Salta al contenuto principale



Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats


cross-posted from: programming.dev/post/36349920

In March 2025, Google Threat Intelligence Group (GTIG) identified a complex, multifaceted campaign attributed to the PRC-nexus threat actor UNC6384. The campaign targeted diplomats in Southeast Asia and other entities globally. GTIG assesses this was likely in support of cyber espionage operations aligned with the strategic interests of the People's Republic of China (PRC).

The campaign hijacks target web traffic, using a captive portal redirect, to deliver a digitally signed downloader that GTIG tracks as STATICPLUGIN. This ultimately led to the in-memory deployment of the backdoor SOGU.SEC (also known as PlugX). This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade detection.

This blog post presents our findings and analysis of this espionage campaign, as well as the evolution of the threat actor’s operational capabilities. We examine how the malware is delivered, how the threat actor utilized social engineering and evasion techniques, and technical aspects of the multi-stage malware payloads.

In this campaign, the malware payloads were disguised as either software or plugin updates and delivered through UNC6384 infrastructure using AitM and social engineering tactics. A high level overview of the attack chain:
1. The target’s web browser tests if the internet connection is behind a captive portal;
2. An AitM redirects the browser to a threat actor controlled website;
3. The first stage malware, STATICPLUGIN, is downloaded;
4. STATICPLUGIN then retrieves an MSI package from the same website;
5. Finally, CANONSTAGER is DLL side-loaded and deploys the SOGU.SEC backdoor.

~Figure 1: Attack chain diagram~




Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats


In March 2025, Google Threat Intelligence Group (GTIG) identified a complex, multifaceted campaign attributed to the PRC-nexus threat actor UNC6384. The campaign targeted diplomats in Southeast Asia and other entities globally. GTIG assesses this was likely in support of cyber espionage operations aligned with the strategic interests of the People's Republic of China (PRC).

The campaign hijacks target web traffic, using a captive portal redirect, to deliver a digitally signed downloader that GTIG tracks as STATICPLUGIN. This ultimately led to the in-memory deployment of the backdoor SOGU.SEC (also known as PlugX). This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade detection.

This blog post presents our findings and analysis of this espionage campaign, as well as the evolution of the threat actor’s operational capabilities. We examine how the malware is delivered, how the threat actor utilized social engineering and evasion techniques, and technical aspects of the multi-stage malware payloads.

In this campaign, the malware payloads were disguised as either software or plugin updates and delivered through UNC6384 infrastructure using AitM and social engineering tactics. A high level overview of the attack chain:
1. The target’s web browser tests if the internet connection is behind a captive portal;
2. An AitM redirects the browser to a threat actor controlled website;
3. The first stage malware, STATICPLUGIN, is downloaded;
4. STATICPLUGIN then retrieves an MSI package from the same website;
5. Finally, CANONSTAGER is DLL side-loaded and deploys the SOGU.SEC backdoor.

~Figure 1: Attack chain diagram~





Chinese Hackers Hijack Web Traffic to Spy on Foreign Diplomats


In March 2025, Google Threat Intelligence Group (GTIG) identified a complex, multifaceted campaign attributed to the PRC-nexus threat actor UNC6384. The campaign targeted diplomats in Southeast Asia and other entities globally. GTIG assesses this was likely in support of cyber espionage operations aligned with the strategic interests of the People's Republic of China (PRC).

The campaign hijacks target web traffic, using a captive portal redirect, to deliver a digitally signed downloader that GTIG tracks as STATICPLUGIN. This ultimately led to the in-memory deployment of the backdoor SOGU.SEC (also known as PlugX). This multi-stage attack chain leverages advanced social engineering including valid code signing certificates, an adversary-in-the-middle (AitM) attack, and indirect execution techniques to evade detection.

This blog post presents our findings and analysis of this espionage campaign, as well as the evolution of the threat actor’s operational capabilities. We examine how the malware is delivered, how the threat actor utilized social engineering and evasion techniques, and technical aspects of the multi-stage malware payloads.

In this campaign, the malware payloads were disguised as either software or plugin updates and delivered through UNC6384 infrastructure using AitM and social engineering tactics. A high level overview of the attack chain:
1. The target’s web browser tests if the internet connection is behind a captive portal;
2. An AitM redirects the browser to a threat actor controlled website;
3. The first stage malware, STATICPLUGIN, is downloaded;
4. STATICPLUGIN then retrieves an MSI package from the same website;
5. Finally, CANONSTAGER is DLL side-loaded and deploys the SOGU.SEC backdoor.

