Search concepts
|
Selected filters
|
- 17,200 - 17,250 out of 69,333 results
Search results
-
Sedimentation field-flow fractionation as a tool for the study of milk protein-stabilized model oil-in-water emulsions: effect of protein concentration and homogenization pressure
Kenta, S., Raikos, V., Kapolos, J., Koliadima, A. & Karaiskakis, G., 2013, In: Journal of Liquid Chromatography and Related Technologies. 36, 3, p. 288-303 16 p.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
Sedimentary geology of the Middle Carboniferous of the Donbas region (Dniepr-Donets basin, Ukraine)
van Hinsbergen, D. J. J., Abels, H. A., Bosch, W., Boekhout, F., Kitchka, A., Hamers, M., van der Meer, D. G., Geluk, M. & Stephenson, R. A., 20 Mar 2015, In: Scientific Reports. 5, 8 p., 9099.Research output: Contribution to journal › Article › peer-review
Open AccessFile5 Citations (Scopus)5 Downloads (Pure) -
Sedimentary flow units in hydrocarbon reservoirs: Some shortcomings and a case for high-resolution permeability data
Hurst, A., 7 Apr 2009, The Geological Modelling of Hydrocarbon Reservoirs and Outcrop Analogues. Flint, S. S. & Bryant, I. D. (eds.). Wiley, p. 190-204 15 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
7 Citations (Scopus) -
Sedimentary evidence of intense hurricane strikes from New Jersey
Donnelly, JP., Roll, S., Wengren, M., Butler, J. E., Lederer, R. & Webb, T., Jul 2001, In: Geology. 29, 7, p. 615-618 4 p.Research output: Contribution to journal › Article › peer-review
151 Citations (Scopus) -
Sedimentary evidence for moderate mantle temperature anomalies associated with hotspot volcanism
Clift, P. D., 2005, Plumes, Plates and Paradigms, Geological Society of America, special paper 388. Plumes, Plates and Paradigms, Geological Society of America, special paper 388, p. 279-287 8 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
14 Citations (Scopus) -
Sedimentary evidence for enhanced hydrological cycling in response to rapid carbon release during the early Toarcian oceanic anoxic event
Izumi, K., Kemp, D. B., Itamiya, S. & Inui, M., 1 Jan 2018, In: Earth and Planetary Science Letters. 481, p. 162-170 9 p.Research output: Contribution to journal › Letter › peer-review
Open AccessFile39 Citations (Scopus)5 Downloads (Pure) -
Sedimentary basin tectonics from the Black Sea and Caucasus to the Arabian Platform: introduction
Sosson, M., Kaymakci, N. & Stephenson, R., 2010, In: Special Publication - Geological Society of London. 340Research output: Contribution to journal › Article › peer-review
22 Citations (Scopus) -
Sedimentary basins and basement highs beneath the polar shelf north of Axel Heiberg and Meighen Islands
Forsyth, D. A., Asudeh, I., White, D., Jackson, R., Stephenson, R. A., Embry, A. F. & Argyle, M., Mar 1998, In: Bulletin of Canadian Petroleum Geology. 46, 1, p. 12-29 18 p.Research output: Contribution to journal › Article › peer-review
9 Citations (Scopus) -
Sedimentary architecture of a canyon-style fairway feeding a deep-water clastic system, the Miocene Cingoz Formation, southern Turkey: significance for reservoir characterisation and modelling
Satur, N., Kelling, G., Cronin, B. T., Hurst, A. & Gurbuz, K., 2005, In: Sedimentary Geology. 173, p. 91-119 29 p.Research output: Contribution to journal › Article
37 Citations (Scopus) -
Sedimentary and structural controls on seismogenic slumping within mass transport deposits from the Dead Sea basin
Alsop, G. I., Marco, S., Weinberger, R. & Levi, T., Oct 2016, In: Sedimentary Geology. 344, p. 71-90 20 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile48 Citations (Scopus)10 Downloads (Pure) -
Security requirements for IP over Satellite DVB networks
Iyenger, S., Cruickshank, H., Pillai, P., Fairhurst, G. & Duquerroy, L., Jun 2007, p. 1-6. 6 p.Research output: Contribution to conference › Other
14 Citations (Scopus) -
Security Issues in OAuth 2.0 SSO Implementations
Li, W. & Mitchell, C., 14 Oct 2014, International Conference on Information Security. Chow, SSM., Camenisch, J., Hui, LCK. & Yui, SM. (eds.). Cham: Springer , p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile33 Citations (Scopus)118 Downloads (Pure) -
Security Forces and Sexual Violence: A Cross-National Analysis of a Principal-Agent Argument
Butler, C. K., Gluch, T. & Mitchell, N. J., Nov 2007, In: Journal of Peace Research. 44, 6, p. 669-687 19 p.Research output: Contribution to journal › Article › peer-review
80 Citations (Scopus) -
Security design, Incentives, and Islamic Microfinance: Cross country evidence
Liu, F. H., Fan, Y., John, K. & Tamannid, L., 2018, (Unpublished).Research output: Working paper
-
Security design, incentives, and Islamic microfinance: Cross country evidence
Fan, Y., John, K., Liu, F. H. & Tamannid, L., Sep 2019, In: Journal of International Financial Markets, Institutions and Money. 62, p. 264-280 17 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile2 Citations (Scopus)2 Downloads (Pure) -
Security at the Source: Embedding Journalists as a Superior Strategy to Military Censorship
Brandenburg, H., 2007, In: Journalism Studies. 8, 6, p. 948-963 16 p.Research output: Contribution to journal › Article › peer-review
74 Citations (Scopus) -
Security as an Emergent Property of a Complex Adaptive System
Lekunze, M., 16 Oct 2019, In: Stability: International Journal of Security & Development. 8, 1, p. 6Research output: Contribution to journal › Article › peer-review
Open AccessFile6 Downloads (Pure) -
Security and Privacy in V2X Communications: How Collaborative Learning can Improve Cybersecurity?
