-
101
-
102
-
103
Set-based approach for efficient evaluation and analysis of XACML policies. (c2014)
Published 2014Get full text
Get full text
masterThesis -
104
-
105
-
106
-
107
-
108
-
109
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…It was concluded that it is only possible to hack a seed phrase if a significant portion of it is already known, but even this would require a significant amount of time and computational power.…”
-
110
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …”
-
111
-
112
-
113
Comparison of Capture Hi-C Analytical Pipelines
Published 2022“…Capture Hi-C (CHi-C) is a method that uses an intermediate hybridization step to target and select predefined regions of interest in a Hi-C library, thereby increasing effective sequencing depth for those regions. …”
-
114
-
115
Pore-scale simulation of fine particles migration in porous media using coupled CFD-DEM
Published 2022“…The time required to develop bridging and subsequent clogging of the pore space that lead to permeability reduction decreases as the flow velocity increases. The size of the fine particles has a significant impact on permeability reduction where the reduction in permeability increases as the size of particles increases. …”
-
116
-
117
-
118
-
119
-
120