IMG

How does mg2+ modulate the rna folding mechanism: A case study of the g: Cw: W trans basepair
Antarip Halder, Rohit Roy, Dhananjay Bhattacharyya, Abhijit Mitra
Biophysical Journal, BPJ, 2017
Core Rank : - Google Rank :62
Direct Determination of Site-specific Noncovalent Interaction Strengths of Proteins from NMR-derived Fast Side Chain Motional Parameters
T. Rajitha Rajeshwar, Krishnan Marimuthu
The Journal of Physical Chemistry B, JPCB, 2017
Core Rank : - Google Rank :60
Temperature dependence of the stability of ion pair interactions, and its implications on the thermostability of proteins from thermophiles
Bikkina Swetha, Agastya P Bhati, Siladitya Padhi, Deva Priyakumar U
Journal of Chemical Sciences, JCS, 2017
Google Rank :20
Modeling Stream Water Temperature using Regression Analysis with Air Temperature and Streamflow over Krishna River
A.naresh, Rehana Shaik
International Journal of Engineering Technology Science and Research, IJETSR, 2017
Core Rank : - Google Rank :-
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
Krishna Chaitanya Telikcherla, Akash Agrawall, Venkatesh Choppella
International Conference on Information Systems Security and Privacy, ICISSP, 2017
Core Rank : C Google Rank :22
Mitigating browser-based DDoS attacks using CORP
Akash Agrawall, Krishna Chaitanya, Arnav Kumar Agrawal, Venkatesh Choppella
Innovations in Software Engineering Conference, ISEC, 2017
Core Rank : - Google Rank :11
Notion of Semantics in Computer Science-A Systematic Literature Review
Gollapudi V.r.j. Sai Prasad, Venkatesh Choppella
International Conference on Natural Language Processing., ICON, 2017
Core Rank : - Google Rank :5
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy
Akash Agrawall, Maheshwari Shubh Jagmohan, Projit Bandyopadhyay, Venkatesh Choppella
International Conference on Information Systems Security, ICISS, 2017
Core Rank : - Google Rank :-
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
C.sravani, Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Alavalapati Goutham Reddy, Eun-jun Yoon, Kee-young Yoo
IEEE Access, ACCESS, 2017
Core Rank : - Google Rank :266
Lightweight authentication protocols for wearable devices
Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid
Computers & Electrical Engineering, C&EE, 2017
Core Rank : - Google Rank :32