Quantcast
Channel: Research Database, University of Hertfordshire: RSS Feed
Browsing all 8343 articles
Browse latest View live

L'Abitare come potrebbe essere

L'Abitare come potrebbe essereCarta, S.Jun 2016C+C04 Forme dell'Abitare.1st Edition ed. Foggia, Italy: libria, p. 7-115 p. (About)Research output: Chapter in Book/Report/Conference proceeding›...

View Article


A comparative study of blood endotoxin detection in haemodialysis patients

A comparative study of blood endotoxin detection in haemodialysis patientsWong, J., Davies, N., Jeraj, H., Vilar, E., Viljoen, A. & Farrington, K.30 Jul 2016In : Journal of Inflammation.13, p....

View Article


The impact of Lesson Study on the development of two primary student teachers

The impact of Lesson Study on the development of two primary student teachersMacKintosh, J.24 Oct 2016In : LINK.2, 2Research output: Contribution to journal› ArticleOriginal...

View Article

Attitudes in Patients with Autosomal Dominant Polycystic Kidney Disease...

Attitudes in Patients with Autosomal Dominant Polycystic Kidney Disease Toward Prenatal Diagnosis and Preimplantation Genetic DiagnosisSwift, O., Vilar, E., Rahman, B., Side, L. & Gale, D. P. 30...

View Article

Effect of Plastic Deformation on Compliance Curve Based Crack Closure...

Effect of Plastic Deformation on Compliance Curve Based Crack Closure MeasurementLewis, A., Mohin, M., Chrysanthou, A.& Xu, Y. Sep 2016In : Key Engineering Materials.713, p. 240-2434 p.Research...

View Article


Comparison of energy estimates in chronic kidney disease using...

Comparison of energy estimates in chronic kidney disease using doubly-labelled waterSridharan, S., Wong, J., Vilar, E.& Farrington, K. 29 Feb 2016In : Journal of human nutrition and dietetics : the...

View Article

Assessing cyber-threats in the information environment

Assessing cyber-threats in the information environmentVidalis, S., Jones, A.& Blyth, A. Nov 2004In : Network Security.2004, 11, p. 10-167 p.Research output: Contribution to journal› ArticleOriginal...

View Article

Measuring vulnerabilities and their exploitation cycle

Measuring vulnerabilities and their exploitation cycleMorakis, E., Vidalis, S.& Blyth, A. Apr 2003In : Information Security Technical Report.8, 4, p. 45-5511 p.Research output: Contribution to...

View Article


An Academic Approach to Digital Forensics

An Academic Approach to Digital ForensicsAngelopoulou, O.& Vidalis, S.2015In : Journal of Information Warfare.13, 4Research output: Contribution to journal› ArticleOriginal...

View Article


Assessing Identity Theft in the Internet of Things

Assessing Identity Theft in the Internet of ThingsVidalis, S.& Angelopoulou, O.2014In : Journal of IT Governance Practice.2, 1, p. 1521 p.Research output: Contribution to journal› ArticleOriginal...

View Article

Bridging Semantics with Ontologies

Bridging Semantics with OntologiesChowdhurry, T., Tubb, C. & Vidalis, S.2014In : International Journal On Advances in Intelligent Systems.7, 1&2Research output: Contribution to journal›...

View Article

Cloud Computing Storms

Cloud Computing StormsBiggs, S. & Vidalis, S.2010In : International Journal of Intelligent Computing Research.1, 1, p. 6372 p.Research output: Contribution to journal› ArticleOriginal...

View Article

Security through Deception?

Security through Deception?Kazmi, Z. & Vidalis, S.2007In : Journal of Information Systems Security.16, 1Research output: Contribution to journal› ArticleOriginal languageEnglishJournalJournal of...

View Article


Threat Agents: what InfoSec officers need to know

Threat Agents: what InfoSec officers need to knowVidalis, S.& Jones, A.2005In : Mediterranean Journal of Computers and Networks.1, 2Research output: Contribution to journal› ArticleOriginal...

View Article

Information Security and Digital Forensics in the world of Cyber Physical...

Information Security and Digital Forensics in the world of Cyber Physical SystemsJones, A., Vidalis, S.& Abouzakhar, N.Sep 2016Research output: Contribution to conference› PaperOriginal...

View Article


‘The Liveliest Medium: Television’s aesthetic relationships with other arts’,...

‘The Liveliest Medium: Television’s aesthetic relationships with other arts’, co-editorship of special issue of Critical Studies in Television (Manchester: Manchester University Press0Peacock, S.2014In...

View Article

Validating a social media typology with machine learning and focus groups

Validating a social media typology with machine learning and focus groupsSaward, G.& Jefferies, A.26 Oct 2016Proceedings of the 15th European Conference on E-Learning. Novotna, J. & Jancarik,...

View Article


Digital Learners in Higher Education: Exploring Technology Ownership Patterns...

Digital Learners in Higher Education: Exploring Technology Ownership Patterns and Learning EngagementJefferies, A., Monett-Diaz, D. & Kornbrot, D. 26 Oct 2016Proceedings of the 15th European...

View Article

Carving Space with Big Data

Carving Space with Big DataCarta, S.2016Research output: Non-textual form› DesignOriginal languageEnglishStatePublished - 2016

View Article

Improved identification of the solution space of aerosol microphysical...

Improved identification of the solution space of aerosol microphysical properties derived from the inversion of profiles of lidar optical data, part 1: theoryKolgotin, A., Mueller, D., Chemyakin, E. V....

View Article
Browsing all 8343 articles
Browse latest View live