers: 2)
Criminal Justice and Behavior     Hybrid Journal   (Followers: 60)
Criminal Justice Ethics     Hybrid Journal   (Followers: 10)
Criminal Justice Matters     Hybrid Journal   (Followers: 9)
Criminal Justice Policy Review     Hybrid Journal   (Followers: 31)
Criminal Justice Review     Hybrid Journal   (Followers: 15)
Criminal Justice Studies: A Critical Journal of Crime, Law and Society     Hybrid Journal   (Followers: 24)
Criminal Law and Philosophy     Hybrid Journal   (Followers: 13)
Criminal Law Forum     Hybrid Journal   (Followers: 8)
Criminocorpus, revue hypermédia     Open Access  
Criminological Studies     Open Access  
Criminologie     Open Access   (Followers: 3)
Criminology and Criminal Justice     Hybrid Journal   (Followers: 51)
Crítica Penal y Poder     Open Access  
Critical Criminology     Hybrid Journal   (Followers: 24)
Critical Studies on Terrorism     Hybrid Journal   (Followers: 54)
Cryptologia     Hybrid Journal   (Followers: 3)
Current Issues in Criminal Justice     Hybrid Journal   (Followers: 13)
Datenschutz und Datensicherheit - DuD     Hybrid Journal  
Delito y Sociedad : Revista de Ciencias Sociales     Open Access  
Derecho Penal y Criminología     Open Access   (Followers: 2)
Detection     Open Access   (Followers: 3)
Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide     Hybrid Journal   (Followers: 11)
EDPACS: The EDP Audit, Control, and Security Newsletter     Hybrid Journal  
Estudios Penales y Criminológicos     Open Access  
EURASIP Journal on Information Security     Open Access   (Followers: 7)
European Journal of Crime, Criminal Law and Criminal Justice     Hybrid Journal   (Followers: 277)
European Journal of Criminology     Hybrid Journal   (Followers: 32)
European Journal of Probation     Hybrid Journal  
European Journal on Criminal Policy and Research     Hybrid Journal   (Followers: 9)
European Polygraph     Open Access  
European Review of Organised Crime     Open Access   (Followers: 47)
Feminist Criminology     Hybrid Journal   (Followers: 17)
Forensic Science International     Hybrid Journal   (Followers: 365)
Forensic Science International : Reports     Open Access   (Followers: 5)
Forensic Science International: Genetics     Hybrid Journal   (Followers: 15)
Forensic Science, Medicine, and Pathology     Hybrid Journal   (Followers: 27)
Forensic Toxicology     Hybrid Journal   (Followers: 18)
Global Crime     Hybrid Journal   (Followers: 287)
Health & Justice     Open Access   (Followers: 5)
Homicide Studies     Hybrid Journal   (Followers: 8)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 30)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 16)
IEEE Transactions on Information Forensics and Security     Hybrid Journal   (Followers: 25)
Incarceration     Full-text available via subscription  
Information Security Journal : A Global Perspective     Hybrid Journal   (Followers: 10)
International Annals of Criminology     Hybrid Journal  
International Criminal Justice Review     Hybrid Journal   (Followers: 14)
International Criminal Law Review     Hybrid Journal   (Followers: 18)
International Criminology     Hybrid Journal   (Followers: 3)
International Journal for Crime, Justice and Social Democracy     Open Access   (Followers: 7)
International Journal of Applied Cryptography     Hybrid Journal   (Followers: 9)
International Journal of Comparative and Applied Criminal Justice     Hybrid Journal   (Followers: 4)
International Journal of Conflict and Violence     Open Access   (Followers: 25)
International Journal of Criminology and Sociology     Open Access   (Followers: 1)
International Journal of Discrimination and the Law     Hybrid Journal   (Followers: 7)
International Journal of Electronic Security and Digital Forensics     Hybrid Journal   (Followers: 11)
International Journal of Information and Coding Theory     Hybrid Journal   (Followers: 7)
International Journal of Police Science and Management     Full-text available via subscription   (Followers: 311)
International Journal of Prisoner Health     Hybrid Journal   (Followers: 16)
International Journal of Punishment and Sentencing, The     Full-text available via subscription   (Followers: 8)
International Review of Victimology     Hybrid Journal   (Followers: 19)
Journal of Addictions & Offender Counseling     Partially Free   (Followers: 6)
Journal of Adult Protection, The     Hybrid Journal   (Followers: 15)
Journal of Aggression, Conflict and Peace Research     Hybrid Journal   (Followers: 42)
Journal of Computer Security     Hybrid Journal   (Followers: 12)
Journal of Computer Virology and Hacking Techniques     Hybrid Journal   (Followers: 6)