Sharma, P., Vohra, D. & Rathore, S., 16 Apr 2022, (Accepted/In press) In: IEEE Network.Research output: Contribution to journal › Article › peer-review
Open AccessFile11 Downloads (Pure) -
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE Computer Society, 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Security analytics: bringing science to security management
Pym, D. J. & Shiu, S., 2010, In: IISP Pulse. 4, Summer 2010, p. 12-13 2 p.Research output: Contribution to journal › Article › peer-review
-
Security Analysis Using Subjective Attack Trees
Al-Hadhrami, N., Collinson, M. & Oren, N., 4 Feb 2021, Innovative Security Solutions for Information Technology and Communications: SecITC 2020. Lecture Notes in Computer Science. Maimut, D., Oprina, A-G. & Sauveron, D. (eds.). Springer , Vol. 12596. p. 288-301 14 p. (Lecture Notes in Computer Science; vol. 12596).Research output: Chapter in Book/Report/Conference proceeding › Published conference contribution
Open AccessFile -
Security, privacy and trust of user-centric solutions
Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In: Future Generation Computer Systems. 80, p. 417-420 4 p.Research output: Contribution to journal › Article › peer-review
8 Citations (Scopus) -
Security, privacy and safety evaluation of dynamic and static fleets of drones
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC). p. 1-12 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
23 Citations (Scopus) -
Security, Nationalism, and the Pursuit of Nuclear Weapons and Missiles: South Korean Case, 1970-82
Kim, S. Y., 2001, In: Diplomacy & Statecraft. 12, 4, p. 53-80 27 p.Research output: Contribution to journal › Article › peer-review
15 Citations (Scopus) -
Securitization of the Unemployed and Counter-Conductive Resistance in Tunisia
Han, S., 1 Apr 2021, In: Security Dialogue. 52, 2, p. 156-173 18 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile1 Citation (Scopus) -
Securing the Transatlantic Maritime Supply Chains from Counterterrorism: EU–U.S. Cooperation and the Emergence of a Transatlantic Customs Security Regime
Anagnostakis, D., May 2016, In: Studies in Conflict and Terrorism. 39, 5, p. 451-471 21 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile1 Citation (Scopus)6 Downloads (Pure) -
Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations
Couzigou, I., Apr 2018, In: International Review of Law, Computers & Technology. 32, 1, p. 37-57 21 p.Research output: Contribution to journal › Article › peer-review
Open AccessFile3 Citations (Scopus)5 Downloads (Pure) -
Securing a minority language: the Veps of North-Western Russia
Siragusa, L., 2010, Humanizing Security in the Arctic. Alberta, Canada: Canadian Circumpolar Institute Press, p. 257-275 19 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Securing Access to Climate Change Technologies: Answers and Questions
Brown, A., 9 Jun 2010, In: University of Edinburgh School of Law Working Paper Series. 34 p., 2010/21.Research output: Contribution to journal › Article › peer-review
-
Securing access to climate change technologies: insights from the intellectual property/human rights interface
Brown, A., 2009.Research output: Contribution to conference › Unpublished paper › peer-review
-
Secure Satellite Reliable Multicast
Ramachadran, R. & Fairhurst, G., 2004.Research output: Contribution to conference › Other
-
Secure quantum communication using classical correlated channel
Danulussi Alves Costa, D., de Almeida, N. G. & Villas-Boas, C. J., Oct 2016, In: Quantum Information Processing. 15, 10, p. 4303–4311 8 p.Research output: Contribution to journal › Article › peer-review
7 Citations (Scopus) -
Secure mobile edge server placement using multi-agent reinforcement learning
Kasi, M. K., Ghazalah, S. A., Akram, R. N. & Sauveron, D., 30 Aug 2021, In: Electronics (Switzerland). 10, 17, 19 p., 2098.Research output: Contribution to journal › Article › peer-review
Open AccessFile1 Downloads (Pure) -
Secure information transfer based on computing reservoir
Szmoski, R. M., Ferrari, F. A. S., Pinto, S. E. D. S., Baptista, M. S. & Viana, R. L., Apr 2013, In: Physics Letters A. 377, 10-11, p. 760-765 6 p.Research output: Contribution to journal › Article › peer-review
