-
221
Successive memory image analysis method for malicious codes
Published 2017-02-01Subjects: “…malware…”
Get full text
Article -
222
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01Subjects: Get full text
Article -
223
The life and riot of Coptic Patriarch Shenouda III (1923-2012)
Published 2018-12-01Subjects: Get full text
Article -
224
Trading house of merchant A.S. Kolmakov in Tyumen. Experience of complex research, restoration and adaptation of the object
Published 2023-11-01Subjects: Get full text
Article -
225
Riqueza de especies de mariposas (Lepidoptera: Papilionoidea) en un área de bosque tropical en Zarumilla, Tumbes, Perú
Published 2024-08-01Subjects: “…índice de shannon; índice de simpson; manglares; nymphalidae; riodinidae.…”
Get full text
Article -
226
Comparison of Aging Performances and Mechanisms: Super-Durable Fire-Resistant “Xuan Paper” Versus Chinese Traditional Xuan Paper
Published 2025-01-01Subjects: Get full text
Article -
227
Design and Fabrication of Ultrathin Metallic Phase Shifters for Visible and Near-Infrared Wavelengths
Published 2025-01-01Subjects: Get full text
Article -
228
-
229
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Subjects: Get full text
Article -
230
Integration of Islamic Jurisprudence Principles within the UN Global Human Security Framework
Published 2024-12-01Get full text
Article -
231
Shoreline dynamics over last three decades and predictions for 2032 and 2042: a spatial analysis along the coastal stretch of Aruvi Aru and Kal Aru estuaries in Mannar district, Sri Lanka
Published 2024-12-01“…The North-Western coastal stretch of the Aruvi Aru and Kal Aru estuaries in Sri Lanka's Mannar district faces increasing vulnerability due to coastal erosion, but comprehensive research has been lacking until now. …”
Get full text
Article -
232
The manor estate economy ofthe Republic of Two Nations (the Polish-Lithuanian Commonwealth) in the 16th-18th centuries from the Marxist and neo-institutionalist perspectives
Published 2011-06-01“…The point of this article is to define in more detail the structural similarities and differences between the Western European manor in the 11th-15th centuries and the Eastern European manor (especially in the RTN) in terms of Marxism and neo-institutionalism. …”
Get full text
Article -
233
Anodized CuO Nanoflakes for the Antibacterial and Antifungal Applications
Published 2025-02-01Subjects: Get full text
Article -
234
-
235
Kamilla’s Letter to Aleksandra, or Not Just a Letter
Published 2024-12-01Subjects: “…Jurszyszki (Lt. Juršiškės) manor…”
Get full text
Article -
236
Adversarial method for malicious ELF file detection based on deep reinforcement learning
Published 2024-10-01Subjects: Get full text
Article -
237
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers
Published 2024-06-01Subjects: “…malware…”
Get full text
Article -
238
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: Get full text
Article -
239
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01Subjects: Get full text
Article -
240
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: “…malware…”
Get full text
Article