Found: 202
Select item for more details and to access through your institution.
The Impact of COVID-19 Third Dose Vaccination on the Magnitude of Antigen Specific T Cells in Kidney Transplant Patients.
- Published in:
- Physiological Research, 2024, v. 73, n. 4, p. 655, doi. 10.33549/physiolres.935318
- By:
- Publication type:
- Article
FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface.
- Published in:
- Computer Systems Science & Engineering, 2024, v. 48, n. 4, p. 969, doi. 10.32604/csse.2024.046615
- By:
- Publication type:
- Article
3 Keys to Hardening Government Networks.
- Published in:
- Government Technology, 2023, v. 36, n. 2, p. 33
- Publication type:
- Article
Massive Connectedness.
- Published in:
- Government Technology, 2016, v. 29, n. 7, p. 18
- By:
- Publication type:
- Article
Research on android malware permission pattern using permission monitoring system.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 22, p. 14807, doi. 10.1007/s11042-016-3273-x
- By:
- Publication type:
- Article
A study on malicious codes pattern advanced analysis using visualization.
- Published in:
- Multimedia Tools & Applications, 2014, v. 68, n. 2, p. 253, doi. 10.1007/s11042-011-0907-x
- By:
- Publication type:
- Article
OpcA and PorB are novel bactericidal antigens of the 4CMenB vaccine in mice and humans.
- Published in:
- NPJ Vaccines, 2023, v. 8, n. 1, p. 1, doi. 10.1038/s41541-023-00651-9
- By:
- Publication type:
- Article
Cytotoxicity assay as a potential alternative method for animal testing for batch release of Italian fish autogeneous vaccines.
- Published in:
- Open Veterinary Journal, 2023, v. 13, n. 4, p. 495, doi. 10.5455/OVJ.2023.v13.i4.12
- By:
- Publication type:
- Article
Binary bugs.
- Published in:
- 2013
- By:
- Publication type:
- Opinion
An Update on the Pharmacological Aspects of Vaccines and Antivirals for the Management of Monkeypox.
- Published in:
- Journal of Pharmacology & Pharmacotherapeutics, 2022, v. 13, n. 4, p. 341, doi. 10.1177/0976500X231156733
- By:
- Publication type:
- Article
Secure the IoT Networks as Epidemic Containment Game.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 2, p. 156, doi. 10.3390/sym13020156
- By:
- Publication type:
- Article
Cybersecurity and Country of Origin: Towards a New Framework for Assessing Digital Product Domesticity.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 87, doi. 10.3390/su15010087
- By:
- Publication type:
- Article
Perspectives and Reviews in the Development and Evolution of the Zero-Day Attacks.
- Published in:
- Informatica Economica, 2022, v. 26, n. 2, p. 46, doi. 10.24818/issn14531305/26.2.2022.05
- By:
- Publication type:
- Article
Generating Antivirus Evasive Executables Using Code Mutation.
- Published in:
- Informatica Economica, 2018, v. 22, n. 2, p. 81, doi. 10.12948/issn14531305/22.2.2018.08
- By:
- Publication type:
- Article
Impact of anti-virus software on computer virus dynamical behavior.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2014, v. 25, n. 5, p. -1, doi. 10.1142/S0129183114400105
- By:
- Publication type:
- Article
A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage.
- Published in:
- PLoS ONE, 2018, v. 13, n. 1, p. 1, doi. 10.1371/journal.pone.0191101
- By:
- Publication type:
- Article
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/746803
- By:
- Publication type:
- Article
Technological Turf Wars: A Case Study of the Computer Antivirus Industry.
- Published in:
- 2010
- By:
- Publication type:
- Book Review
Technology Literacy Collections: A Self-Help Solution That Creates a Culture of Helpers.
- Published in:
- Alki: The Washington Library Association Journal, 2019, v. 35, n. 3, p. 17
- By:
- Publication type:
- Article
Large‐scale production, purification, and function of a tumor multi‐epitope vaccine: Peptibody with bFGF/VEGFA.
- Published in:
- Engineering in Life Sciences, 2020, v. 20, n. 9/10, p. 422, doi. 10.1002/elsc.202000020
- By:
- Publication type:
- Article
A Deep Learning Framework for Securing IoT Against Malwares.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 11, n. 1, p. 38, doi. 10.54216/JCIM.110104
- By:
- Publication type:
- Article
A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age.
- Published in:
- Journal of Cybersecurity & Information Management, 2022, v. 10, n. 2, p. 35, doi. 10.54216/JCIM.100204
- By:
- Publication type:
- Article
Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System.
- Published in:
- Journal of Cybersecurity & Information Management, 2022, v. 10, n. 1, p. 18, doi. 10.54216/JCIM.090105
- By:
- Publication type:
- Article
ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and.NET Environments.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 153, doi. 10.3390/jcp4020008
- By:
- Publication type:
- Article
DHCP-Enabled LAN Prone to Phishing Attacks.
- Published in:
- IUP Journal of Information Technology, 2013, v. 9, n. 1, p. 24
- By:
- Publication type:
- Article
Windows-Based and Web-Enabled ATMs: Issues and Scopes.
