Search

Your search keyword '"Spring, Jonathan"' showing total 193 results

Search Constraints

Start Over You searched for: Author "Spring, Jonathan" Remove constraint Author: "Spring, Jonathan"
193 results on '"Spring, Jonathan"'

Search Results

1. Engineering the Magnetic Transition Temperatures and the Rare Earth Exchange Interaction in Oxide Heterostructures

3. Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

4. An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems

5. On managing vulnerabilities in AI/ML systems

6. Magnetotransport of dirty-limit van Hove singularity quasiparticles

7. Learning the Associations of MITRE ATT&CK Adversarial Techniques

8. Review of human decision-making during computer security incident analysis

9. Human decision-making in computer security incident response

10. The Matsu Wheel: A Cloud-based Framework for Efficient Analysis and Reanalysis of Earth Satellite Imagery

12. Building General Knowledge of Mechanisms in Information Security

13. Paramagnetic Nd sublattice and thickness-dependent ferromagnetism in Nd2NiMnO6 double perovskite thin films

14. Towards Scientific Incident Response

16. Why Separation Logic Works

17. On Malfunction, Mechanisms and Malware Classification

19. Competition between Carrier Injection and Structural Distortions in Electron‐Doped Perovskite Nickelate Thin Films

20. Author Correction: The NCI Genomic Data Commons

21. Competition between Carrier Injection and Structural Distortions in Electron‐Doped Perovskite Nickelate Thin Films

22. Cyber Security via Signaling Games: Toward a Science of Cyber Security

23. NRXN1 is associated with enlargement of the temporal horns of the lateral ventricles in psychosis

25. A deep learning system accurately classifies primary and metastatic cancers using passenger mutation patterns

26. Combined burden and functional impact tests for cancer driver discovery using DriverPower

27. Integrative pathway enrichment analysis of multivariate omics data

28. Pathway and network analysis of more than 2500 whole cancer genomes

29. Divergent mutational processes distinguish hypoxic and normoxic tumours

30. Genomic footprints of activated telomere maintenance mechanisms in cancer

33. Top‐Layer Engineering Reshapes Charge Transfer at Polar Oxide Interfaces

34. Supporting Information for Adv. Mater., DOI: 10.1002/adma.202203071 Top-Layer Engineering Reshapes Charge Transfer at Polar Oxide Interfaces

35. Top-layer engineering reshapes charge transfer at polar oxide interfaces

36. Toward Controlling Filament Size and Location for Resistive Switches via Nanoparticle Exsolution at Oxide Interfaces

37. Top‐Layer Engineering Reshapes Charge Transfer at Polar Oxide Interfaces

39. A State-Based Model for Multi-Party Coordinated Vulnerability Disclosure (MPCVD)

41. Exploring a mechanistic approach to experimentation in computing

43. Cybersecurity Information Sharing: Analysing an Email Corpus of Coordinated Vulnerability Disclosure

Catalog

Books, media, physical & digital resources