Works matching DE "ANTI-malware (Computer software)"
1
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 1, p. 4, doi. 10.3390/jcp5010004
- Article
2
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 153, doi. 10.3390/jcp4020008
- Rose, Anthony J.;
- Graham, Scott R.;
- Schubert Kabban, Christine M.;
- Krasnov, Jacob J.;
- Henry, Wayne C.
- Article
3
- Neural Computing & Applications, 2022, v. 34, n. 18, p. 15165, doi. 10.1007/s00521-021-06755-4
- Seraj, Saeed;
- Khodambashi, Siavash;
- Pavlidis, Michalis;
- Polatidis, Nikolaos
- Article
4
- Neural Computing & Applications, 2017, v. 28, p. 699, doi. 10.1007/s00521-016-2374-9
- Astorino, A.;
- Chiarello, A.;
- Gaudioso, M.;
- Piccolo, A.
- Article
7
- Journal of Supercomputing, 2014, v. 67, n. 3, p. 738, doi. 10.1007/s11227-013-0991-y
- Lee, Chanhee;
- Kim, Jonghwa;
- Cho, Seong-je;
- Choi, Jongmoo;
- Park, Yeongung
- Article
8
- Electrica, 2023, v. 23, n. 3, p. 634, doi. 10.5152/electrica.2023.23043
- Gülataş, İbrahim;
- Kılınç, Hacı Hakan;
- Aydın, Muhammed Ali;
- Zaim, Abdul Halim
- Article
9
- Vietnam Journal of Computer Science (Springer Nature), 2017, v. 4, n. 4, p. 245, doi. 10.1007/s40595-017-0095-3
- Demertzis, Konstantinos;
- Iliadis, Lazaros
- Article
10
- Expert Systems, 2024, v. 41, n. 1, p. 1, doi. 10.1111/exsy.13479
- Article
11
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 9, p. 14, doi. 10.26483/ijarcs.v8i9.4781
- Choudhary, Mahima;
- Kishore, Brij
- Article
12
- International Journal of Advanced Research in Computer Science, 2015, v. 6, n. 7, p. 26
- Article
13
- PLoS ONE, 2012, v. 7, n. 9, p. 1, doi. 10.1371/journal.pone.0044459
- Yang-Yu Liu;
- Slotine, Jean-Jacques;
- Barabási, Albert-László;
- Moreno, Yamir
- Article
14
- Acta Médica Portuguesa, 2019, v. 32, n. 9, p. 563, doi. 10.20344/amp.12542
- LEA, Nathan C.;
- DE MEYER, Filip
- Article
15
- Ontario Dentist, 2017, v. 94, n. 3, p. 38
- Article
16
- IETE Technical Review, 2022, v. 39, n. 2, p. 433, doi. 10.1080/02564602.2020.1854058
- Article
17
- Computers, Materials & Continua, 2023, v. 75, n. 2, p. 4231, doi. 10.32604/cmc.2023.034287
- So-Eun Jeon;
- Sun-Jin Lee;
- Eun-Young Lee;
- Yeon-Ji Lee;
- Jung-Hwa Ryu;
- Jung-Hyun Moon;
- Sun-Min Yi;
- Il-Gu Lee
- Article
18
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 2, p. 70, doi. 10.1109/TDSC.2012.88
- Shan, Zhiyong;
- Wang, Xin;
- Chiueh, Tzi-cker
- Article
19
- ISACA Journal, 2023, n. 5, p. 24
- GROSSER, PETER;
- BURCH, GERALD F.
- Article
20
- 2017
- Letter to the Editor
21
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 1, p. 41, doi. 10.15394/jdfsl.2017.1437
- Article
22
- IETE Journal of Research, 2022, v. 68, n. 4, p. 2580, doi. 10.1080/03772063.2020.1721338
- Buddhadev, Bharat;
- Faruki, Parvez;
- Gaur, Manoj Singh;
- Kharche, Shubham;
- Zemmari, Akka
- Article
23
- British Dental Nurses Journal, 2025, v. 88, n. 1, p. 28
- Article
24
- Journal of Supercomputing, 2014, v. 70, n. 3, p. 1433, doi. 10.1007/s11227-014-1235-5
- Yuan, Jinfeng;
- Qiang, Weizhong;
- Jin, Hai;
- Zou, Deqing
- Article
25
- Wireless Personal Communications, 2021, v. 121, n. 3, p. 1945, doi. 10.1007/s11277-021-08748-x
- Kumari, Sangeeta;
- Upadhyay, Ranjit Kumar
- Article
26
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2947, doi. 10.1007/s11277-018-5982-0
- Liu, Yu;
- Zhang, Liqiang;
- Huang, Xiangdong
- Article
27
- African Journal of Computing & ICT, 2020, v. 13, n. 3, p. 42
- Subairu, S. O.;
- Alhassan, J. K.;
- Nwaocha, V. O.;
- Saidu, I. R.
