Showing
1 - 5
results of
5
for search '
Jenkins, P.
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Jenkins, P.
Showing
1 - 5
results of
5
for search '
Jenkins, P.
'
, query time: 0.31s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Organometallic networks of free radical reducing agents for a greener environment
by
Jenkins
,
P
. M.
Published 2004
Get full text
2
Synthetic studies in the indole and isoquinoline alkaloid field
by
Jenkins
,
P
. R.
Published 1976
Get full text
3
Studies of in vitro plasma corticotropin potentiating factors
by
Jenkins
,
P
. J.
Published 1998
Get full text
4
Some aspects of the Triassic saliferous beds of Cheshire, England, with special reference to salt subsidence
by
Jenkins
,
P
. L.
Published 1983
Get full text
5
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
by
Grace, P.
,
Jenkins
,
P
.
,
Naik, K.
,
Naik, N.
,
Song, J.
Published 2022
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
Article
Search Tools:
Get RSS Feed
—
Email this Search
Related Subjects
Attack tree
Attack tree model
Authentication
Block-chain
Blockchain
Crime
Cybersecurity
DID
Decentralised
Decentralized IDentifier
Decentralized identifier
Denial-of-service attack
Diamond model
Diamond model of intrusion analyse
Diamond model of intrusion analysis
Digital identity
Distributed denial of service
Distributed ledg technology
Distributed ledger
Distributed ledger technology
Economic and social effects
Electronic document identification systems
Faking identity
Forestry
Identity management system
Identity management systems
Identity theft
Intrusion analysis
Kill chain
Lockheed Martin
Loading...