Suggested Topics within your search.
Suggested Topics within your search.
central nervous system
2
tight junction
2
Adhesion molecules
1
Animals
1
Benchmark testing
1
Blood-Brain Barrier
1
Blood-brain barrier
1
CELL-ADHESION MOLECULES
1
Central Nervous System Diseases
1
Central government policies
1
Central nervous system
1
Comintern
1
Communist Party of Great Britain
1
Computer networks. General works. Traffic monitoring
1
Crime & criminology
1
ENDOTHELIAL-CELLS
1
Educational strategies & policy
1
Entrism
1
Feature extraction
1
HERPES-SIMPLEX ENCEPHALITIS
1
Hardware
1
Hardware design languages
1
Health disparities
1
Herpes simplex virus
1
Human immunodeficiency virus
1
Humans
1
Integrated circuit modeling
1
Intervention research
1
Intrusion detection systems (Computer security). Computer network security. Hackers
1
JAPANESE ENCEPHALITIS
1
-
1
-
2by Alexander N. PoddiakovSubjects: “...Trojan horse teaching....”
Published 2009-01-01
Get full text
Article -
3
-
4by Lattuada Marcello“... step preparatory to the application of the Trojan Horse Method (THM) in Nuclear Astrophysics....”
Published 2017-01-01
Get full text
Article -
5“...Abstract We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly...”
Get full text
Article -
6by Tumino Aurora, Spitaleri Claudio, Cherubini Silvio, D’Agata Giuseppe, Giovanni Luca Guardo, Gulino Marisa, Indelicato Iolanda, La Cognata Marco, Lamia Livio, Rosario Gianluca Pizzone, Giuseppe Gabriele Rapisarda, Romano Stefano, Maria Letizia Sergi, Spartá Roberta“...The Trojan Horse Method (THM) represents the indirect way to measure reactions between charged...”
Published 2018-01-01
Get full text
Article -
7by Motobayashi Tohru“...Abstract. Coulomb dissociation is discussed in connection with the Trojan-Horse method and other...”
Published 2017-01-01
Get full text
Article -
8
-
9
-
10
-
11
-
12
-
13“... your account ID and password. Information and money loss from Trojan horse have already become problems...”
Get full text
Others -
14“... life, but - as demonstrated in this paper - also serve as a Trojan Horse for dissolved metal cations...”
Get full text
Article -
15“... as a weapon to crack down on all kinds of crimes. Among them, the detection method of Trojan horse has...”
Get full text
Others -
16by Pizzone R.G., Spitaleril C., Bertulani C., Mukhamedzhanov A., Blokhintsev L., La Cognata M., Lamia L., Spartá R., Tumino A.“... Trojan Horse method plays an important part for the measurement of several charged particle...”
Published 2015-01-01
Get full text
Article -
17
-
18
-
19by Pedro eFernandes, Pedro eFernandes, Carla Conceição Caramujo Rocha de CarvalhoGet full text
Published 2014-06-01
Article -
20