~Figure 1: Attack chain diagram~





DM me on Spotify: Spotify launches a messaging feature.






in reply to chobeat

“Google says it has calculated the energy required for its Gemini AI service: Sending a single text prompt consumes as much energy as watching television for nine seconds.”


That's pretty staggering when you consider that it's no longer possible to do a Google search without generating an AI summary. Google processes something like 8 billion searches per day, so if each one of those triggers a prompt equivalent to watching 9 seconds of television, every day the total power cost is equivalent to about 2200 years of TV watching. Per day. And that's just search, for just one tech company.

in reply to chobeat

Ok, but I stopped reading when they quoted the moron Sutskever "I think it's pretty
likely the entire
Surface of the
earth will be
Covered with solar
panels and data
enters."





Apple vs. Facebook is Kayfabe


::: spoiler Comments
- Hackernews;
- Lobsters.
:::
Questa voce è stata modificata (2 settimane fa)


Will Smith's concert crowds are real, but AI is blurring the lines


::: spoiler Comments
- Hackernews.
:::
Questa voce è stata modificata (2 settimane fa)


New Flagships Redefine Form and Function


The smartphone market is shifting, with a renewed focus on design and practical innovation. New releases from Tecno and Apple are sparking a "thinness war," with devices like the Tecno Spark Slim and the rumored iPhone 17 Air pushing the boundaries of sleek design. Beyond aesthetics, manufacturers are integrating more on-device AI for improved privacy and performance, and new camera features like advanced zoom and real-time translation are becoming standard.

Technology reshared this.

in reply to 888

This feels like an incomplete thought that doesn’t go far enough to spark any sort of conversation.
in reply to NOT_RICK

Þe user's first, and only, post. Its oþer contribution is a single emoji reply comment.

80% chance AI bot.

Questa voce è stata modificata (2 settimane fa)

in reply to xc2215x

A fine isnt enough. This platform needs to be permanently shutdown.

This place is breeding grounds for morons, bigots, predators, and other social rejects, and it lets all of them continue thriving. By no comprehensible measure should that be normal, but somehow it is.

in reply to dinckel

Never heard of it, but isn't it the case that if it is shut down, that group of people will just move elsewhere as they have before?
in reply to DigitalDilemma

Correct. And the only choice from then is to continue deplatforming them even further. Bigots and abusers don't deserve to have a voice
in reply to dinckel

But I don't understand why don't they go after the abusers, instead of imposing a fine to the platform. This looks like a criminal case, it's not just a matter that should be left in the hands of the platform to begin with.. so why focus on blaming the platform?

Someone got bullied so hard they died, and the response is to simply ban them and then punish the platform? It sounds like an approach designed by lawyers who just want to make money, instead of actually an attempt to fix/correct the problem.

It's like blaming the email provider for allowing the exchange of messages and video files in a mailing group that was organizing crime.. instead of actually investigating the people who committed the crime and enacting laws / setting precedent that could act as deterrent, independently of which channel was used while committing the crime. Then punish the platform if they are not collaborating or if they are found to be complicit (while investigating the criminals).

Questa voce è stata modificata (2 settimane fa)
in reply to DigitalDilemma

Every time you deplatform a group, it generally shrinks by about 10%. Keep doing it enough and eventually you have a group that's JUST the diehards, and that group is generally so small that they'll burn themselves out.

in reply to agelord

I googled and apparently kick has been doing 180 million revenue yearly, so this is refreshingly high in terms of a fine.
in reply to agelord

I mean, Kick probably could be suspending people who stream for an unhealthily long time, maybe suspend his abusive friends, but they didn't force him to take any actions resulting in his death imo.

What exactly is the crime?

Questa voce è stata modificata (2 settimane fa)
in reply to agelord

Yes. I saw a video on getting around Flock's AI cameras and he mentions the numerous million dollar lawsuits that regularly result from misuse of their data and the glitches that cause people to have guns pointed at their heads by police.

It is a cost of doing business. Saying 'I'll sue you!' To them is as threatening as charging someone a little extra for that order of coffee they made.





How are you "supposed" to download your treasures? Download managers? Or just let the 100GB file sit in firefox download list and potentially get cut off mid-download?


I can never seem to get a download manger to work. I remember I used to be able to do that on windows, but SteamOS is giving me a headache, I'm a noob in linux.

But then again, idk if pausing would even be possible with these 🏴‍☠️ sites.

