Found: 23
Select item for more details and to access through your institution.
Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.
- Published in:
- Symmetry (20738994), 2024, v. 16, n. 5, p. 605, doi. 10.3390/sym16050605
- By:
- Publication type:
- Article
Antifungal activity of chitinase II against Colletotrichum falcatum Went. causing red rot disease in transgenic sugarcane.
- Published in:
- Turkish Journal of Biology, 2018, v. 42, n. 1, p. 45, doi. 10.3906/biy-1709-17
- By:
- Publication type:
- Article
The potential and efficacy of Allium sativum leaf lectin (ASAL) against sap-sucking insect pests of transgenic maize.
- Published in:
- Biologia, 2020, v. 75, n. 12, p. 2351, doi. 10.2478/s11756-020-00533-8
- By:
- Publication type:
- Article
Advances in exogenous RNA delivery techniques for RNAi-mediated pest control.
- Published in:
- Molecular Biology Reports, 2020, v. 47, n. 8, p. 6309, doi. 10.1007/s11033-020-05666-2
- By:
- Publication type:
- Article
Resistance to Chilo infuscatellus (Lepidoptera: Pyraloidea) in transgenic lines of sugarcane expressing Bacillus thuringiensis derived Vip3A protein.
- Published in:
- Molecular Biology Reports, 2020, v. 47, n. 4, p. 2649, doi. 10.1007/s11033-020-05355-0
- By:
- Publication type:
- Article
Silencing a Myzus persicae Macrophage Inhibitory Factor by Plant-Mediated RNAi Induces Enhanced Aphid Mortality Coupled with Boosted RNAi Efficacy in Transgenic Potato Lines.
- Published in:
- Molecular Biotechnology, 2022, v. 64, n. 10, p. 1152, doi. 10.1007/s12033-022-00498-w
- By:
- Publication type:
- Article
Human Mucosal IgA Immune Responses against Enterotoxigenic Escherichia coli.
- Published in:
- Pathogens, 2020, v. 9, n. 9, p. 714, doi. 10.3390/pathogens9090714
- By:
- Publication type:
- Article
Development of Security Rules and Mechanisms to Protect Data from Assaults.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 24, p. 12578, doi. 10.3390/app122412578
- By:
- Publication type:
- Article
Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 19, p. 9736, doi. 10.3390/app12199736
- By:
- Publication type:
- Article
A Comparison of Pooling Methods for Convolutional Neural Networks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 17, p. 8643, doi. 10.3390/app12178643
- By:
- Publication type:
- Article
A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 16, p. N.PAG, doi. 10.3390/app12168143
- By:
- Publication type:
- Article
Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7701, doi. 10.3390/app12157701
- By:
- Publication type:
- Article
Fuzzy Rough C-Mean Based Unsupervised CNN Clustering for Large-Scale Image Data.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 10, p. 1869, doi. 10.3390/app8101869
- By:
- Publication type:
- Article
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 1, p. 589, doi. 10.32604/cmc.2023.042386
- By:
- Publication type:
- Article
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 3065, doi. 10.32604/cmc.2023.035695
- By:
- Publication type:
- Article
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-II.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 3, p. 5641, doi. 10.32604/cmc.2023.033733
- By:
- Publication type:
- Article
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 2, p. 4059, doi. 10.32604/cmc.2023.032882
- By:
- Publication type:
- Article
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 2, p. 2641, doi. 10.32604/cmc.2023.028796
- By:
- Publication type:
- Article
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 2, p. 2625, doi. 10.32604/cmc.2023.030899
- By:
- Publication type:
- Article
Transforming Hand Drawn Wireframes into Front-End Code with Deep Learning.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 4303, doi. 10.32604/cmc.2022.024819
- By:
- Publication type:
- Article
An efficient hybrid approach for optimization using simulated annealing and grasshopper algorithm for IoT applications.
- Published in:
- Discover Internet of Things, 2023, n. 1, p. 1, doi. 10.1007/s43926-023-00036-3
- By:
- Publication type:
- Article
Methylglyoxal and insulin resistance in berberine-treated type 2 diabetic patients.
- Published in:
- Journal of Research in Medical Sciences, 2018, v. 23, p. 1, doi. 10.4103/jrms.JRMS_1078_17
- By:
- Publication type:
- Article
Potential of endochitinase gene to control Fusarium wilt and early blight disease in transgenic potato lines.
- Published in:
- Journal of Plant Protection Research, 2019, v. 59, n. 3, p. 376, doi. 10.24425/jppr.2019.129755
- By:
- Publication type:
- Article