Search concepts
|
Selected filters
|
- 18,300 - 18,350 out of 74,132 results
Search results
-
Sediment fill and fault activity in the Mesta Basin (SW Bulgaria)
McCann, T., Siemes, A., Fischer, A., Ebinghaus, A. & Temme, A., Dec 2010, In: Neues Jahrbuch für Geologie und Paläontologie - Abhandlungen. 258, 3, p. 365-379 15 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Sediment entrainment and depletion from patches of fine material in a gravel-bed river
Vericat, D., Batalla, R. J. & Gibbins, C. N., Nov 2008, In: Water Resources Research. 44, 11, 15 p.Research output: Contribution to journal › Article
44 Citations (Scopus) -
Sediment distribution and architecture around a bathymetrically complex basin: an example from the Eastern Champsaur Basin, SE France
Vinnels, J. S., Butler, R. W. H., McCaffrey, W. D. & Lickorish, W. H., Mar 2010, In: Journal of Sedimentary Research. 80, 3, p. 216-235 20 p.Research output: Contribution to journal › Article › peer-review
12 Citations (Scopus) -
Sediment community responses to marine vs. terrigenous organic matter in a submarine canyon
Hunter, W. R., Jamieson, A., Huvenne, V. A. I. & Witte, U., 8 Jan 2013, In: Biogeosciences. 10, 1, p. 67-80 14 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile28 Citations (Scopus)8 Downloads (Pure) -
Sedimentation field-flow fractionation as a tool for the study of milk protein-stabilized model oil-in-water emulsions: effect of protein concentration and homogenization pressure
Kenta, S., Raikos, V., Kapolos, J., Koliadima, A. & Karaiskakis, G., 2013, In: Journal of Liquid Chromatography and Related Technologies. 36, 3, p. 288-303 16 p.Research output: Contribution to journal › Article › peer-review
6 Citations (Scopus) -
Sedimentary response to a tectonically induced sea-level fall in a shallow back-arc basin: The Mulichinco Formation (Lower Cretaceous), Neuquén Basin, Argentina
Schwarz, E., Spalletti, L. A. & Howell, J. A., Feb 2006, In: Sedimentology. 53, 1, p. 55-81 27 p.Research output: Contribution to journal › Article › peer-review
51 Citations (Scopus) -
Sedimentary geology of the Middle Carboniferous of the Donbas region (Dniepr-Donets basin, Ukraine)
van Hinsbergen, D. J. J., Abels, H. A., Bosch, W., Boekhout, F., Kitchka, A., Hamers, M., van der Meer, D. G., Geluk, M. & Stephenson, R. A., 20 Mar 2015, In: Scientific Reports. 5, 8 p., 9099.Research output: Contribution to journal › Article › peer-review
Open AccessFile9 Citations (Scopus)5 Downloads (Pure) -
Sedimentary flow units in hydrocarbon reservoirs: Some shortcomings and a case for high-resolution permeability data
Hurst, A., 7 Apr 2009, The Geological Modelling of Hydrocarbon Reservoirs and Outcrop Analogues. Flint, S. S. & Bryant, I. D. (eds.). Wiley, p. 190-204 15 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
7 Citations (Scopus) -
Sedimentary evolution and depositional architecture of a lowstand sequence set: The Lower Cretaceous Mulichinco Formation, Neuquén Basin, Argentina
Schwarz, E. & Howell, J. A., 2005, In: Geological Society Special Publication. 252, p. 109-138 30 p.Research output: Contribution to journal › Article › peer-review
55 Citations (Scopus) -
Sedimentary evidence of intense hurricane strikes from New Jersey
Donnelly, JP., Roll, S., Wengren, M., Butler, J. E., Lederer, R. & Webb, T., Jul 2001, In: Geology. 29, 7, p. 615-618 4 p.Research output: Contribution to journal › Article › peer-review
167 Citations (Scopus) -
Sedimentary evidence for moderate mantle temperature anomalies associated with hotspot volcanism
Clift, P. D., 2005, Plumes, Plates and Paradigms, Geological Society of America, special paper 388. Plumes, Plates and Paradigms, Geological Society of America, special paper 388, p. 279-287 8 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
20 Citations (Scopus) -
Sedimentary evidence for enhanced hydrological cycling in response to rapid carbon release during the early Toarcian oceanic anoxic event
