Skip to main content
. 2013 Nov 5;8:28. doi: 10.1186/1745-6150-8-28

Figure 3.

Figure 3

Representation of the selected MACCS keys.

HHS Vulnerability Disclosure