• Security analytics on asset vulnerability for information abstraction and risk analysis more
  • Security and performance evaluation of master node protocol based reputation blockchain in the bitcoin network more
  • Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network. more
  • Security beliefs and barriers for novice Internet users more
  • Security Concerns in Cooperative Intelligent Transportation Systems more
  • Security in Wireless Sensor Networks Based On Service-Oriented Architecture more
  • Security Issues in a SOA-based Provenance System more
  • Security risk assessment in systems of systems. more
  • Sedation in the Critically Ill Surgical Patient more
  • Sedation in the critically ill surgical patient more
  • Sedimentary Analysis of Construction Materials more
  • Sedimentary and Tectonic Architecture of a Large Push Moraine: A Case Study From Hagafellsjökull-Eystri, Iceland more
  • See Me, Know Me – Cultural Expressions of Cameroonian Women more
  • See the Forest, not Just the Trees: The Misdirected Dreams of UK Community Broadcasters more
  • Seeing Isn’t Believing: The Fallacy of Vision in The Ipcress File and Skyfall more
  • Seeing lightness in the dark. more
  • Seeing the Person Not the Diagnosis – a Humanised Approach to Dementia Care Education more
  • Seeing the world through others' minds: Inferring social context from behaviour. more
  • Seekers in the shadowscape–an archaeology of shade more
  • Seeking an Educational Utopia: An Alternative Model for Evaluating Student Learning Gain more
  • Seeking effective approaches to elder abuse in institutional settings more
  • Seeking ethical approval for action research and participatory methodologies: consideration of the ethical dilemmas and strategies to successfully navigate the ethical review process more
  • Seeking ethical approval for action research: consideration of the ethical dilemmas and strategies to successfully navigate the ethical review process more
  • Seeking the truth: The use of Delphi studies for IS research more
  • Seeking unmediated political information in a mediated environment: The uses and gratifications of political parties' e-newsletters more

Previous Next