Showing 1 - 20 results of 6,613 for search 'Malwa~', query time: 3.14s Refine Results
  1. 1

    Phenolic Content and Antioxidant and Antimicrobial Activities of Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.... by Khalid A. Shadid, Ashok K. Shakya, Rajashri R. Naik, Nidal Jaradat, Husni S. Farah, Naeem Shalan, Nooman A. Khalaf, Ghaleb A. Oriquat

    Published 2021-01-01
    “…The current investigation points towards the quantitative characterization of the phenolic contents among the four edible Malva plants species (Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.) and also towards assessing their antibacterial activity against one Gram-positive isolate (Staphylococcus aureus) and four Gram-negative strains Escherichia coli, Pseudomonas aeruginosa, Shigella sonnei, and Proteus vulgaris. …”
    Get full text
    Article
  2. 2
  3. 3

    Influence of Removable Devices' Heterouse on the Propagation of Malware by Xie Han, Yi-Hong Li, Li-Ping Feng, Li-Peng Song

    Published 2013-01-01
    “…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
    Get full text
    Article
  4. 4

    Malware Analysis Using Visualized Image Matrices by KyoungSoo Han, BooJoong Kang, Eul Gyu Im

    Published 2014-01-01
    “…This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. …”
    Get full text
    Article
  5. 5

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  6. 6

    Modeling and Analysis of the Spread of Malware with the Influence of User Awareness by Qingyi Zhu, Xuhang Luo, Yuhang Liu

    Published 2021-01-01
    “…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
    Get full text
    Article
  7. 7

    The Impact of COVID-19 on Hospitalised COPD Exacerbations in Malta by Yvette Farrugia, Bernard Paul Spiteri Meilak, Neil Grech, Rachelle Asciak, Liberato Camilleri, Stephen Montefort, Christopher Zammit

    Published 2021-01-01
    “…The first COVID-19 case in Malta was confirmed on the 7th of March 2020. This study is aimed at investigating a significant difference between the number of acute exacerbations of chronic obstructive pulmonary disease (AECOPD) admissions and their inpatient outcome at Mater Dei Hospital during the COVID-19 pandemic when compared to the same period in 2019. …”
    Get full text
    Article
  8. 8
  9. 9

    Behavior Intention Derivation of Android Malware Using Ontology Inference by Jian Jiao, Qiyuan Liu, Xin Chen, Hongsheng Cao

    Published 2018-01-01
    “…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
    Get full text
    Article
  10. 10

    A Data Mining Classification Approach for Behavioral Malware Detection by Monire Norouzi, Alireza Souri, Majid Samad Zamini

    Published 2016-01-01
    “…In this paper we present a data mining classification approach to detect malware behavior. We proposed different classification methods in order to detect malware based on the feature and behavior of each malware. …”
    Get full text
    Article
  11. 11

    A Malware Detection Scheme Based on Mining Format Information by Jinrong Bai, Junfeng Wang, Guozhong Zou

    Published 2014-01-01
    “…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
    Get full text
    Article
  12. 12
  13. 13

    Malware recognition approach based on self‐similarity and an improved clustering algorithm by Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang

    Published 2022-10-01
    “…Abstract The recognition of malware in network traffic is an important research problem. …”
    Get full text
    Article
  14. 14

    Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms by Seunghyun Park, Jin-Young Choi

    Published 2020-01-01
    “…In this study, we propose a machine learning-based data analysis method to accurately detect abnormal behaviors due to malware in large-scale network traffic in real time. …”
    Get full text
    Article
  15. 15
  16. 16

    MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology by Isabella Martínez Martínez, Andrés Florián Quitián, Daniel Díaz-López, Pantaleone Nespoli, Félix Gómez Mármol

    Published 2021-01-01
    “…In this context, the paper at hand proposes MalSEIRS, a novel dynamic model, to predict malware distribution in a network based on the SEIRS epidemiological model. …”
    Get full text
    Article
  17. 17
  18. 18

    Linear SVM-Based Android Malware Detection for Reliable IoT Services by Hyo-Sik Ham, Hwan-Hee Kim, Myung-Sup Kim, Mi-Jung Choi

    Published 2014-01-01
    “…In this paper, we apply a linear support vector machine (SVM) to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. …”
    Get full text
    Article
  19. 19

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. …”
    Get full text
    Article
  20. 20