Journal of Contemporary Criminal Justice     Hybrid Journal   (Followers: 23)
Journal of Correctional Education     Full-text available via subscription   (Followers: 2)
Journal of Crime and Justice     Hybrid Journal   (Followers: 14)
Journal of Criminal Justice     Hybrid Journal   (Followers: 58)
Journal of Criminal Justice Education     Hybrid Journal   (Followers: 8)
Journal of Criminal Psychology     Hybrid Journal   (Followers: 130)
Journal of Criminological Research, Policy and Practice     Hybrid Journal   (Followers: 60)
Journal of Criminology     Open Access   (Followers: 12)
Journal of Criminology and Forensic Science     Open Access   (Followers: 7)
Journal of Developmental and Life-Course Criminology     Hybrid Journal  
Journal of Ethnicity in Criminal Justice     Hybrid Journal   (Followers: 3)
Journal of Forensic and Legal Medicine     Hybrid Journal   (Followers: 294)
Journal of Forensic Practice     Hybrid Journal   (Followers: 61)
Journal of Forensic Psychiatry & Psychology     Hybrid Journal   (Followers: 50)
Journal of Forensic Sciences     Hybrid Journal   (Followers: 374)
Journal of Gender-Based Violence     Hybrid Journal   (Followers: 13)
Journal of Genocide Research     Hybrid Journal   (Followers: 13)
Journal of Illicit Economies and Development     Open Access  
Journal of International Criminal Justice     Hybrid Journal   (Followers: 38)
Journal of Investigative Psychology and Offender Profiling     Hybrid Journal   (Followers: 11)
Journal of Learning Disabilities and Offending Behaviour     Hybrid Journal   (Followers: 32)
Journal of Penal Law & Criminology     Open Access   (Followers: 2)
Journal of Perpetrator Research     Open Access   (Followers: 1)
Journal of Policing, Intelligence and Counter Terrorism     Hybrid Journal   (Followers: 415)
Journal of Quantitative Criminology     Hybrid Journal   (Followers: 32)
Journal of Scandinavian Studies in Criminology and Crime Prevention     Hybrid Journal   (Followers: 10)
Journal of Strategic Security     Open Access   (Followers: 10)
Justice Evaluation Journal     Hybrid Journal   (Followers: 1)
Justice Research and Policy     Full-text available via subscription  
Juvenile and Family Court Journal     Hybrid Journal   (Followers: 33)
Kriminologia ikasten : Irakaskuntzarako aldizkaria     Open Access  
Kriminologisches Journal     Full-text available via subscription  
Law, Innovation and Technology     Hybrid Journal   (Followers: 15)
Nordic Journal of Criminology     Hybrid Journal   (Followers: 1)
Occasional Series in Criminal Justice and International Studies     Full-text available via subscription   (Followers: 3)
Police Journal : Theory, Practice and Principles     Hybrid Journal   (Followers: 323)
Police Quarterly     Hybrid Journal   (Followers: 299)
Policing: A Journal of Policy and Practice     Hybrid Journal   (Followers: 300)
Policing: An International Journal of Police Strategies & Management     Hybrid Journal   (Followers: 333)
Policy & Internet     Hybrid Journal   (Followers: 12)
Política Criminal     Open Access  
Psychology of Violence     Full-text available via subscription   (Followers: 15)
Psychology, Crime & Law     Hybrid Journal   (Followers: 27)
Punishment & Society     Hybrid Journal   (Followers: 37)
Research and Reports in Forensic Medical Science     Open Access   (Followers: 7)
Revista Arbitrada de Ciencias Jurídicas y Criminalísticas Iustitia Socialis     Open Access  
Revista Brasileira de Criminalística     Open Access  
Revista de Estudios Jurídicos y Criminológicos     Open Access  
Revista de Movimentos Sociais e Conflitos     Open Access  
Revista Digital de la Maestría en Ciencias Penales     Open Access  
Rivista di Studi e Ricerche sulla criminalità organizzata     Open Access  
Science & Global Security: The Technical Basis for Arms Control, Disarmament, and Nonproliferation Initiatives     Hybrid Journal   (Followers: 4)
Security and Defence Quarterly     Open Access   (Followers: 5)
Security Journal     Hybrid Journal   (Followers: 21)
Sexual Abuse in Australia and New Zealand     Full-text available via subscription   (Followers: 9)
South African Crime Quarterly     Open Access   (Followers: 4)
The Howard Journal of Criminal Justice     Hybrid Journal   (Followers: 9)
Theory and Practice of Forensic Science     Open Access   (Followers: 1)
Trauma, Violence, & Abuse     Hybrid Journal   (Followers: 57)
Trends in Organized Crime     Hybrid Journal   (Followers: 381)
URVIO - Revista Latinoamericana de Estudios de Seguridad     Open Access  
Women & Criminal Justice     Hybrid Journal   (Followers: 288)
Women Against Violence : An Australian Feminist Journal     Full-text available via subscription   (Followers: 15)

