![Frontiers | Individual-based and interactional resilience mechanisms in social and healthcare service NPOs during the COVID-19 pandemic: Handling a disruptive extreme context in Austria Frontiers | Individual-based and interactional resilience mechanisms in social and healthcare service NPOs during the COVID-19 pandemic: Handling a disruptive extreme context in Austria](https://www.frontiersin.org/files/MyHome%20Article%20Library/897790/897790_Thumb_400.jpg)
Frontiers | Individual-based and interactional resilience mechanisms in social and healthcare service NPOs during the COVID-19 pandemic: Handling a disruptive extreme context in Austria
![PDF) Ethical approval: none sought. How discourse analysts report ethical issues around publicly available online data PDF) Ethical approval: none sought. How discourse analysts report ethical issues around publicly available online data](https://i1.rgstatic.net/publication/348625056_Ethical_approval_none_sought_How_discourse_analysts_report_ethical_issues_around_publicly_available_online_data/links/609b339f299bf1ad8d952d47/largepreview.png)
PDF) Ethical approval: none sought. How discourse analysts report ethical issues around publicly available online data
![Algorithms | Free Full-Text | Feedback-Based Integration of the Whole Process of Data Anonymization in a Graphical Interface Algorithms | Free Full-Text | Feedback-Based Integration of the Whole Process of Data Anonymization in a Graphical Interface](https://www.mdpi.com/algorithms/algorithms-12-00191/article_deploy/html/images/algorithms-12-00191-g001-550.jpg)
Algorithms | Free Full-Text | Feedback-Based Integration of the Whole Process of Data Anonymization in a Graphical Interface
![PDF) Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification PDF) Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification](https://i1.rgstatic.net/publication/354163773_Quasi-Identifier_Recognition_Algorithm_for_Privacy_Preservation_of_Cloud_Data_Based_on_Risk_Reidentification/links/6128dfb60360302a0060a69e/largepreview.png)
PDF) Quasi-Identifier Recognition Algorithm for Privacy Preservation of Cloud Data Based on Risk Reidentification
Ethical review of COVID-19 research in the Netherlands; a mixed-method evaluation among medical research ethics committees and i
![Frontiers | Deep attention super-resolution of brain magnetic resonance images acquired under clinical protocols Frontiers | Deep attention super-resolution of brain magnetic resonance images acquired under clinical protocols](https://www.frontiersin.org/files/Articles/887633/fncom-16-887633-HTML-r1/image_m/fncom-16-887633-g001.jpg)
Frontiers | Deep attention super-resolution of brain magnetic resonance images acquired under clinical protocols
![A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/dc86c86a-c28b-4c36-8d70-4d086aa4ddc8/sec1722-toc-0001-m.jpg?trick=1690153232658)
A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library
![A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/21284e1a-cc72-4e7a-8d21-672482111e87/sec1722-fig-0001-m.jpg)
A γ‐Strawman privacy‐preserving scheme in weighted social networks - Chen - 2016 - Security and Communication Networks - Wiley Online Library
How Do Tor Users Interact With Onion Services PDF | PDF | Tor (Anonymity Network) | Domain Name System
Virtual punishment in the making: When citizen journalism enables processes of shaming and online victimization Mallén, Agneta
![Privacy issues in social networks and analysis: a comprehensive survey - Pham - 2018 - IET Networks - Wiley Online Library Privacy issues in social networks and analysis: a comprehensive survey - Pham - 2018 - IET Networks - Wiley Online Library](https://ietresearch.onlinelibrary.wiley.com/cms/asset/cc17b785-8b60-4a22-ac7c-8821b23f8fd4/ntw2bf00164-fig-0001-m.jpg)