Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Health and hygiene 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing Assessment 2
- Public administration 2
- Women 2
- methods 2
- Agricultural diversification 1
- Anesthesia 1
- Autonomy and independence movements 1
- Clinical Chemistry Tests 1
- Clinical chemistry 1
- Constitutional history 1
- Contraception 1
- Critical Care 1
- Decolonization 1
- Economic anthropology 1
- Electronic Health Records 1
- Endocrine System Diseases 1
- Endocrine aspects 1
- Endocrine gynecology 1
- English language 1
- Environmental Health 1
- Environmental Pollutants 1
- Environmental Pollution 1
-
1
Phenolic Content and Antioxidant and Antimicrobial Activities of Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L....
Published 2021-01-01“…The current investigation points towards the quantitative characterization of the phenolic contents among the four edible Malva plants species (Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.) and also towards assessing their antibacterial activity against one Gram-positive isolate (Staphylococcus aureus) and four Gram-negative strains Escherichia coli, Pseudomonas aeruginosa, Shigella sonnei, and Proteus vulgaris. …”
Get full text
Article -
2
Homology analysis of malware based on graph
Published 2017-11-01Subjects: “…malware…”
Get full text
Article -
3
Church and State Relations in the Constitution of Malta
Published 2018-08-01Subjects: Get full text
Article -
4
-
5
Influence of Removable Devices' Heterouse on the Propagation of Malware
Published 2013-01-01“…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
Get full text
Article -
6
Malware Analysis Using Visualized Image Matrices
Published 2014-01-01“…This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. …”
Get full text
Article -
7
Power Consumption Based Android Malware Detection
Published 2016-01-01“…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
Get full text
Article -
8
Review of malware detection and classification visualization techniques
Published 2023-10-01Subjects: Get full text
Article -
9
A Survey on Adversarial Attacks for Malware Analysis
Published 2025-01-01Subjects: Get full text
Article -
10
Malware detection approach based on improved SOINN
Published 2019-12-01Subjects: Get full text
Article -
11
Malware prediction technique based on program gene
Published 2018-08-01Subjects: Get full text
Article -
12
Android malware detection method based on combined algorithm
Published 2016-10-01Subjects: “…malware detection…”
Get full text
Article -
13
Android malware detection based on improved random forest
Published 2017-04-01Subjects: Get full text
Article -
14
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
15
Research on Android malware detection based on permission and behavior
Published 2017-03-01Get full text
Article -
16
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
17
The Impact of COVID-19 on Hospitalised COPD Exacerbations in Malta
Published 2021-01-01“…The first COVID-19 case in Malta was confirmed on the 7th of March 2020. This study is aimed at investigating a significant difference between the number of acute exacerbations of chronic obstructive pulmonary disease (AECOPD) admissions and their inpatient outcome at Mater Dei Hospital during the COVID-19 pandemic when compared to the same period in 2019. …”
Get full text
Article -
18
-
19
Behavior Intention Derivation of Android Malware Using Ontology Inference
Published 2018-01-01“…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
Get full text
Article -
20
HTTP behavior characteristics generation and extraction approach for Android malware
Published 2016-08-01“…Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP traffic.Firstly,the behavioral signatures were extracted from the traffic traces generated by Android malware.Then,network behavioral characteristics were extracted from the generated network traffic.Finally,these behavioral signatures were used to detect Android malware.The experimental results show that the approach is able to extract Android malware network traffic behavioral signature with accuracy and efficiency.…”
Get full text
Article