Showing 1 - 20 results of 8,648 for search 'Malwa~', query time: 3.04s Refine Results
  1. 1

    Phenolic Content and Antioxidant and Antimicrobial Activities of Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.... by Khalid A. Shadid, Ashok K. Shakya, Rajashri R. Naik, Nidal Jaradat, Husni S. Farah, Naeem Shalan, Nooman A. Khalaf, Ghaleb A. Oriquat

    Published 2021-01-01
    “…The current investigation points towards the quantitative characterization of the phenolic contents among the four edible Malva plants species (Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.) and also towards assessing their antibacterial activity against one Gram-positive isolate (Staphylococcus aureus) and four Gram-negative strains Escherichia coli, Pseudomonas aeruginosa, Shigella sonnei, and Proteus vulgaris. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Influence of Removable Devices' Heterouse on the Propagation of Malware by Xie Han, Yi-Hong Li, Li-Ping Feng, Li-Peng Song

    Published 2013-01-01
    “…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
    Get full text
    Article
  6. 6

    Malware Analysis Using Visualized Image Matrices by KyoungSoo Han, BooJoong Kang, Eul Gyu Im

    Published 2014-01-01
    “…This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. …”
    Get full text
    Article
  7. 7

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Android malware detection method based on combined algorithm by Hao CHEN, Sihan QING

    Published 2016-10-01
    Subjects: “…malware detection…”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Modeling and Analysis of the Spread of Malware with the Influence of User Awareness by Qingyi Zhu, Xuhang Luo, Yuhang Liu

    Published 2021-01-01
    “…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
    Get full text
    Article
  17. 17

    The Impact of COVID-19 on Hospitalised COPD Exacerbations in Malta by Yvette Farrugia, Bernard Paul Spiteri Meilak, Neil Grech, Rachelle Asciak, Liberato Camilleri, Stephen Montefort, Christopher Zammit

    Published 2021-01-01
    “…The first COVID-19 case in Malta was confirmed on the 7th of March 2020. This study is aimed at investigating a significant difference between the number of acute exacerbations of chronic obstructive pulmonary disease (AECOPD) admissions and their inpatient outcome at Mater Dei Hospital during the COVID-19 pandemic when compared to the same period in 2019. …”
    Get full text
    Article
  18. 18
  19. 19

    Behavior Intention Derivation of Android Malware Using Ontology Inference by Jian Jiao, Qiyuan Liu, Xin Chen, Hongsheng Cao

    Published 2018-01-01
    “…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
    Get full text
    Article
  20. 20

    HTTP behavior characteristics generation and extraction approach for Android malware by Yaling LUO, Wenwei LI, Xin SU

    Published 2016-08-01
    “…Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP traffic.Firstly,the behavioral signatures were extracted from the traffic traces generated by Android malware.Then,network behavioral characteristics were extracted from the generated network traffic.Finally,these behavioral signatures were used to detect Android malware.The experimental results show that the approach is able to extract Android malware network traffic behavioral signature with accuracy and efficiency.…”
    Get full text
    Article