Open Access3 Citations (Scopus) -
Secure Communication Based on Hyperchaotic Chen System with Time-Delay
Ren, H-P., Bai, C., Huang, Z-Z. & Grebogi, C., May 2017, In: International Journal of Bifurcation and Chaos. 27, 5, 15 p., 1750076.Research output: Contribution to journal › Article › peer-review
Open AccessFile18 Citations (Scopus)8 Downloads (Pure) -
Secure clouds forensic investigative architecture for social network cloud
Singh, S., Sharma, P. K. & Park, J. H., 1 Sep 2016, In: Advanced Science Letters. 22, 9, p. 2461-2464 4 p.Research output: Contribution to journal › Article › peer-review
2 Citations (Scopus) -
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements
Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE Computer Society, 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Citations (Scopus) -
Secure Application Execution in Mobile Devices
Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer , p. 417-438 22 p. (Lecture Notes in Computer Science; vol. 9100).Research output: Chapter in Book/Report/Conference proceeding › Chapter
2 Citations (Scopus) -
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R. P., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE Computer Society, 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
32 Citations (Scopus) -
Secure and Trusted Application Execution on Embedded Devices
Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, Innovative Security Solutions for Information Technology and Communications (SECITC 2015). Bica, I., Naccache, D. & Simion, E. (eds.). Springer , p. 3-24 22 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
Secular Trends In Baseline Characteristics, Treatment Retention And Response Rates In 27189 Bio-Naive Axial Spondyloarthritis Patients Initiating Tnfi - Results From The Eurospa Collaboration
Ornbjerg, L. M., Christiansen, S. N., Rasmussen, S. H., Loft, A. G., Lindstrom, U., Zavada, J., Iannone, F., Onen, F., Nissen, M. J., Michelsen, B., Santos, M. J., Macfarlane, G., Nordstrom, D., Pombo-Suarez, M., Codreanu, C., Tomsic, M., Van der Horst-Bruinsma, I., Gudbjornsson, B., Askling, J., Glintborg, B. & 15 others, , 1 Jun 2021, In: Annals of the Rheumatic Diseases. 80, p. 217-218 2 p.Research output: Contribution to journal › Abstract › peer-review
-
Secular Mindfulness and the possibility of naturalistic spirituality
Nixon, G., 25 Feb 2017.Research output: Contribution to conference › Unpublished paper
-
Secular Mindfulness?
Nixon, G., 18 Jun 2017.Research output: Contribution to conference › Unpublished paper
-
Secularization or Alternative Faith? Trends and Conceptions of Spirituality in Northern Europe
Kasselstrand, I., 16 Jul 2021, (Accepted/In press) In: Journal of Religion in Europe.Research output: Contribution to journal › Article › peer-review
Open AccessFile5 Downloads (Pure) -
Secularization in the UK and USA
Bruce, S., 1 Apr 2010, Secularization in the Christian world. Brown, C. & Snape, M. (eds.). Farnham, United Kingdom: Ashgate , p. 205-218 14 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secularization and the impotence of individualized religion
Bruce, S., 2006, In: The Hedgehog Review. Spring and summer, p. 35-45 11 p.Research output: Contribution to journal › Article › peer-review
-
Secularization and Economic Models of Religious Behavior
Bruce, S., Jan 2011, The Oxford Handbook of the Economics of Religion. McCleary, R. M. (ed.). Oxford University Press (OUP)Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secularization and church growth in the UK
Bruce, S., 2013, In: Journal of Religion in Europe. 6, 3, p. 273-296 24 p.Research output: Contribution to journal › Article › peer-review
10 Citations (Scopus) -
Secularization among Immigrants in Scandinavia: Religiosity across Generations and Duration of Residence
Kasselstrand, I. & Mahmoudi, S., 1 Dec 2020, In: Social Compass. 67, 4, p. 617-636 19 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Secularization
Bruce, S., 13 Apr 2010, The new Blackwell companion to the sociology of religion. Turner, B. S. (ed.). Oxford: Wiley-Blackwell , p. 125-140 16 p. (Blackwell Companions to Sociology).Research output: Chapter in Book/Report/Conference proceeding › Chapter