Questa voce è stata modificata (2 settimane fa)
in reply to DeathByBigSad

Read the wiki, use qbittorrent, setup the VPN with a killswitch for safety. Yarr!
in reply to DeathByBigSad

Wget you just type wget whateverurl.com
Questa voce è stata modificata (1 settimana fa)



Emilio Estevez, Martin Sheen – „Dein Weg“ (2010)

Der einzige Grund für mich, diesen Film zu sehen, war die Konstellation: Martin Sheen vor der Kamera, Emilio Estevez dahinter. Vater und Sohn, die gemeinsam einen Film schaffen, so direkt und sichtbar, ist eine Seltenheit in Hollywood. Der Jakobsweg dagegen wirkte eher wie eine Zumutung. Überstrapaziert von Selbsterfahrungsberichten, überhöht von Kirchenfolklore, in Deutschland endgültig re-popularisiert durch Hape Kerkelings Bestseller. Ein Trend, der mich eher abschreckt. Zumal mir meine ziemlich katholische Kindheit ohnehin wenig Lust auf Pilgerwege hinterlassen hat. (ARD)



How the gas lobby captured the energy crisis response - Corporate Europe Observatory


[00:13:55]

This episode tells the amazing story of how the EU took the brave step of using the climate and cost of living crisis as an opportunity to move away from destructive fossil fuels all together! Obviously, this didn’t happen, but it could have.

This is the forth episode of Corporate Europe Observatory's new podcast series “What's going wrong, and how to put it right?”.



Hate Systemd? A New Init System(Nitro) Debuts as a Minimalist Process Supervisor for Linux


cross-posted from: programming.dev/post/36342010

Nitro is a tiny process supervisor that also can be used as pid 1 on Linux.

There are four main applications it is designed for:

  • As init for a Linux machine for embedded, desktop or server purposes
  • As init for a Linux initramfs
  • As init for a Linux container (Docker/Podman/LXC/Kubernetes)
  • As unprivileged supervision daemon on POSIX systems

Nitro is configured by a directory of scripts, defaulting to /etc/nitro (or the first command line argument).




Hate Systemd? A New Init System(Nitro) Debuts as a Minimalist Process Supervisor for Linux


Nitro is a tiny process supervisor that also can be used as pid 1 on Linux.

There are four main applications it is designed for:

  • As init for a Linux machine for embedded, desktop or server purposes
  • As init for a Linux initramfs
  • As init for a Linux container (Docker/Podman/LXC/Kubernetes)
  • As unprivileged supervision daemon on POSIX systems

Nitro is configured by a directory of scripts, defaulting to /etc/nitro (or the first command line argument).



in reply to Pro

The submitter appears to be attempting to stir up controversy by implying the author of nitro "hates systemd". This is just an alternative init, it has nothing to do with systemd and there is no opinion whatsoever about systemd in the linked GitHub. Subby, quit your shit stirring.


Hate Systemd? A New Init System(Nitro) Debuts as a Minimalist Process Supervisor for Linux


cross-posted from: programming.dev/post/36342010

Nitro is a tiny process supervisor that also can be used as pid 1 on Linux.

There are four main applications it is designed for:

  • As init for a Linux machine for embedded, desktop or server purposes
  • As init for a Linux initramfs
  • As init for a Linux container (Docker/Podman/LXC/Kubernetes)
  • As unprivileged supervision daemon on POSIX systems

Nitro is configured by a directory of scripts, defaulting to /etc/nitro (or the first command line argument).




Hate Systemd? A New Init System(Nitro) Debuts as a Minimalist Process Supervisor for Linux


Nitro is a tiny process supervisor that also can be used as pid 1 on Linux.

There are four main applications it is designed for:

  • As init for a Linux machine for embedded, desktop or server purposes
  • As init for a Linux initramfs
  • As init for a Linux container (Docker/Podman/LXC/Kubernetes)
  • As unprivileged supervision daemon on POSIX systems

Nitro is configured by a directory of scripts, defaulting to /etc/nitro (or the first command line argument).





Hate Systemd? A New Init System(Nitro) Debuts as a Minimalist Process Supervisor for Linux


Nitro is a tiny process supervisor that also can be used as pid 1 on Linux.

There are four main applications it is designed for:

  • As init for a Linux machine for embedded, desktop or server purposes
  • As init for a Linux initramfs
  • As init for a Linux container (Docker/Podman/LXC/Kubernetes)
  • As unprivileged supervision daemon on POSIX systems

Nitro is configured by a directory of scripts, defaulting to /etc/nitro (or the first command line argument).

