-
81
-
82
-
83
-
84
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
85
-
86
-
87
-
88
-
89
A multi-targeted approach to identify potential flavonoids against three targets in the SARS-CoV-2 life cycle
Published 2022“…By examining the effects of glycosylation and other structural-activity relationships, the presence of sugar moiety in flavonoids significantly reduces its binding energy. It increases the solubility of flavonoids leading to reduced toxicity and higher bioavailability. …”
-
90
-
91
-
92
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
93
-
94
-
95
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”
-
96
-
97
-
98
-
99
-
100