-
161
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01“…We uncovered its malicious capabilities by applying this technique to a suspected malware-infected application. This analysis used six stages: Initialization, decompilation, static analysis, code reversing, behavioral analysis, and reporting. …”
Get full text
Article -
162
The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey
Published 2023-03-01Get full text
Article -
163
Sentiment Analysis Models with Bayesian Approach: A Bike Preference Application in Metropolitan Cities
Published 2022-01-01“…In transport systems, user choice is studied through demand models that define how user behavior is affected by the performance of the supply system. …”
Get full text
Article -
164
Progressive Failure Analysis of Laminated CFRP Composites under Three-Point Bending Load
Published 2022-01-01“…In this paper, the mechanical behavior and damage evolution of CFRP laminates under three-point bending loads were investigated. …”
Get full text
Article -
165
Performance Analysis of Proxy-Based Object-Oriented Distributed Systems Using Game Theory
Published 2022-03-01Get full text
Article -
166
-
167
On the Way to Intercollegiate Campus: Green Promises and Real Ecological Student Practices
Published 2023-11-01“…The article discusses the issues of creating intercollegiate campuses and the gap between the statements about the environmental sustainability of projects and the environmental awareness and behavior of their future users. The authors focus on the environmental practices of students and the assessment of the level of awareness of environmental problems. …”
Get full text
Article -
168
App-DDoS detection method based on K-means multiple principal component analysis
Published 2014-05-01“…Firstly, a statistical properties feature extracting method was designed by ana-lyzing the difference between normal users' and attackers' access behavior. Secondly, a k-means multiple principal com-ponent analysis algorithm was proposed by using the maximum distance classification method according to the data di-mension reduction property of the principal component analysis, and then the testing model based on the algorithm was established. …”
Get full text
Article -
169
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis.
Published 2025-01-01“…Everyone using computer is aware of it. Some users have to face the problem known as Cyber crimes. …”
Get full text
Article -
170
Design and Dynamic Analysis of Ideological and Political Education Platform Based on Network Multimedia Technology
Published 2022-01-01“…The emergence of network multimedia has introduced the technology of the new era into people’s lives, which has had a significant influence on the thought-political teaching of today’s learner. As a group of users in the “digital age”, college students’ thinking, behavior, and concept are all influenced by the multimedia network. …”
Get full text
Article -
171
-
172
Analysis of Digital Marketing Adoption Behaviour in MSMEs in Bengkulu City using the UTAUT-3 Model
Published 2024-11-01“…Data collection was carried out in this study by distributing questionnaires to 100 respondents of MSME actors. Data analysis performed using SmartPLS 4 software. The results of this study show that Performance Expectancy, Social Influence, Hedonic Motivation influence the behavioral intention of using digital marketing in MSME actors in Bengkulu City. …”
Get full text
Article -
173
Identifying time patterns in Huntington’s disease trajectories using dynamic time warping-based clustering on multi-modal data
Published 2025-01-01“…For each identified cluster, polynomial fits that describe the time behavior of the assessed features are provided for an informative comparison, together with their averaged values. …”
Get full text
Article -
174
Identifikasi Pengaruh Pandemi Covid-19 terhadap Perilaku Pengguna Twitter dengan Pendekatan Social Network Analysis
Published 2021-11-01“…It makes twitter relevant as a medium of knowledge extraction in identifying user behavior changes. The contribution of this research is to find behavior changes of Twitter users through user profiles analysis in the before and after COVID-19 period. …”
Get full text
Article -
175
-
176
A Multilevel Analysis of Farmers’ Adoption of Water-saving Irrigation Technology: Evidence From the North China Plain
Published 2025-01-01“…Mechanism analysis suggested that household-level characteristics affected farmers’ adoption behavior through possible channels such as technical training, farmers’ perception of climate change, and the availability of alternative technologies. …”
Get full text
Article -
177
Three-stage automatic operational modal analysis using mathematical mode elimination by density-based clustering method
Published 2024-11-01“…They can be used to understand the structure's dynamic behavior and to identify any changes that may occur over time. …”
Get full text
Article -
178
-
179
Assessing the Impact of Point-based License Systems on Road Safety: A Systematic Review and Meta-analysis
Published 2025-01-01“…In addition, it is identified that users value the measure positively, and perceive that its purpose is to raise awareness and improve road safety, rather than its sanctioning or collecting role. …”
Get full text
Article -
180