           

Similar Journals
Journal Cover
IEEE Security & Privacy Magazine
Journal Prestige (SJR): 0.36
Citation Impact (citeScore): 1
Number of Followers: 30  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1540-7993
Published by IEEE Homepage  [228 journals]
  • IEEE Quantum Week 2022

    • Free pre-print version: Loading...

      Abstract: Presents information on the IEEE Quantum Week 2022.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Computer Society Information

    • Free pre-print version: Loading...

      Abstract: Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Jobs Board

    • Free pre-print version: Loading...

      Abstract: Advertisement.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Taking a Measured Approach to Investing in Information Infrastructure for
           Attaining Leading-Edge Trustworthy Artificial Intelligence

    • Free pre-print version: Loading...

      Authors: James Bret Michael;
      Pages: 4 - 6
      Abstract: As we ramp up our investment in our artificial intelligence (AI) infrastructure, concerns about the reliability, resiliency, and security of that infrastructure need to be addressed. Competition, whether political, economic, or otherwise, along with factors such as the rapid evolution of information technology, contributes to an ever-present tension when choosing between taking an expedient or a measured approach to investing in information infrastructure. We see this pressure playing out for AI. Our ability to conduct responsible AI (RAI) research and development goes beyond addressing data and algorithm requirements. It also requires the availability and proper use of state-of-the-art information infrastructure.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Reliability Society

    • Free pre-print version: Loading...

      Pages: 5 - 5
      Abstract: Presents a listing of the editorial board, board of governors, current staff, committee members, and/or society editors for this issue of the publication.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Trusting Trust: Humans in the Software Supply Chain Loop

    • Free pre-print version: Loading...

      Authors: Laurie Williams;
      Pages: 7 - 10
      Abstract: To what extent should one trust a statement that a program is free of Trojan horses' Perhaps it is more important to trust the people who wrote the software. . . . You can’t trust code that you did not totally create yourself.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Computer Society Call for Papers

    • Free pre-print version: Loading...

      Pages: 10 - 10
      Abstract: Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Machine Learning Security and Privacy

    • Free pre-print version: Loading...

      Authors: Nathalie Baracaldo;Alina Oprea;
      Pages: 11 - 13
      Abstract: Our special issue explores emerging security and privacy aspects related to machine learning and artificial intelligence techniques, which are increasingly deployed for automated decisions in many critical applications today. With the advancement of machine learning and deep learning and their use in health care, finance, autonomous vehicles, personalized recommendations, and cybersecurity, understanding the security and privacy vulnerabilities of these methods and developing resilient defenses becomes extremely important. An area of research called adversarial machine learning has been developed at the intersection of cybersecurity and machine learning to understand the security of machine learning in various settings. Early work in adversarial machine learning showed the existence of adversarial examples: data samples that can create misclassifications at deployment time. Other threats against machine learning include poisoning attacks, where an adversary controls a subset of data at training time, and privacy attacks in which an adversary is interested in learning sensitive information about the training data and model parameters.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • The Schuhmacher

    • Free pre-print version: Loading...

      Authors: Tadayoshi Kohno;
      Pages: 14 - 15
      Abstract: A medieval shopkeeper uses magic to create targeted, persistent ads.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Welcome to the Latest “Off by One” Column

    • Free pre-print version: Loading...

      Pages: 15 - 15
      Abstract: Welcome to another installment of “Off by One”! This month’s column, “The Schuhmacher,” is short fiction that, on the surface, is about a shop owner’s decision to misuse magic in a medieval fantasy world. Under the surface, the story is about online advertising; user profiling and interest tracking; privacy; and the difficulty of retracting or changing a technology once it has entered the world.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • “Free” as in Freedom to Protest'

    • Free pre-print version: Loading...

      Authors: Fabio Massacci;Antonino Sabetta;Jelena Mirkovic;Toby Murray;Hamed Okhravi;Mohammad Mannan;Anderson Rocha;Eric Bodden;Daniel E. Geer;
      Pages: 16 - 21
      Abstract: To kick-start the discussion, let’s first review some of the recent attacks. In the node-ipc case1 a developer pushed an update that deliberately but stealthily included code that sabotaged the computer of the users who installed the updated component. Such an attack was selective: a DarkSide in reverse. If the computer Internet Protocol (IP) was geolocated in Russia, the attack would be launched. Several days and a few million downloads later, the “spurious code” was actually noticed and investigated. Linus’s law on the many eyes eventually made the bug shallow,2 and the developer pulled back the changes.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Sphynx: A Deep Neural Network Design for Private Inference

    • Free pre-print version: Loading...

