Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
-
Updated
May 26, 2016 - Python
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Using Machine Learning to Identify Glioblastoma patients with NF1 inactivation
DEPRECATED: Integrating topologically associating domains (TADs) to prioritize GWAS signal
Methods to build a network of pathway co-occurrence relationships out of expression signatures extracted from transcriptomic compendia.
Pipeline to implement a "TAD_Pathways" analysis. Discover candidate genes based on association signals in TADs
Shared Latent Space VAE's
fast and easy development of simulation methods and teaching purposes
This repository contains files required to replicate the study "A Simulation Assessment of Vaccine Effectiveness Estimation Bias with Time-Varying Vaccine Coverage, and Heterogeneous Testing and Baseline Attack Rates" by Jing Lian Suah, Naor Bar-Zeev and Maria Deloria Knoll. Latest preprint can be found here at https://doi.org/10.1101/2022.08.25…
This script implements a lab automation where I exploit CVE-2021-43798 to steal user secrets and then gain privileges on a Linux system.
This is the official repository of the paper Everyone's a Winner! On Hyperparameter Tuning of Recommendation Models
This is the official repository of the paper "Performance Comparison of Session-based Recommendation Algorithms based on Graph Neural Networks"
This repository contains the POC and the scanner to catch the Shortcut Hotkey Exploitation method.
A minimalist command line knowledge base manager
Public repository for the techniques and tools shown on rtt.secdu.de
A Risk Assessment and Management tool based on the ABC methodology, which facilitates the identification and analysis of risks, risk level measurement, and the determination of risk mitigation strategies, with the goal of comprehensive documentation, understanding, and management of data related to risk applied to cultural assets.
Running next generation
This software package accompanies the paper "A Methodology for Comparing Auto-Tuning Optimization Algorithms" (https://doi.org/10.1016/j.future.2024.05.021), making the guidelines in the methodology easy to apply.
Sampling functions in python.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Add a description, image, and links to the methodology topic page so that developers can more easily learn about it.
To associate your repository with the methodology topic, visit your repo's landing page and select "manage topics."