Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anduril 2: upgraded large-scale data integration framework., , , , , , , , , and 6 other author(s). Bioinform., 35 (19): 3815-3817 (2019)Data integration to prioritize drugs using genomics and curated data., , , , , and . BioData Min., (2016)Fast Gene Ontology based clustering for microarray experiments., , and . BioData Min., (2008)Integrative platform to translate gene sets to networks., and . Bioinform., 26 (14): 1802-1803 (2010)High-performance computing in biomedicine., and . HPCS, page 233. IEEE, (2013)Automating IoT Security Standard Testing by Common Security Tools., , , and . ICISSP, page 42-53. SCITEPRESS, (2024)System Security Assessment through Specification Mutations and Fault Injection., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)Transparent Security Method for Automating IoT Security Assessments., , , and . ISPEC, volume 14341 of Lecture Notes in Computer Science, page 138-153. Springer, (2023)Identification of genetic markers with synergistic survival effect in cancer., , , , , , , , , and 1 other author(s). BMC Syst. Biol., 7 (S-1): S2 (2013)Computational identification of candidate loci for recessively inherited mutation using high-throughput SNP arrays., , , , , and . Bioinform., 23 (15): 1952-1961 (2007)