Questa voce è stata modificata (2 settimane fa)


Big tech’s selective disclosure masks AI’s real climate impact


::: spoiler Comments
- Hackernews.
:::
Questa voce è stata modificata (2 settimane fa)


AI Is Eliminating Jobs for Younger Workers: New research from Stanford provides the clearest available evidence that AI is reshaping the workforce—but it’s complicated.


Research.

This paper examines changes in the labor market for occupations exposed to generative
artificial intelligence using high-frequency administrative data from the largest payroll software
provider in the United States. We present six facts that characterize these shifts. We find that
since the widespread adoption of generative AI, early-career workers (ages 22-25) in the most
AI-exposed occupations have experienced a 13 percent relative decline in employment even after
controlling for firm-level shocks. In contrast, employment for workers in less exposed fields and
more experienced workers in the same occupations has remained stable or continued to grow.
We also find that adjustments occur primarily through employment rather than compensation.
Furthermore, employment declines are concentrated in occupations where AI is more likely to
automate, rather than augment, human labor. Our results are robust to alternative explanations,
such as excluding technology-related firms and excluding occupations amenable to remote work.
These six facts provide early, large-scale evidence consistent with the hypothesis that the AI
revolution is beginning to have a significant and disproportionate impact on entry-level workers
in the American labor market.
Questa voce è stata modificata (2 settimane fa)


77 Malicious Android Apps With 19M Downloads Targeted 831 Banks Worldwide


  • Anatsa malware first emerged in 2020 as an Android banking trojan capable of credential theft, keylogging, and enabling fraudulent transactions.
  • The latest variant of Anatsa targets over 831 financial institutions worldwide, adding new countries like Germany and South Korea, as well as cryptocurrency platforms.
  • Anatsa streamlined payload delivery by replacing dynamic code loading of remote Dalvik Executable (DEX) payloads with direct installation of the Anatsa payload.
  • Anatsa implemented Data Encryption Standard (DES) runtime decryption and device-specific payload restrictions.
  • Many of the decoy Antasta applications have individually exceeded 50,000 downloads.
  • Alongside Anatsa, ThreatLabz identified and reported 77 malicious apps from various malware families to Google, collectively accounting for over 19 million installs.
Questa voce è stata modificata (2 settimane fa)


Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::




Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::




Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::


in reply to Pro

Let Google know what you think about this: docs.google.com/forms/d/e/1FAI…


Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::


#tech


Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::


in reply to Drew

This might also be the beginning of android.

So far, people have been OK with modifying the existing phones to fit their needs. We're slowly approaching the critical inconvenience point beyond which it might be easier to buy OEM parts and start assembling un-googled phones.

in reply to Pro

Let Google know what you think: docs.google.com/forms/d/e/1FAI…


Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::




Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::




Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


cross-posted from: programming.dev/post/36316138

::: spoiler Comments
- Hackernews;
- Lobsters.
:::



Google plans to begin verifying the identity of all developers who distribute apps on Android, even if it's outside the Play Store, starting September 2026


::: spoiler Comments
- Hackernews;
- Lobsters.
:::






Bibliometrie: Wie sie uns alle unterstützen kann


Was ist Bibliometrie überhaupt? Das klingt erstmal nach etwas, das nur Spezialist:innen interessiert, aber das stimmt nicht. In diesem Blogbeitrag geben wir Einblick, Orientierung und Unterstützung durch die TIB zu diesem Thema und zeigen, welche Unterstützungsangebote es von der TIB gibt. Denn Bibliometrie begegnet uns in der Wissenschaft fast überall:

  • Wie oft wird ein Artikel zitiert?
  • Welche Journals sind besonders einflussreich?
  • Wer forscht weltweit zu einem bestimmten Thema?

Bibliometrie umfasst das Forschungs- und Anwendungsfeld, das sich mit der quantitativen Analyse wissenschaftlichen Outputs und dessen Einfluss auseinandersetzt.

Bibliometrische Analysen wenden statistische Methoden auf die Ergebnisse der Forschung an. Sie ermöglichen damit nicht nur Analysen der Publikations- und Forschungsleistung (zum Beispiel Benchmarking und Rankings), sondern schaffen damit Einblicke in Forschungstrends, Netzwerke und den Einfluss des Forschungsoutputs – für Einzelne und für Institutionen.

Warum ist das Thema für alle relevant?

Für Studierende – Orientierung im Publikationsdschungel


Die wissenschaftliche Literatur wächst rasant, im Studium und auch gerade bei der ersten großen Abschlussarbeit stellt sich immer wieder die Frage: Welche Literatur ist in deinem Fachgebiet wichtig und welche Quellen sind wirklich relevant?

