Outputs
Journal Articles
- Seasonal variation in estuarine phytoplankton viability and its relationship with carbon dynamics in the Baltic Sea more
- Seasonality of viral encephalitis and associated environmental risk factors in Son la and Thai Binh Provinces in Vietnam from 2004 to 2013 more
- Seasons of Hope: intergenerational ‘storylistening’ among demobilised guerrilla in Colombia more
- Second Homes and the (Re)production of Cornish Nationalism more
- Second phase transnationalism: reflections on launching the SCMS transnational cinemas scholarly interest group more
- Second Special Edition for Excellence in Teaching and Learning Project Management more
- Second victim phenomenon: impact on healthcare professionals,organizationalresponsibilityandsupport strategies more
- Secondary organic aerosol formation and composition from the photo-oxidation of methyl chavicol (estragole) more
- Secondary transfer of patients more
- Secondary Traumatic Stress in Police Officers Investigating Childhood Sexual Abuse more
- Secrecy Analysis in SWIPT Systems over Generalized-K Fading Channels more
- Secrecy Analysis of Generalized Space-Shift Keying Aided Visible Light Communication more
- Secrecy and Insurgency: Socialities and Knowledge Practices in Guatemala more
- Secrecy performance analysis of MISO visible light communication systems with spatial modulation more
- Sector differences in conference facility refurbishment more
- Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography more
- Secure Millimeter Wave Cloud Radio Access Networks Relying on Microwave Multicast Fronthaul more
- Secure Multiantenna Transmission With an Unknown Eavesdropper: Power Allocation and Secrecy Outage Analysis more
- Securing Blockchain Transactions Using Quantum Teleportation and Quantum Digital Signature more
- Securing the next generation: enhancing e-safety awareness among young people more
- Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain more
- Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network more
- Security beliefs and barriers for novice Internet users more
- Security for sale! The visual rhetoric of marketing counter-terrorism technologies more
- Security in product lifecycle of IoT devices: A survey more