A study on the use of quantum computers, risk assessment and security problems

Search for the full text: Google | DOI

Sagiroglu S., Ulker M., Akleylek S., Arslan B. (2018) A study on the use of quantum computers, risk assessment and security problems, in 6th International Symposium on Digital Forensic and Security, ISDFS 2018 - Proceeding 2018-January, 1-6.

The energy security paradox: Rethinking energy (in)security in the United States and China

Search for the full text: Google | DOI

Nyman J. (2018) The energy security paradox: Rethinking energy (in)security in the United States and China, in The Energy Security Paradox: Rethinking Energy (In)security in the United States and China [volume not available], 1-177.

Gaming the apocalypse in the time of antibiotic resistance

Search for the full text: Google | DOI

Servitje L. (2019) Gaming the apocalypse in the time of antibiotic resistance, in Osiris 34, 316-337.

Perception of Environmental Threat in the Shadow of War: The Effect of Future Orientation

Search for the full text: Google | DOI

Carmi N., Bartal E. (2014) Perception of Environmental Threat in the Shadow of War: The Effect of Future Orientation, in Human and Ecological Risk Assessment 20, 872-886.

The narrative of terrorism as an existential threat

Search for the full text: Google | DOI

Wolfendale J. (2016) The narrative of terrorism as an existential threat, in Routledge Handbook of Critical Terrorism Studies [volume not available], 114-123.

The entwined Cold War roots of missile defense and climate geoengineering

Search for the full text: Google | DOI

Scheffran J. (2019) The entwined Cold War roots of missile defense and climate geoengineering, in Bulletin of the Atomic Scientists 75, 222-228.

Situating the Asia Pacific in the age of the Anthropocene

Search for the full text: Google | DOI

Simangan D. (2019) Situating the Asia Pacific in the age of the Anthropocene, in Australian Journal of International Affairs [volume not available], [pages not available].

Recent progress on cascading failures and recovery in interdependent networks

Search for the full text: Google | DOI

Hu Y., Xie J., Wang Y., Havlin S., Huang S., Shekhtman L., Li J. (2019) Recent progress on cascading failures and recovery in interdependent networks, in International Journal of Disaster Risk Reduction 40, [pages not available].

The apocalypse of a wired brain

Search for the full text: Google

Žižek S. (2019) The apocalypse of a wired brain, in Problemi 57, 5-29.

Models of vertebrate mass mortality events at the K/T boundary

Search for the full text: Google | DOI

Cutler A.H., Behrensmeyer A.K. (1996) Models of vertebrate mass mortality events at the K/T boundary, in Special Paper of the Geological Society of America 307, 375-379.

Previous page Next page

Page number: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255, 256, 257, 258, 259, 260, 261, 262, 263, 264, 265, 266, 267, 268, 269, 270, 271, 272, 273