These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

79 related articles for article (PubMed ID: 29791469)

  • 1. Ffuzz: Towards full system high coverage fuzz testing on binary executables.
    Zhang B; Ye J; Bi X; Feng C; Tang C
    PLoS One; 2018; 13(5):e0196733. PubMed ID: 29791469
    [TBL] [Abstract][Full Text] [Related]  

  • 2. V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.
    Li Y; Ji S; Lyu C; Chen Y; Chen J; Gu Q; Wu C; Beyah R
    IEEE Trans Cybern; 2022 May; 52(5):3745-3756. PubMed ID: 32946405
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
    Wen S; Meng Q; Feng C; Tang C
    PLoS One; 2017; 12(10):e0186188. PubMed ID: 29049409
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A systematic review of fuzzing based on machine learning techniques.
    Wang Y; Jia P; Liu L; Huang C; Liu Z
    PLoS One; 2020; 15(8):e0237749. PubMed ID: 32810156
    [TBL] [Abstract][Full Text] [Related]  

  • 5. GAN model using field fuzz mutation for in-vehicle CAN bus intrusion detection.
    Li Z; Jiang W; Liu X; Tan K; Jin X; Yang M
    Math Biosci Eng; 2022 May; 19(7):6996-7018. PubMed ID: 35730293
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Micro-Analyzer: automatic preprocessing of Affymetrix microarray data.
    Guzzi PH; Cannataro M
    Comput Methods Programs Biomed; 2013 Aug; 111(2):402-9. PubMed ID: 23731720
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Biclustering sparse binary genomic data.
    van Uitert M; Meuleman W; Wessels L
    J Comput Biol; 2008 Dec; 15(10):1329-45. PubMed ID: 19040367
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Configuration Fuzzing for Software Vulnerability Detection.
    Dai H; Murphy C; Kaiser G
    Proc Int Conf Availab Reliab Secur; 2010 Feb; ():525-530. PubMed ID: 21461049
    [TBL] [Abstract][Full Text] [Related]  

  • 9. On models of the genetic code generated by binary dichotomic algorithms.
    Gumbel M; Fimmel E; Danielli A; Strüngmann L
    Biosystems; 2015 Feb; 128():9-18. PubMed ID: 25530514
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
    Wen S; Meng Q; Feng C; Tang C
    PLoS One; 2017; 12(11):e0188229. PubMed ID: 29145458
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A coverage and slicing dependencies analysis for seeking software security defects.
    He H; Zhang D; Liu M; Zhang W; Gao D
    ScientificWorldJournal; 2014; 2014():463912. PubMed ID: 24982957
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Practical and Scalable Tool to Find Overlaps between Sequences.
    Rachid MH; Malluhi Q
    Biomed Res Int; 2015; 2015():905261. PubMed ID: 25961045
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Gene Ontology analysis in multiple gene clusters under multiple hypothesis testing framework.
    Zhong S; Xie D
    Artif Intell Med; 2007 Oct; 41(2):105-15. PubMed ID: 17913480
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Computation of elementary modes: a unifying framework and the new binary approach.
    Gagneur J; Klamt S
    BMC Bioinformatics; 2004 Nov; 5():175. PubMed ID: 15527509
    [TBL] [Abstract][Full Text] [Related]  

  • 15. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.
    Dai H; Murphy C; Kaiser G
    Int J Secur Softw Eng; 2010; 1(3):41-55. PubMed ID: 21037923
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A parallel and incremental algorithm for efficient unique signature discovery on DNA databases.
    Lee HP; Sheu TF; Tang CY
    BMC Bioinformatics; 2010 Mar; 11():132. PubMed ID: 20230647
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A data parallel strategy for aligning multiple biological sequences on multi-core computers.
    Zhu X; Li K; Salah A
    Comput Biol Med; 2013 May; 43(4):350-61. PubMed ID: 23414778
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Bifurcation discovery tool.
    Chickarmane V; Paladugu SR; Bergmann F; Sauro HM
    Bioinformatics; 2005 Sep; 21(18):3688-90. PubMed ID: 16081475
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Brute force meets Bruno force in parameter optimisation: introduction of novel constraints for parameter accuracy improvement by symbolic computation.
    Nakatsui M; Horimoto K; Lemaire F; Ürgüplü A; Sedoglavic A; Boulier F
    IET Syst Biol; 2011 Sep; 5(5):281-92. PubMed ID: 22010755
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Coverage-guided differential testing of TLS implementations based on syntax mutation.
    Pan Y; Lin W; He Y; Zhu Y
    PLoS One; 2022; 17(1):e0262176. PubMed ID: 35073360
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 4.