- Published in:
- IUP Journal of Information Technology, 2012, v. 8, n. 4, p. 52
- By:
- Publication type:
- Article
Research on android infiltration technology based on the silent installation of an accessibility service.
- Published in:
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 2, p. 1, doi. 10.1177/1550147720903628
- By:
- Publication type:
- Article
VirtAV: an Agentless Runtime Antivirus System for Virtual Machines.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 11, p. 5642, doi. 10.3837/tiis.2017.11.026
- By:
- Publication type:
- Article
Role of literacy, fear and hesitancy on acceptance of COVID-19 vaccine among village health volunteers in Thailand.
- Published in:
- PLoS ONE, 2022, v. 17, n. 6, p. 1, doi. 10.1371/journal.pone.0270023
- By:
- Publication type:
- Article
Knowledge of vaccine handlers and status of cold chain and vaccine management in primary health care facilities of Tigray region, Northern Ethiopia: Institutional based cross-sectional study.
- Published in:
- PLoS ONE, 2022, v. 17, n. 6, p. 1, doi. 10.1371/journal.pone.0269183
- By:
- Publication type:
- Article
Evaluation of portable near-infrared spectroscopy for authentication of mRNA based COVID-19 vaccines.
- Published in:
- PLoS ONE, 2022, v. 17, n. 5, p. 1, doi. 10.1371/journal.pone.0267214
- By:
- Publication type:
- Article
Polymorphic malware detection using sequence classification methods and ensembles.
- Published in:
- EURASIP Journal on Information Security, 2017, v. 2017, n. 1, p. 1, doi. 10.1186/s13635-017-0055-6
- By:
- Publication type:
- Article
The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity.
- Published in:
- Risk Analysis: An International Journal, 2020, v. 40, n. 8, p. 1571, doi. 10.1111/risa.13534
- By:
- Publication type:
- Article
Next-generation antivirus for JavaScript malware detection based on dynamic features.
- Published in:
- Knowledge & Information Systems, 2024, v. 66, n. 2, p. 1337, doi. 10.1007/s10115-023-01978-4
- By:
- Publication type:
- Article
ALDROID: efficient update of Android anti-virus software using designated active learning methods.
- Published in:
- Knowledge & Information Systems, 2016, v. 49, n. 3, p. 795, doi. 10.1007/s10115-016-0918-z
- By:
- Publication type:
- Article
Ransomware detection method based on context-aware entropy analysis.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 20, p. 6731, doi. 10.1007/s00500-018-3257-z
- By:
- Publication type:
- Article
MOCDroid: multi-objective evolutionary classifier for Android malware detection.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 24, p. 7405, doi. 10.1007/s00500-016-2283-y
- By:
- Publication type:
- Article
Ransomware Early Detection Techniques.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 3, p. 14497, doi. 10.48084/etasr.6915
- By:
- Publication type:
- Article
Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 18, p. 3680, doi. 10.3390/app9183680
- By:
- Publication type:
- Article
Validación de una escala de conciencia sobre ciberdelito en estudiantes universitarios de Perú.
- Published in:
- Revista Científica General José María Córdova, 2022, v. 20, n. 37, p. 209, doi. 10.21830/19006586.791
- By:
- Publication type:
- Article
The transmembrane replacement H7N9-VLP vaccine displays high levels of protection in mice.
- Published in:
- Frontiers in Microbiology, 2022, v. 13, p. 1, doi. 10.3389/fmicb.2022.1003714
- By:
- Publication type:
- Article
A Primer on Data Security.
- Published in:
- CPA Journal, 2015, v. 85, n. 5, p. 58
- By:
- Publication type:
- Article
Investigating the Return Possibility of Covid-19 Mutated Strains and Role of Vaccination in Present and Future.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 2043, doi. 10.47750/pnr.2022.13.S08.251
- By:
- Publication type:
- Article
Opinions for Receiving COVID-19 Vaccines Based on Sentiment Analysis.
- Published in:
- Journal of Pharmaceutical Negative Results, 2022, v. 13, p. 1648, doi. 10.47750/pnr.2022.13.S01.197
- By:
- Publication type:
- Article
Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/8227751
- By:
- Publication type:
- Article
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 2, p. 102, doi. 10.3390/info15020102
- By:
- Publication type:
- Article
Malware Detection Based on Code Visualization and Two-Level Classification.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 118, doi. 10.3390/info12030118
- By:
- Publication type:
- Article
A FORENSIC STUDY OF THE EFFECTIVENESS OF SELECTED ANTI-VIRUS PRODUCTS AGAINST SSDT HOOKING ROOTKITS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2013, p. 137
- By:
- Publication type:
- Article
Ransomware: Evolution, Mitigation and Prevention.
- Published in:
- International Management Review, 2017, v. 13, n. 1, p. 10
- By:
- Publication type:
- Article
Global Stability of a Computer Virus Propagation Model with Two Kinds of Generic Nonlinear Probabilities.
- Published in:
- Abstract & Applied Analysis, 2014, p. 1, doi. 10.1155/2014/735327
- By:
- Publication type:
- Article