      Authors: Minsu Cho;Zahra Ghodsi;Brandon Reagen;Siddharth Garg;Chinmay Hegde;
      Pages: 22 - 34
      Abstract: Private inference (PI) methods involving deep networks enable cryptographically secure machine learning but incur severe latency costs. We outline how neural architecture searches are used to design networks with fewer nonlinearities, enabling efficient PI.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Security and Privacy Subscribe

    • Free pre-print version: Loading...

      Pages: 34 - 34
      Abstract: Advertisement.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Complex Encoded Tile Tensors: Accelerating Encrypted Analytics

    • Free pre-print version: Loading...

      Authors: Ehud Aharoni;Nir Drucker;Gilad Ezov;Hayim Shaul;Omri Soceanu;
      Pages: 35 - 43
      Abstract: Homomorphic encryption enables private artificial intelligence computations to be run on the cloud. Recent work used tile tensors to speed up the evaluation of neural network inference. We introduce an extension to tile tensors for the complex plane, resulting in an ∼1.68 × amortized speedup.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Data Privacy and Trustworthy Machine Learning

    • Free pre-print version: Loading...

      Authors: Martin Strobel;Reza Shokri;
      Pages: 44 - 49
      Abstract: The privacy risks of machine learning models is a major concern when training them on sensitive and personal data. We discuss the tradeoffs between data privacy and the remaining goals of trustworthy machine learning (notably, fairness, robustness, and explainability).
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Backdoors Against Natural Language Processing: A Review

    • Free pre-print version: Loading...

      Authors: Shaofeng Li;Tian Dong;Benjamin Zi Hao Zhao;Minhui Xue;Suguo Du;Haojin Zhu;
      Pages: 50 - 59
      Abstract: Data poisoning attacks, specifically backdoor attacks, present a severe security threat in artificial intelligence. We provide a comprehensive survey into state-of-the-art backdoor attacks and defenses in the field of natural language processing.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Machine Learning for Source Code Vulnerability Detection: What Works and
           What Isn’t There Yet

    • Free pre-print version: Loading...

      Authors: Tina Marjanov;Ivan Pashchenko;Fabio Massacci;
      Pages: 60 - 76
      Abstract: We review machine learning approaches for detecting (and correcting) vulnerabilities in source code, finding that the biggest challenges ahead involve agreeing to a benchmark, increasing language and error type coverage, and using pipelines that do not flatten the code’s structure.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Pervasive Computing Call for Articles

    • Free pre-print version: Loading...

      Pages: 76 - 76
      Abstract: Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Practical Attacks on Machine Learning: A Case Study on Adversarial Windows
           Malware

    • Free pre-print version: Loading...

      Authors: Luca Demetrio;Battista Biggio;Fabio Roli;
      Pages: 77 - 85
      Abstract: While machine learning is vulnerable to adversarial examples, it still lacks systematic procedures and tools for evaluating its security in different contexts. We discuss how to develop automated and scalable security evaluations of machine learning using practical attacks, reporting a use case on Windows malware detection.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

    • Free pre-print version: Loading...

      Authors: Dinil Mon Divakaran;Adam Oest;
      Pages: 86 - 95
      Abstract: Phishing attacks trick victims into disclosing sensitive information. To counter them, we explore machine learning and deep learning models leveraging large-scale data. We discuss models built on different kinds of data and present multiple deployment options to detect phishing attacks.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • What Has Artifact Evaluation Ever Done for Us'

    • Free pre-print version: Loading...

      Authors: Ben Hermann;
      Pages: 96 - 99
      Abstract: Artifact evaluation is an established peer review practice in several fields of computer science research. In the security field it only has been introduced recently. The author highlights several benefits of artifact sharing for and beyond the research community, inspects the specifics of the security field, and derives suggestions to foster artifact sharing in the security field. Embracing artifact sharing will help to strengthen and mature the field.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Open Journal of the Computing Society

    • Free pre-print version: Loading...

      Pages: 100 - 100
      Abstract: Prospective authors are requested to submit new, unpublished manuscripts for inclusion in the upcoming event described in this call for papers.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • Never Mind the Malware, Here’s the Stegomalware

    • Free pre-print version: Loading...

      Authors: Luca Caviglione;Wojciech Mazurczyk;
      Pages: 101 - 106
      Abstract: In recent years, the use of steganographic techniques has been progressively observed to endow threats with cloaking capabilities and launch sophisticated attack campaigns. This requires partially rethinking the perception of malware.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • IEEE Security and Privacy Over the Rainbow podcast

    • Free pre-print version: Loading...

      Pages: 107 - 107
      Abstract: Advertisement.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
  • NIST’s Post-Quantum Cryptography Standards Competition

    • Free pre-print version: Loading...

      Authors: Bruce Schneier;
      Pages: 107 - 108
      Abstract: Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but something much more complicated. In theory, such a computer can solve problems too complex for conventional computers.
      PubDate: Sept.-Oct. 2022
      Issue No: Vol. 20, No. 5 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.201.95.84
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-