From post

Inferring causal molecular networks: empirical assessment through a community-based effort

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , и . Nature Methods, 13 (4): 310--318 (22.02.2016)
DOI: 10.1038/nmeth.3773

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A PLS-HECC-based device authentication and key agreement scheme for smart home networks., , , и . Comput. Networks, (2022)DNA Molecular Storage System: Transferring Digitally Encoded Information through Bacterial Nanonetworks., , , , , и . IEEE Trans. Emerg. Top. Comput., 9 (3): 1566-1580 (2021)Security and Privacy in Virtual Reality - A Literature Survey.. CoRR, (2022)Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders., , , , , , , , и . CoRR, (2022)A Stochastic model for RNA splicing., , и . ECC, стр. 1164-1169. IEEE, (2022)Noise in transcriptional, splicing and translational regulation.. CIBCB, стр. 1-6. IEEE, (2020)A Human Papillomavirus Early Promoter Minimal Model: Viral Population and Stochasticity.. EMBC, стр. 2471-2474. IEEE, (2020)Analysis of DDoS-Capable IoT Malwares., , , и . FedCSIS, том 11 из Annals of Computer Science and Information Systems, стр. 807-816. (2017)Vulnerabilities and Security Breaches in Cryptocurrencies., , и . SEDA, том 925 из Advances in Intelligent Systems and Computing, стр. 288-299. Springer, (2018)Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era., , , , и . Future Internet, 11 (6): 127 (2019)