Old Web
English
Sign In
Acemap
>
Paper
>
Indirect methods constraining nuclear capture - the Trojan Horse Method
Indirect methods constraining nuclear capture - the Trojan Horse Method
2020
A. Tumino
C. Spitaleri
M. La Cognata
S. Cherubini
G. L. Guardo
M. Gulino
I. Indelicato
L. Lamia
A. Oliva
R. G. Pizzone
P. M. Prajapati
G. G. Rapisarda
S. Romano
M. L. Sergi
R. Spartá
Keywords:
Trojan horse
Computer security
Computer science
Correction
Source
Cite
Save
Machine Reading By IdeaReader
65
References
1
Citations
NaN
KQI
[]