AVISPA statistics

To access cutting-edge analytics on consensus tools, life science contexts and associated fields, you will need to subscribe to our premium service.


Citations per year

Citations chart

Popular tool citations

chevron_left Alternative splicing visualization chevron_right
Popular tools chart

Tool usage distribution map

Tool usage distribution map

Associated diseases

Associated diseases

AVISPA specifications


Unique identifier OMICS_16615
Alternative name Advanced Visualization of Splicing Prediction and Analysis
Interface Web user interface
Restrictions to use None
Computer skills Basic
Stability Stable
Maintained Yes




  • person_outline Yoseph Barash <>

Publication for Advanced Visualization of Splicing Prediction and Analysis

AVISPA in publications

PMCID: 5856360
PMID: 29547619
DOI: 10.1371/journal.pone.0194072

[…] protocol not only overcomes the issues in farash’s scheme, but it can also resist against all known attacks. we also provide the security analysis of the proposed scheme with the help of widespread avispa (automated validation of internet security protocols and applications) software. at last, comparing with the earlier proposals in terms of security and efficiency, we conclude […]

PMCID: 5636171
PMID: 28961236
DOI: 10.1371/journal.pbio.2002623

[…] protein (), further supporting the notion that this isoform occurs due to alternative splicing., to identify potential regulators mediating retention of intron 12 in eif2b5, we utilized the avispa tool [] to carry out a splicing-relevant sequence feature analysis of the locus encompassing eif2b5 exons 12–14. the nonmotif analysis revealed a relatively short distance to the nearest ag […]

PMCID: 5515433
PMID: 28719621
DOI: 10.1371/journal.pone.0181031

[…] used to analyse and judge various authentication schemes’ performance [–]. there are many formal security analysis methods can be applied to authentication scheme such as ban logic [], gny [], avispa [] and proverif []. in this paper, we used ban logic to prove our scheme’s legality., in this subsection, ban logic is used to analyze the proposed scheme. ban logic helps to prove whether […]

PMCID: 5870723
PMID: 28882000
DOI: 10.1093/bioinformatics/btx268

[…] we use it to compare the old and new models. we generated genomic features and psi quantification for ∼12 000 cassette exons used in () for this dataset for the five tissues using majiq () and avispa (). the second dataset, denoted mgp data, was prepared by () and it contains rna-seq data from six tissues (heart, hippocampus, liver, lung, spleen and thymus) with average read coverage of 60 […]

PMCID: 5464775
PMID: 28452937
DOI: 10.3390/s17050979

[…] security against several well-known attacks. the author proved the strength of the protocol with ban logic and further confirmed the theoretical analysis results by implementing the protocol in the avispa [] tool. however, similar to other schemes discussed above, farash et al. [] did not consider the requirement of concurrent sessions, which are more likely to occur in an iot environment. […]

To access a full list of publications, you will need to upgrade to our premium service.

AVISPA institution(s)
Department of Genetics, University of Pennsylvania, Philadelphia, PA, USA; Department of Computer and Information Science, University of Pennsylvania, Philadelphia, PA, USA; Universitat Pompeu Fabra, Barcelona, Spain; Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada; Banting and Best Department of Medical Research, University of Toronto, Toronto, Canada
AVISPA funding source(s)
Supported by FPI grant from the Spanish Ministry of Science; NSERC Steacie and CIHR grants, the University of Toronto, an OGI Spark grant and a Genome Canada grant.

AVISPA reviews

star_border star_border star_border star_border star_border
star star star star star

Be the first to review AVISPA