Found: 25
Select item for more details and to access through your institution.
Comparative Analysis of Nucleic Acid-Binding Polymers as Potential Anti-Inflammatory Nanocarriers.
- Published in:
- Pharmaceutics, 2024, v. 16, n. 1, p. 10, doi. 10.3390/pharmaceutics16010010
- By:
- Publication type:
- Article
RLTG: Multi-targets directed greybox fuzzing.
- Published in:
- PLoS ONE, 2023, v. 17, n. 4, p. 1, doi. 10.1371/journal.pone.0278138
- By:
- Publication type:
- Article
Survey of side channel attack on encrypted network traffic.
- Published in:
- Chinese Journal of Network & Information Security, 2021, v. 7, n. 4, p. 114, doi. 10.11959/j.issn.2096-109x.2021050
- By:
- Publication type:
- Article
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme.
- Published in:
- International Journal of Communication Systems, 2013, v. 26, n. 5, p. 674, doi. 10.1002/dac.1362
- By:
- Publication type:
- Article
Scavenging Tumor‐Derived Small Extracellular Vesicles by Functionalized 2D Materials to Inhibit Tumor Regrowth and Metastasis Following Radiotherapy.
- Published in:
- Advanced Functional Materials, 2022, v. 32, n. 39, p. 1, doi. 10.1002/adfm.202205663
- By:
- Publication type:
- Article
Dendrimer-Based Drug Delivery Systems for Brain Targeting.
- Published in:
- Biomolecules (2218-273X), 2019, v. 9, n. 12, p. 790, doi. 10.3390/biom9120790
- By:
- Publication type:
- Article
Recent insights for the emerging COVID-19: Drug discovery, therapeutic options and vaccine development.
- Published in:
- Asian Journal of Pharmaceutical Sciences, 2021, v. 16, n. 1, p. 4, doi. 10.1016/j.ajps.2020.06.001
- By:
- Publication type:
- Article
Multifunctional Cationic Hyperbranched Polyaminoglycosides that Target Multiple Mediators for Severe Abdominal Trauma Management.
- Published in:
- Advanced Science, 2024, v. 11, n. 1, p. 1, doi. 10.1002/advs.202305273
- By:
- Publication type:
- Article
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks.
- Published in:
- International Journal of Network Management, 2011, v. 21, n. 5, p. 384, doi. 10.1002/nem.764
- By:
- Publication type:
- Article
Construction of CpG Delivery Nanoplatforms by Functionalized MoS<sub>2</sub> Nanosheets for Boosting Antitumor Immunity in Head and Neck Squamous Cell Carcinoma.
- Published in:
- Small, 2023, v. 19, n. 41, p. 1, doi. 10.1002/smll.202300380
- By:
- Publication type:
- Article
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety.
- Published in:
- Journal of Medical Systems, 2012, v. 36, n. 5, p. 2743, doi. 10.1007/s10916-011-9750-x
- By:
- Publication type:
- Article
Diverse Metrics for Robust LBS Privacy: Distance, Semantics, and Temporal Factors.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 4, p. 1314, doi. 10.3390/s24041314
- By:
- Publication type:
- Article
A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 9, p. 5367, doi. 10.3390/app13095367
- By:
- Publication type:
- Article
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise.
- Published in:
- Computer Journal, 2024, v. 67, n. 3, p. 976, doi. 10.1093/comjnl/bxad036
- By:
- Publication type:
- Article
Adaptive ±1 Steganography in Extended Noisy Region.
- Published in:
- Computer Journal, 2014, v. 57, n. 4, p. 557, doi. 10.1093/comjnl/bxt035
- By:
- Publication type:
- Article
CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 2, p. 2253, doi. 10.32604/cmc.2024.049504
- By:
- Publication type:
- Article
Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 1, p. 1223, doi. 10.32604/cmc.2024.049904
- By:
- Publication type:
- Article
Enhancing network intrusion detection classifiers using supervised adversarial training.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 9, p. 6690, doi. 10.1007/s11227-019-03092-1
- By:
- Publication type:
- Article
Coverage-guided differential testing of TLS implementations based on syntax mutation.
- Published in:
- PLoS ONE, 2022, v. 17, n. 1, p. 1, doi. 10.1371/journal.pone.0262176
- By:
- Publication type:
- Article
Model-Based Grey-Box Fuzzing of Network Protocols.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6880677
- By:
- Publication type:
- Article
Enhancements of a Three-Party Password-Based Authenticated Key Exchange Protocol.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2013, v. 10, n. 3, p. 215
- By:
- Publication type:
- Article
Improved Two-Factor Authenticated Key Exchange Protocol.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2011, v. 8, n. 4, p. 430
- By:
- Publication type:
- Article
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 4, p. 1329
- By:
- Publication type:
- Article
Robust smart-cards-based user authentication scheme with user anonymity.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 2, p. 236, doi. 10.1002/sec.315
- By:
- Publication type:
- Article
Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks.
- Published in:
- PLoS ONE, 2017, v. 12, n. 5, p. 1, doi. 10.1371/journal.pone.0177111
- By:
- Publication type:
- Article