Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Health and hygiene 2
- History 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing Assessment 2
- Philosophy 2
- Public administration 2
- Study and teaching 2
- Women 2
- methods 2
- Agricultural diversification 1
- Anesthesia 1
- Autonomy and independence movements 1
- Clinical Chemistry Tests 1
- Clinical chemistry 1
- Constitutional history 1
- Contraception 1
- Criminal law 1
- Critical Care 1
- Decolonization 1
- Dictionaries 1
- Economic anthropology 1
- Electronic Health Records 1
- Endocrine System Diseases 1
- Endocrine aspects 1
-
1
Phenolic Content and Antioxidant and Antimicrobial Activities of Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L....
Published 2021-01-01“…The current investigation points towards the quantitative characterization of the phenolic contents among the four edible Malva plants species (Malva sylvestris L., Malva oxyloba Boiss., Malva parviflora L., and Malva aegyptia L.) and also towards assessing their antibacterial activity against one Gram-positive isolate (Staphylococcus aureus) and four Gram-negative strains Escherichia coli, Pseudomonas aeruginosa, Shigella sonnei, and Proteus vulgaris. …”
Get full text
Article -
2
Church and State Relations in the Constitution of Malta
Published 2018-08-01Subjects: Get full text
Article -
3
Influence of Removable Devices' Heterouse on the Propagation of Malware
Published 2013-01-01“…The effects of removable devices’ heterouse in different areas on the propagation of malware spreading via removable devices remain unclear. …”
Get full text
Article -
4
Malware Analysis Using Visualized Image Matrices
Published 2014-01-01“…This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. …”
Get full text
Article -
5
Power Consumption Based Android Malware Detection
Published 2016-01-01“…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
Get full text
Article -
6
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01“…By incorporating the security awareness of computer users into the susceptible-infected-susceptible (SIS) model, this study proposes a new malware propagation model, named the SID model, where D compartment denotes the group of nodes with user awareness. …”
Get full text
Article -
7
The Impact of COVID-19 on Hospitalised COPD Exacerbations in Malta
Published 2021-01-01“…The first COVID-19 case in Malta was confirmed on the 7th of March 2020. This study is aimed at investigating a significant difference between the number of acute exacerbations of chronic obstructive pulmonary disease (AECOPD) admissions and their inpatient outcome at Mater Dei Hospital during the COVID-19 pandemic when compared to the same period in 2019. …”
Get full text
Article -
8
-
9
Behavior Intention Derivation of Android Malware Using Ontology Inference
Published 2018-01-01“…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
Get full text
Article -
10
A Data Mining Classification Approach for Behavioral Malware Detection
Published 2016-01-01“…In this paper we present a data mining classification approach to detect malware behavior. We proposed different classification methods in order to detect malware based on the feature and behavior of each malware. …”
Get full text
Article -
11
A Malware Detection Scheme Based on Mining Format Information
Published 2014-01-01“…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
Get full text
Article -
12
MALVADA: A framework for generating datasets of malware execution traces
Published 2025-05-01Subjects: Get full text
Article -
13
Malware recognition approach based on self‐similarity and an improved clustering algorithm
Published 2022-10-01“…Abstract The recognition of malware in network traffic is an important research problem. …”
Get full text
Article -
14
Malware Detection in Self-Driving Vehicles Using Machine Learning Algorithms
Published 2020-01-01“…In this study, we propose a machine learning-based data analysis method to accurately detect abnormal behaviors due to malware in large-scale network traffic in real time. …”
Get full text
Article -
15
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01Subjects: “…malware detection…”
Get full text
Article -
16
MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology
Published 2021-01-01“…In this context, the paper at hand proposes MalSEIRS, a novel dynamic model, to predict malware distribution in a network based on the SEIRS epidemiological model. …”
Get full text
Article -
17
Integrating Information Gain and Chi-Square for Enhanced Malware Detection Performance
Published 2025-01-01Subjects: “…Malware detection…”
Get full text
Article -
18
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Published 2014-01-01“…In this paper, we apply a linear support vector machine (SVM) to detect Android malware and compare the malware detection performance of SVM with that of other machine learning classifiers. …”
Get full text
Article -
19
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures
Published 2013-01-01“…The aim of this paper is to evaluate a static structure approach to malware modelling using the growing malware signature databases now available. …”
Get full text
Article -
20
A novel feature selection technique: Detection and classification of Android malware
Published 2025-03-01Subjects: “…Android Malware…”
Get full text
Article