-
621
Fe xviii and Fe xx Forbidden Lines Observed by Solar Orbiter/SPICE
Published 2025-01-01Get full text
Article -
622
A physically-based formulation for texture evolution during dynamic recrystallization. A case study of ice
Published 2024-05-01Get full text
Article -
623
-
624
Performance analysis of a PV/T system with metal hydride-based energy storage
Published 2025-09-01Get full text
Article -
625
Seepage-induced sand-leakage karst collapse mechanism considering the soil arching effect
Published 2025-03-01Get full text
Article -
626
-
627
-
628
Numerical Simulation of Strength, Deformation, and Failure Characteristics of Rock with Fissure Hole Defect
Published 2020-01-01Get full text
Article -
629
Uniaxial Compression Response and Instability Mechanisms of Parallel Dual Coal Pillar–Roof Combinations
Published 2025-01-01Get full text
Article -
630
Multimodal Learning for Traffic Risk Prediction: Combining Aerial Imagery With Contextual Data
Published 2025-01-01Get full text
Article -
631
Ion-kinetic modeling of Mercury’s magnetosphere: a reference for BepiColombo’s sixth flyby
Published 2025-07-01Get full text
Article -
632
-
633
Undervalued Groundwater Resources Over the Major Tectonic Lines of Southeastern China
Published 2025-03-01Get full text
Article -
634
-
635
Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism
Published 2025-06-01Get full text
Article -
636
BOARD CHARACTERISTICS AND REAL EARNINGS MANAGEMENT AMONG LISTED NON-FINANCIAL FIRMS IN NIGERIA
Published 2022-12-01Get full text
Article -
637
Architecture of an automated program complex based on a multiple kernel svm classifier for analyzing malicious executable files
Published 2024-09-01“…The methods involved a hybrid approach that combines static analysis – extracting byte code, disassembled instructions, and control flow graphs using IDA Pro and IDAPython – with dynamic analysis, which entails monitoring real-time behavior using Drakvuf. …”
Get full text
Article -
638
Architecture of an automated program complex based on a multiple kernel svm classifier for analyzing malicious executable files
Published 2024-09-01“…The methods involved a hybrid approach that combines static analysis – extracting byte code, disassembled instructions, and control flow graphs using IDA Pro and IDAPython – with dynamic analysis, which entails monitoring real-time behavior using Drakvuf. …”
Get full text
Article -
639
-
640