40 results on '"Williams, Adam D."'
Search Results
2. A DELPHI study priority setting the remaining challenges for the use of routinely collected data in trials: COMORANT-UK
3. The importance of NOT being Other: Time to address the invisibility of nuanced gender and sexuality in clinical trials
4. Insider Threat
5. Critical Infrastructure: Nuclear Reactors, Materials, and Waste Sector
6. Physical Security: Methods and Practices
7. A Complex Systems Approach to Develop a Multilayer Network Model for High Consequence Facility Security
8. MP68-18 BALANCING PRECISION AND CAUTION: THE DILEMMA OF FASCIA AND NERVE-SPARING RADICAL PROSTATECTOMY AMIDST THE SURGE OF HIGH-RISK CANCER: RESULTS FROM A CONTEMPORARY NATIONAL CANCER DATABASE STUDY
9. MP68-14 CHANGING TIMES: TRENDS IN TUMOR UPSTAGING AFTER RADICAL PROSTATECTOMY. RESULTS FROM A CONTEMPORARY NATIONAL CANCER DATABASE STUDY
10. MP08-16 LONG TERM OUTCOME AND PREDICTORS OF SURVIVAL IN BLADDER SARCOMAS
11. Building a Scientific Foundation for Security: Multilayer Network Model Insights for System Security Engineering.
12. Lessons Learned from a Comparative Analysis of Counterintelligence and Insider Threat Mitigation Case Studies in Nuclear Facilities
13. A Complex Systems Approach to Develop a Multilayer Network Model for High Consequence Facility Security
14. A Tinkerer's Mindset: Lessons from the Technical Leadership Institute's Cohort 8 on Safe‐to‐Fail Probing as a Tool for Informing Judgement
15. Enhancing Early Systems R&D Capabilities with Systems —Theoretic Process Analysis
16. Democratizing Systems Security
17. Physical Security: Methods and Practices
18. Insider Threat
19. Critical Infrastructure: Nuclear Reactors, Materials, and Waste Sector
20. Possible Does Not Mean Useful: The Role of Probability of Attack in Security Risk Management
21. COMPLIANCE OF SEMEN TESTING IN MEN AFTER POTENTIAL VASECTOMY FAILURE
22. Possible Does Not Mean Useful: The Role of Probability of Attack in Security Risk Management.
23. Beyond a series of security nets: applying STAMP & STPA to port security
24. Multilayer Network Models for Coordinating Orchestration of Systems Security Engineering
25. Multilayered Network Models for Security: Enhancing System Security Engineering with Orchestration
26. Leveraging Resilience Metrics to Support Security System Analysis
27. Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation
28. Resilience-Based Performance Measures for Next-Generation Systems Security Engineering
29. Incorporating the Role(s) of Human Actors in Complex System Design for Safety and Security
30. Insights for Systems Security Engineering from Multilayer Network Models
31. Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation.
32. A Multiplex Complex Systems Model for Engineering Security Systems
33. Systems Theory Principles and Complex Systems Engineering Concepts for Protection and Resilience in Critical Infrastructure: Lessons from the Nuclear Sector
34. The Importance of Context in Advanced Systems Engineering
35. Revisiting Current Paradigms: Subject Matter Expert Views on High Consequence Facility Security Assessments.
36. The Gulf Nuclear Energy Infrastructure Institute: A Multidisciplinary Educational Approach for Integrated Nuclear Energy Safety, Security, and Safeguards in the Middle East.
37. Using Systems Theory to Address Complex Challenges to International Spent Nuclear Fuel Transportation
38. The Gulf Nuclear Energy Infrastructure Institute (GNEII) After Three Years
39. Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems
40. GNEII -- INSTILLING GLOBAL STANDARDS FOR NUCLEAR SAFETY, SECURITY, AND SAFEGUARDS IN DEVELOPING COUNTRIES.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.