Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Health and hygiene 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing Assessment 2
- Public administration 2
- Women 2
- methods 2
- Agricultural diversification 1
- Anesthesia 1
- Autonomy and independence movements 1
- Clinical Chemistry Tests 1
- Clinical chemistry 1
- Constitutional history 1
- Contraception 1
- Critical Care 1
- Decolonization 1
- Economic anthropology 1
- Electronic Health Records 1
- Endocrine System Diseases 1
- Endocrine aspects 1
- Endocrine gynecology 1
- English language 1
- Environmental Health 1
- Environmental Pollutants 1
- Environmental Pollution 1
-
61
-
62
Antibacterial Activity of Copper Nanoparticles Fabricate via Malva Sylvesteris Leaf Extract
Published 2019-08-01Subjects: “…Fabrication, Nanoparticles, Malva sylvesteris , Microbial susceptibility…”
Get full text
Article -
63
Multi-feature fusion malware detection method based on attention and gating mechanisms
Published 2024-02-01Subjects: “…malware detection…”
Get full text
Article -
64
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01Subjects: “…Malware Android…”
Get full text
Article -
65
Combined dynamic multi-feature and rule-based behavior for accurate malware detection
Published 2019-11-01“…Malware have become the scourge of the century, as they are continuously evolving and becoming more complex with increasing damages. …”
Get full text
Article -
66
Incremental clustering method based on Gaussian mixture model to identify malware family
Published 2019-06-01Subjects: “…malware family…”
Get full text
Article -
67
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…Thus, the study on malware propagation model plays an important role in network security. …”
Get full text
Article -
68
Android malware detection method based on permission sequential pattern mining algorithm
Published 2013-08-01Subjects: Get full text
Article -
69
WSN malware infection model based on cellular automaton and static Bayesian game
Published 2019-06-01Subjects: Get full text
Article -
70
Android malware detection method based on byte-code image and deep learning
Published 2019-01-01Subjects: “…malware detection…”
Get full text
Article -
71
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
Published 2014-01-01“…In the last years the number of malware Apps that the users download to their devices has risen. …”
Get full text
Article -
72
Analisis Makna Kiasan yang Terkandung dalam Lirik Lagu ”Mengapa” Karya Mario G. Klau
Published 2024-10-01Subjects: “…makna leksikal…”
Get full text
Article -
73
Geohistorical Structural Design Tables for the Building Stones of the Maltese Archipelago
Published 2024-09-01Subjects: “…stress design table, stone testing, Malta stone, Andrew Leith Adams, Crown Agents of the Colonies, Malta…”
Get full text
Article -
74
Mała architektura sakralna w optyce prawa polskiego i kanonicznego
Published 2012-07-01Get full text
Article -
75
-
76
-
77
-
78
KITO BALSAS / KITO ŽVILGSNIS
Published 2001-01-01“…Kito balsas, Kito žvilgsnis pajungia subjektą savo destruktyviai valiai, paverčia jį Kito galios objektu. …”
Get full text
Article -
79
Visual Essay: Politicalized Always
Published 2018-01-01“…Visual essay Politicalized always…”
Get full text
Article -
80
KITO BALSAS / KITO ŽVILGSNIS
Published 2001-01-01“…Kito balsas, Kito žvilgsnis pajungia subjektą savo destruktyviai valiai, paverčia jį Kito galios objektu. …”
Get full text
Article