Izumi, K., Kemp, D. B., Itamiya, S. & Inui, M., 1 Jan 2018, In: Earth and Planetary Science Letters. 481, p. 162-170 9 p.Research output: Contribution to journal › Letter › peer-review
Open AccessFile63 Citations (Scopus)5 Downloads (Pure) -
Sedimentary Environments: Shoreline and shoreface deposits
Howell, J., 2005, Encyclopedia of Geology. Elsevier Inc, p. 570-579 10 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
6 Citations (Scopus) -
Sedimentary basin tectonics from the Black Sea and Caucasus to the Arabian Platform: introduction
Sosson, M., Kaymakci, N. & Stephenson, R., 2010, In: Special Publication - Geological Society of London. 340Research output: Contribution to journal › Article › peer-review
22 Citations (Scopus) -
Sedimentary basins and basement highs beneath the polar shelf north of Axel Heiberg and Meighen Islands
Forsyth, D. A., Asudeh, I., White, D., Jackson, R., Stephenson, R. A., Embry, A. F. & Argyle, M., Mar 1998, In: Bulletin of Canadian Petroleum Geology. 46, 1, p. 12-29 18 p.Research output: Contribution to journal › Article › peer-review
9 Citations (Scopus) -
Sedimentary architecture of a canyon-style fairway feeding a deep-water clastic system, the Miocene Cingoz Formation, southern Turkey: significance for reservoir characterisation and modelling
Satur, N., Kelling, G., Cronin, B. T., Hurst, A. & Gurbuz, K., 2005, In: Sedimentary Geology. 173, p. 91-119 29 p.Research output: Contribution to journal › Article
38 Citations (Scopus) -
Sedimentary and structural controls on seismogenic slumping within mass transport deposits from the Dead Sea basin
Alsop, G. I., Marco, S., Weinberger, R. & Levi, T., Oct 2016, In: Sedimentary Geology. 344, p. 71-90 20 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile64 Citations (Scopus)10 Downloads (Pure) -
Security requirements for IP over Satellite DVB networks
Iyenger, S., Cruickshank, H., Pillai, P., Fairhurst, G. & Duquerroy, L., Jun 2007, p. 1-6. 6 p.Research output: Contribution to conference › Other
17 Citations (Scopus) -
Security Issues in OAuth 2.0 SSO Implementations
Li, W. & Mitchell, C., 14 Oct 2014, International Conference on Information Security. Chow, SSM., Camenisch, J., Hui, LCK. & Yui, SM. (eds.). Cham: Springer , p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile38 Citations (Scopus)119 Downloads (Pure) -
Security in Cameroon: a growing risk of persistent insurgency
Lekunze, M. & Page, B., 3 Oct 2022, In: Canadian Journal of African Studies.Research output: Contribution to journal › Article › peer-review
-
Security Forces and Sexual Violence: A Cross-National Analysis of a Principal-Agent Argument
Butler, C. K., Gluch, T. & Mitchell, N. J., Nov 2007, In: Journal of Peace Research. 44, 6, p. 669-687 19 p.Research output: Contribution to journal › Article › peer-review
93 Citations (Scopus) -
Security design, Incentives, and Islamic Microfinance: Cross country evidence
Liu, F. H., Fan, Y., John, K. & Tamannid, L., 2018, (Unpublished).Research output: Working paper
-
Security design, incentives, and Islamic microfinance: Cross country evidence
Fan, Y., John, K., Liu, F. H. & Tamannid, L., Sep 2019, In: Journal of International Financial Markets, Institutions and Money. 62, p. 264-280 17 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile6 Citations (Scopus)2 Downloads (Pure) -
Security at the Source: Embedding Journalists as a Superior Strategy to Military Censorship
Brandenburg, H., 2007, In: Journalism Studies. 8, 6, p. 948-963 16 p.Research output: Contribution to journal › Article › peer-review
78 Citations (Scopus) -
Security as an Emergent Property of a Complex Adaptive System
Lekunze, M., 16 Oct 2019, In: Stability: International Journal of Security & Development. 8, 1, p. 6Research output: Contribution to journal › Article › peer-review
Open AccessFile6 Downloads (Pure) -
Security and Privacy in V2X Communications: How Collaborative Learning can Improve Cybersecurity?
