NSL complex

Known as: NSL complex location, non-specific lethal complex, non-specific lethal complex location 
A histone acetyltransferase complex that catalyzes the acetylation of a histone H4 lysine residues at several positions. In human, it contains the… (More)
National Institutes of Health

Topic mentions per year

Topic mentions per year

1987-2017
0102019872017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
  • L. Dhanabal, Dr. S. P. Shantharajah
  • 2015
Intelligent intrusion detection systems can only be built if there is availability of an effective data set. A data set with a… (More)
  • table I
  • table III
  • table IV
  • table V
  • table VIII
Is this relevant?
2015
2015
With the advent of digital technology, security threats for computer networks have increased dramatically over the last decade… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table III
Is this relevant?
2015
2015
Anomalous traffic detection on internet is a major issue of security as per the growth of smart devices and this technology… (More)
  • table II
  • table I
  • figure 2
  • figure 1
  • table III
Is this relevant?
2014
2014
In this paper, we present a Genetic Algorithm (GA) approach with an improved initial population and selection operator, to… (More)
Is this relevant?
2014
2014
Intrusion is the violation of information security policy by malicious activities. Intrusion detection (ID) is a series of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table III
  • figure 4
Is this relevant?
2013
2013
hMOF (MYST1), a histone acetyltransferase (HAT), forms at least two distinct multiprotein complexes in human cells. The male… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
These days, network traffic is increasing due to the increasing use of smart devices and the Internet. Amount of the intrusion… (More)
  • table 1
  • table 2
  • table 3
Is this relevant?
2013
2013
Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSL-KDD intrusion detection… (More)
  • figure 1
  • table V
Is this relevant?
2010
2010
This paper introduces a hybrid scheme that combines the advantages of deep belief network and support vector machine. An… (More)
  • figure 1.1
  • table 1.1
Is this relevant?
2010
2010
Shilpa lakhina, Sini Joseph and Bhupendra verma 1 PG Research Scholar Department of Computer Science and Engineering, TIT, Bhopal… (More)
  • table 2
  • table 3
  • table 4
  • figure 1
  • figure 2
Is this relevant?