See Blockindiscussions, Blockinstats, Blockinand Blockinauthor Blockinprofiles Blockinfor Blockinthis Blockinpublication
@inproceedings{Lourida2015SeeBB, title={See Blockindiscussions, Blockinstats, Blockinand Blockinauthor Blockinprofiles Blockinfor Blockinthis Blockinpublication}, author={I. Lourida and Maya Soni and Joanna Thompson-Coon and N. Purandare and I. Lang and O. Ukoumunne and D. J. Llewellyn}, year={2015} }
On BLOCKINthe BLOCKINtheoretical BLOCKINbasis BLOCKINof BLOCKINperfusion measurements BLOCKINby BLOCKINdynamic BLOCKINsusceptibility contrast BLOCKINMRI
Figures and Tables from this paper
References
SHOWING 1-10 OF 971 REFERENCES
Covert channels-here to stay?
- Computer Science
- Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance
- 1994
- 154
- PDF
Using Naive Bayes with AdaBoost to Enhance Network Anomaly Intrusion Detection
- Computer Science
- 2010 Third International Conference on Intelligent Networks and Intelligent Systems
- 2010
- 16
Double counting in ecosystem services valuation: causes and countermeasures
- Business
- Ecological Research
- 2010
- 139
- PDF
Data mining - practical machine learning tools and techniques, Second Edition
- Computer Science
- The Morgan Kaufmann series in data management systems
- 2005
- 1,883
- PDF
A detailed analysis of the KDD CUP 99 data set
- Computer Science
- 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
- 2009
- 2,089
- PDF