Sharma, P., Vohra, D. & Rathore, S., 13 Jul 2022, In: IEEE Network. 36, 3, p. 32-39 8 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile17 Downloads (Pure) -
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE Computer Society, 8 p.Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
9 Citations (Scopus) -
Security analytics: bringing science to security management
Pym, D. J. & Shiu, S., 2010, In: IISP Pulse. 4, Summer 2010, p. 12-13 2 p.Research output: Contribution to journal › Article › peer-review
-
Security Analysis Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M. & Oren, N., 4 Feb 2021, Innovative Security Solutions for Information Technology and Communications: SecITC 2020. Lecture Notes in Computer Science. Maimut, D., Oprina, A-G. & Sauveron, D. (eds.). Springer , Vol. 12596. p. 288-301 14 p. (Lecture Notes in Computer Science; vol. 12596).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile -
Security, privacy and trust of user-centric solutions
Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In: Future Generation Computer Systems. 80, p. 417-420 4 p.Research output: Contribution to journal › Article › peer-review
11 Citations (Scopus) -
Security, privacy and safety evaluation of dynamic and static fleets of drones
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC). p. 1-12 12 p.Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
44 Citations (Scopus) -
Security, Nationalism, and the Pursuit of Nuclear Weapons and Missiles: South Korean Case, 1970-82
Kim, S. Y., 2001, In: Diplomacy & Statecraft. 12, 4, p. 53-80 27 p.Research output: Contribution to journal › Article › peer-review
17 Citations (Scopus) -
Securitization of the Unemployed and Counter-Conductive Resistance in Tunisia
Han, S., 1 Apr 2021, In: Security Dialogue. 52, 2, p. 156-173 18 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus) -
Securing the Transatlantic Maritime Supply Chains from Counterterrorism: EU–U.S. Cooperation and the Emergence of a Transatlantic Customs Security Regime
Anagnostakis, D., May 2016, In: Studies in Conflict and Terrorism. 39, 5, p. 451-471 21 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus)6 Downloads (Pure) -
Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations
Couzigou, I., Apr 2018, In: International Review of Law, Computers & Technology. 32, 1, p. 37-57 21 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile8 Citations (Scopus)8 Downloads (Pure) -
Securing a minority language: the Veps of North-Western Russia
Siragusa, L., 2010, Humanizing Security in the Arctic. Alberta, Canada: Canadian Circumpolar Institute Press, p. 257-275 19 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Securing Access to Climate Change Technologies: Answers and Questions
Brown, A., 9 Jun 2010, In: University of Edinburgh School of Law Working Paper Series. 34 p., 2010/21.Research output: Contribution to journal › Article › peer-review
-
Securing access to climate change technologies: insights from the intellectual property/human rights interface
Brown, A., 2009.Research output: Contribution to conference › Unpublished paper › peer-review
-
Secure Satellite Reliable Multicast
Ramachadran, R. & Fairhurst, G., 2004.Research output: Contribution to conference › Other
-
Secure quantum communication using classical correlated channel
Danulussi Alves Costa, D., de Almeida, N. G. & Villas-Boas, C. J., Oct 2016, In: Quantum Information Processing. 15, 10, p. 4303–4311 8 p.Research output: Contribution to journal › Article › peer-review
7 Citations (Scopus) -
Secure mobile edge server placement using multi-agent reinforcement learning
Kasi, M. K., Ghazalah, S. A., Akram, R. N. & Sauveron, D., 30 Aug 2021, In: Electronics (Switzerland). 10, 17, 19 p., 2098.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus)5 Downloads (Pure) -
Secure information transfer based on computing reservoir
Szmoski, R. M., Ferrari, F. A. S., Pinto, S. E. D. S., Baptista, M. S. & Viana, R. L., Apr 2013, In: Physics Letters A. 377, 10-11, p. 760-765 6 p.Research output: Contribution to journal › Article › peer-review
Open Access3 Citations (Scopus) -
Secure Communication Based on Hyperchaotic Chen System with Time-Delay
Ren, H-P., Bai, C., Huang, Z-Z. & Grebogi, C., May 2017, In: International Journal of Bifurcation and Chaos. 27, 5, 15 p., 1750076.Research output: Contribution to journal › Article › peer-review
Open AccessFile24 Citations (Scopus)8 Downloads (Pure) -
Secure clouds forensic investigative architecture for social network cloud
Singh, S., Sharma, P. K. & Park, J. H., 1 Sep 2016, In: Advanced Science Letters. 22, 9, p. 2461-2464 4 p.Research output: Contribution to journal › Article › peer-review
2 Citations (Scopus) -
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE Computer Society, 9 p.Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
11 Citations (Scopus) -
Secure Application Execution in Mobile Devices
Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer , p. 417-438 22 p. (Lecture Notes in Computer Science; vol. 9100).Research output: Chapter in Book/Report/Conference proceeding › Chapter
2 Citations (Scopus) -
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R. P., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE Computer Society, 10 p.Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
44 Citations (Scopus) -
Secure and Trusted Application Execution on Embedded Devices
Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, Innovative Security Solutions for Information Technology and Communications (SECITC 2015). Bica, I., Naccache, D. & Simion, E. (eds.). Springer , p. 3-24 22 p.Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
3 Citations (Scopus) -
Secular Trends In Baseline Characteristics, Treatment Retention And Response Rates In 27189 Bio-Naive Axial Spondyloarthritis Patients Initiating Tnfi - Results From The Eurospa Collaboration
Ornbjerg, L. M., Christiansen, S. N., Rasmussen, S. H., Loft, A. G., Lindstrom, U., Zavada, J., Iannone, F., Onen, F., Nissen, M. J., Michelsen, B., Santos, M. J., Macfarlane, G., Nordstrom, D., Pombo-Suarez, M., Codreanu, C., Tomsic, M., Van der Horst-Bruinsma, I., Gudbjornsson, B., Askling, J., Glintborg, B., & 15 others , 1 Jun 2021, In: Annals of the Rheumatic Diseases. 80, p. 217-218 2 p.Research output: Contribution to journal › Abstract › peer-review
-
Secular Mindfulness and the possibility of naturalistic spirituality
Nixon, G., 25 Feb 2017.Research output: Contribution to conference › Unpublished paper