- Article
28
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 3, p. 153, doi. 10.32604/jcs.2022.033537
- Moawad, Ahmad;
- Ebada, Ahmed Ismail;
- Al-Zoghby, Aya M.
- Article
29
- Cryptography (2410-387X), 2025, v. 9, n. 1, p. 16, doi. 10.3390/cryptography9010016
- Liagkou, Vasiliki;
- Nastou, Panagiotis E.;
- Spirakis, Paul;
- Stamatiou, Yannis C.
- Article
30
- ISSA Journal, 2016, v. 14, n. 12, p. 7
- Mashburn, David;
- Northcutt, Stephen
- Article
31
- ISSA Journal, 2016, v. 14, n. 4, p. 6
- Article
32
- Electronics (2079-9292), 2024, v. 13, n. 18, p. 3717, doi. 10.3390/electronics13183717
- Wu, Min-Hao;
- Hsu, Fu-Hau;
- Hunag, Jian-Hong;
- Wang, Keyuan;
- Liu, Yen-Yu;
- Chen, Jian-Xin;
- Wang, Hao-Jyun;
- Yang, Hao-Tsung
- Article
33
- Electronics (2079-9292), 2023, v. 12, n. 17, p. 3554, doi. 10.3390/electronics12173554
- Topcu, Ahmet Ercan;
- Alzoubi, Yehia Ibrahim;
- Elbasi, Ersin;
- Camalan, Emre
- Article
34
- Electronics (2079-9292), 2023, v. 12, n. 11, p. 2346, doi. 10.3390/electronics12112346
- Wu, Shaohan;
- Xue, Jingfeng;
- Wang, Yong;
- Kong, Zixiao
- Article
35
- Journal of Software: Evolution & Process, 2018, v. 30, n. 3, p. 1, doi. 10.1002/smr.1871
- Iqbal, Md Shahrear;
- Zulkernine, Mohammad;
- Jaafar, Fehmi;
- Gu, Yuan
- Article
36
- Journal of Systems Integration (1804-2724), 2013, v. 4, n. 3, p. 48
- Article
37
- Sensors (14248220), 2021, v. 21, n. 24, p. 8320, doi. 10.3390/s21248320
- Diro, Abebe;
- Chilamkurti, Naveen;
- Nguyen, Van-Doan;
- Heyne, Will
- Article
38
- Indexer, 2016, v. 34, n. 3, p. 126, doi. 10.3828/indexer.2016.39
- Article
39
- International Journal of Intelligent Engineering & Systems, 2023, v. 16, n. 5, p. 329, doi. 10.22266/ijies2023.1031.28
- Banumathi, Chandini Shivaramu;
- Rajendra, Ajjipura Basavegowda
- Article
40
- British Journal of Healthcare Computing & Information Management, 2010, p. 21
- Article
41
- Journal of ICT Research & Applications, 2021, v. 15, n. 3, p. 265, doi. 10.5614/itbj.ict.res.appl.2021.15.3.5
- Habtor, Saleh Abdulaziz;
- Dahah, Ahmed Haidarah Hasan
- Article
42
- Applied Sciences (2076-3417), 2020, v. 10, n. 22, p. 7975, doi. 10.3390/app10227975
- Iadarola, Giacomo;
- Martinelli, Fabio;
- Mercaldo, Francesco;
- Santone, Antonella
- Article
43
- Informatica Economica, 2022, v. 26, n. 2, p. 46, doi. 10.24818/issn14531305/26.2.2022.05
- TEODORESCU, Cosmin Alexandru
- Article
44
- Revista Cubana de Ciencias Informáticas, 2012, v. 6, n. 4, p. 62
- Hernández Moya, Yurisleidy;
- Hernández Barreiro, Daileny;
- Sánchez Arce, Luis Enrique;
- Lobaina Guzmán, Juan Carlos;
- Ripoll Méndez, Dovier Antonio
- Article
45
- Michigan Medicine, 2016, v. 115, n. 3, p. 12
- Article
46
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Article
47
- EAI Endorsed Transactions on Scalable Information Systems, 2020, v. 7, n. 28, p. 1, doi. 10.4108/eai.13-7-2018.165281
- Saleem, Nageen;
- Rahman, Areeba;
- Rizwan, Muhammad;
- Naseem, Shahid;
- Ahmad, Fahad
- Article
48
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- T.A., Markina;
- A.A., Ogolyuk
- Article
49
- International Journal of Information Security, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s10207-021-00577-0
- Koike, Kazuki;
- Kobayashi, Ryotaro;
- Katoh, Masahiko
- Article
50
- International Journal of Information Security, 2022, v. 21, n. 1, p. 61, doi. 10.1007/s10207-021-00541-y
- Lyvas, Christos;
- Ntantogian, Christoforos;
- Xenakis, Christos
- Article