Bibliometrisches Wissen hilft,

  • die Kernliteratur in einem Fachgebiet schnell zu finden,
  • wichtige Autor:innen und Zeitschriften zu erkennen und
  • eine fundierte Auswahl für Seminar-, Bachelor- oder Masterarbeiten zu treffen.


Für Forschende – strategisch forschen, vernetzen und belegen


Publizieren ist mehr als nur „fertig schreiben“. Forschende stehen vor der Aufgabe, ihre Arbeiten zielgerichtet in der wissenschaftlichen Landschaft zu platzieren. Bibliometrische Analysen helfen dabei weit über das Thema Sichtbarkeit hinaus:

  • Relevanz prüfen: Erkennen, ob ein Forschungsthema im Trend liegt, wo es Lücken gibt oder welche Aspekte in der Literatur bislang unterrepräsentiert sind.
  • Kooperationen aufbauen: Identifizieren von Forschenden und Institutionen, die ähnliche Fragestellungen bearbeiten – regional wie international.
  • Publikationsstrategie entwickeln: Auswahl der Journals, die nicht nur Reichweite, sondern auch Passung zur Zielgruppe und zum Fachgebiet bieten.


Für Kolleg:innen in der Bibliothek – Forschung aktiv unterstützen


Bibliometrisches Know-how ist nicht nur für Beratungsgespräche zu Impact-Faktoren oder Journal-Auswahl relevant. Gerade beim Bestandsaufbau kann es zu einem wertvollen strategischen Werkzeug werden – besonders dann, wenn Budgets knapp sind und jede Erwerbungsentscheidung gut begründet sein muss.

Durch bibliometrische Analysen lassen sich:

  • Forschungstendenzen frühzeitig erkennen – etwa, welche Themen an der Universität stark wachsen oder in welchen Disziplinen neue Publikationsschwerpunkte entstehen.[1]
  • Kernjournals und Schlüsselpublikationen identifizieren, die für das Fachgebiet unverzichtbar sind.
  • Prioritäten setzen, indem man erkennt, welche Literatur den größten Nutzen für Forschung und Lehre bringt.

So wird bibliometrisches Wissen zu einem der Tools, mit dem Bibliotheken trotz begrenzter Mittel präziser, zukunftsorientierter und bedarfsorientierter handeln können – und sich als strategische Partnerin im Wissenschaftsbetrieb positionieren.

Egal, ob Sie studieren, forschen oder in der Bibliothek arbeiten – bibliometrisches Wissen verschafft Durchblick, eröffnet neue Perspektiven und stärt die eigene wissenschaftliche Arbeit.

Unterstützungsangebote der TIB


In der TIB bieten wir individuelle Beratung im Rahmen von TIBgefragt und Workshops zu folgenden Themen an:

  • Einführung in die Bibliometrie
  • Zitationsdatenbanken verstehen und nutzen (zum Beispiel Scopus, Web of Science, Dimensions)
  • Impact-Faktoren und alternative Metriken richtig interpretieren
  • Journalauswahl und Open-Access-Strategien
  • Visualisierung bibliometrischer Netzwerke (zum Beispiel mit VOSviewer)

Unsere Angebote richten sich an:

  • Studierende (ab Bachelorarbeit aufwärts)
  • Promovierende und Postdocs
  • Forschende und Lehrende
  • Bibliotheksmitarbeitende


Du willst mehr erfahren oder brauchst Unterstützung bei einer konkreten Fragestellung? Dann schau dir unsere aktuellen Beratungsangebote an oder vereinbare direkt einen Beratungstermin.

Kontakt: linna.lu@tib.eu
Beratungstermine: nach Vereinbarung oder über unser Buchungssystem

Aktuell ist eine Webveranstaltung der TIB am 30. September zu den Zitationsdatenbanken Web of Science, Scopus und Dimensions für die Registrierung geöffnet. Hier geht es zum Event.

Fazit: Bibliometrie ist mehr als nur Zählen


Ob bei der Publikationsstrategie, in der Forschungsunterstützung oder bei der Studienarbeit – Bibliometrie liefert Orientierung in der wachsenden Publikationsflut. Und genau dabei helfen wir euch gerne weiter.

[1] Entdeckung von Forschungstrends durch bibliometrische Analyse mit der Dimensions API blog.tib.eu/2023/11/24/entdeck…

#LizenzCCBY40INT #Wissenschaftskommunikation #Forschung #Bibliometrie #Beratung #Datenanalyse #Forschungstrends #Publikationsdaten