L'Abitare come potrebbe essere
L'Abitare come potrebbe essereCarta, S.Jun 2016C+C04 Forme dell'Abitare.1st Edition ed. Foggia, Italy: libria, p. 7-115 p. (About)Research output: Chapter in Book/Report/Conference proceeding›...
View ArticleA comparative study of blood endotoxin detection in haemodialysis patients
A comparative study of blood endotoxin detection in haemodialysis patientsWong, J., Davies, N., Jeraj, H., Vilar, E., Viljoen, A. & Farrington, K.30 Jul 2016In : Journal of Inflammation.13, p....
View ArticleThe impact of Lesson Study on the development of two primary student teachers
The impact of Lesson Study on the development of two primary student teachersMacKintosh, J.24 Oct 2016In : LINK.2, 2Research output: Contribution to journal› ArticleOriginal...
View ArticleAttitudes in Patients with Autosomal Dominant Polycystic Kidney Disease...
Attitudes in Patients with Autosomal Dominant Polycystic Kidney Disease Toward Prenatal Diagnosis and Preimplantation Genetic DiagnosisSwift, O., Vilar, E., Rahman, B., Side, L. & Gale, D. P. 30...
View ArticleEffect of Plastic Deformation on Compliance Curve Based Crack Closure...
Effect of Plastic Deformation on Compliance Curve Based Crack Closure MeasurementLewis, A., Mohin, M., Chrysanthou, A.& Xu, Y. Sep 2016In : Key Engineering Materials.713, p. 240-2434 p.Research...
View ArticleComparison of energy estimates in chronic kidney disease using...
Comparison of energy estimates in chronic kidney disease using doubly-labelled waterSridharan, S., Wong, J., Vilar, E.& Farrington, K. 29 Feb 2016In : Journal of human nutrition and dietetics : the...
View ArticleAssessing cyber-threats in the information environment
Assessing cyber-threats in the information environmentVidalis, S., Jones, A.& Blyth, A. Nov 2004In : Network Security.2004, 11, p. 10-167 p.Research output: Contribution to journal› ArticleOriginal...
View ArticleMeasuring vulnerabilities and their exploitation cycle
Measuring vulnerabilities and their exploitation cycleMorakis, E., Vidalis, S.& Blyth, A. Apr 2003In : Information Security Technical Report.8, 4, p. 45-5511 p.Research output: Contribution to...
View ArticleAn Academic Approach to Digital Forensics
An Academic Approach to Digital ForensicsAngelopoulou, O.& Vidalis, S.2015In : Journal of Information Warfare.13, 4Research output: Contribution to journal› ArticleOriginal...
View ArticleAssessing Identity Theft in the Internet of Things
Assessing Identity Theft in the Internet of ThingsVidalis, S.& Angelopoulou, O.2014In : Journal of IT Governance Practice.2, 1, p. 1521 p.Research output: Contribution to journal› ArticleOriginal...
View ArticleBridging Semantics with Ontologies
Bridging Semantics with OntologiesChowdhurry, T., Tubb, C. & Vidalis, S.2014In : International Journal On Advances in Intelligent Systems.7, 1&2Research output: Contribution to journal›...
View ArticleCloud Computing Storms
Cloud Computing StormsBiggs, S. & Vidalis, S.2010In : International Journal of Intelligent Computing Research.1, 1, p. 6372 p.Research output: Contribution to journal› ArticleOriginal...
View ArticleSecurity through Deception?
Security through Deception?Kazmi, Z. & Vidalis, S.2007In : Journal of Information Systems Security.16, 1Research output: Contribution to journal› ArticleOriginal languageEnglishJournalJournal of...
View ArticleThreat Agents: what InfoSec officers need to know
Threat Agents: what InfoSec officers need to knowVidalis, S.& Jones, A.2005In : Mediterranean Journal of Computers and Networks.1, 2Research output: Contribution to journal› ArticleOriginal...
View ArticleInformation Security and Digital Forensics in the world of Cyber Physical...
Information Security and Digital Forensics in the world of Cyber Physical SystemsJones, A., Vidalis, S.& Abouzakhar, N.Sep 2016Research output: Contribution to conference› PaperOriginal...
View Article‘The Liveliest Medium: Television’s aesthetic relationships with other arts’,...
‘The Liveliest Medium: Television’s aesthetic relationships with other arts’, co-editorship of special issue of Critical Studies in Television (Manchester: Manchester University Press0Peacock, S.2014In...
View ArticleValidating a social media typology with machine learning and focus groups
Validating a social media typology with machine learning and focus groupsSaward, G.& Jefferies, A.26 Oct 2016Proceedings of the 15th European Conference on E-Learning. Novotna, J. & Jancarik,...
View ArticleDigital Learners in Higher Education: Exploring Technology Ownership Patterns...
Digital Learners in Higher Education: Exploring Technology Ownership Patterns and Learning EngagementJefferies, A., Monett-Diaz, D. & Kornbrot, D. 26 Oct 2016Proceedings of the 15th European...
View ArticleCarving Space with Big Data
Carving Space with Big DataCarta, S.2016Research output: Non-textual form› DesignOriginal languageEnglishStatePublished - 2016
View ArticleImproved identification of the solution space of aerosol microphysical...
Improved identification of the solution space of aerosol microphysical properties derived from the inversion of profiles of lidar optical data, part 1: theoryKolgotin, A., Mueller, D., Chemyakin, E. V....
View Article