Works matching DE "ANTI-malware (Computer software)"
1
- Journal of Cybersecurity (2579-0072), 2022, v. 4, n. 3, p. 153, doi. 10.32604/jcs.2022.033537
- Moawad, Ahmad;
- Ebada, Ahmed Ismail;
- Al-Zoghby, Aya M.
- Article
2
- ISSA Journal, 2016, v. 14, n. 12, p. 7
- Mashburn, David;
- Northcutt, Stephen
- Article
3
- ISSA Journal, 2016, v. 14, n. 4, p. 6
- Article
4
- Electronics (2079-9292), 2024, v. 13, n. 18, p. 3717, doi. 10.3390/electronics13183717
- Wu, Min-Hao;
- Hsu, Fu-Hau;
- Hunag, Jian-Hong;
- Wang, Keyuan;
- Liu, Yen-Yu;
- Chen, Jian-Xin;
- Wang, Hao-Jyun;
- Yang, Hao-Tsung
- Article
5
- Electronics (2079-9292), 2023, v. 12, n. 17, p. 3554, doi. 10.3390/electronics12173554
- Topcu, Ahmet Ercan;
- Alzoubi, Yehia Ibrahim;
- Elbasi, Ersin;
- Camalan, Emre
- Article
6
- Electronics (2079-9292), 2023, v. 12, n. 11, p. 2346, doi. 10.3390/electronics12112346
- Wu, Shaohan;
- Xue, Jingfeng;
- Wang, Yong;
- Kong, Zixiao
- Article
7
- Journal of Software: Evolution & Process, 2018, v. 30, n. 3, p. 1, doi. 10.1002/smr.1871
- Iqbal, Md Shahrear;
- Zulkernine, Mohammad;
- Jaafar, Fehmi;
- Gu, Yuan
- Article
8
- Optometry Times, 2015, v. 7, n. 10, p. 20
- Article
9
- ITNOW, 2019, v. 61, n. 2, p. 18, doi. 10.1093/itnow/bwz036
- Article
10
- ITNOW, 2016, v. 58, n. 1, p. 24, doi. 10.1093/itnow/bww010
- Article
11
- Ontario Dentist, 2017, v. 94, n. 3, p. 38
- Article
12
- Expert Systems, 2024, v. 41, n. 1, p. 1, doi. 10.1111/exsy.13479
- Article
13
- International Journal of Vehicle Structures & Systems (IJVSS), 2022, v. 14, n. 5, p. 567, doi. 10.4273/ijvss.14.5.03
- Mishra, Vikrant;
- Yadav, Manish Kumar
- Article
14
- Journal of Applied Security Research, 2023, v. 18, n. 4, p. 925, doi. 10.1080/19361610.2022.2104104
- Ruiz, Rodrigo;
- Winter, Rogério;
- Rosa, Ferrucio de Franco;
- Shukla, Pancham;
- Kazemian, Hassan
- Article
15
- British Dental Nurses Journal, 2025, v. 88, n. 1, p. 28
- Article
16
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 3, p. 131, doi. 10.1049/ntw2.12022
- P, Ravi Kiran Varma;
- Mallidi, S Kumar Reddy;
- K, Santosh Jhansi;
- D, Pushpa Latha
- Article
17
- Journal of Cyber Security Technology, 2018, v. 2, n. 2, p. 51, doi. 10.1080/23742917.2018.1483876
- Soto-Valero, César;
- González, Mabel
- Article
18
- 2017
- Letter to the Editor
19
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 1, p. 41, doi. 10.15394/jdfsl.2017.1437
- Article
20
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 2, p. 70, doi. 10.1109/TDSC.2012.88
- Shan, Zhiyong;
- Wang, Xin;
- Chiueh, Tzi-cker
- Article
23
- Indexer, 2016, v. 34, n. 3, p. 126, doi. 10.3828/indexer.2016.39
- Article
24
- Internal Auditor, 2010, v. 67, n. 1, p. 22
- Article
25
- Vietnam Journal of Computer Science (Springer Nature), 2017, v. 4, n. 4, p. 245, doi. 10.1007/s40595-017-0095-3
- Demertzis, Konstantinos;
- Iliadis, Lazaros
- Article
26
- Applied Sciences (2076-3417), 2023, v. 13, n. 22, p. 12101, doi. 10.3390/app132212101
- Chen, Xiang;
- Wang, Wenbo;
- Han, Weitao
- Article
27
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 4699, doi. 10.3390/app13084699
- Negera, Worku Gachena;
- Schwenker, Friedhelm;
- Debelee, Taye Girma;
- Melaku, Henock Mulugeta;
- Feyisa, Degaga Wolde
- Article
28
- Applied Sciences (2076-3417), 2022, v. 12, n. 10, p. 4969, doi. 10.3390/app12104969
- Patel, Himanshu;
- Patel, Deep;
- Ahluwalia, Jaspreet;
- Kapoor, Vaishali;
- Narasimhan, Karthik;
- Singh, Harmanpreet;
- Kaur, Harmanjot;
- Reddy, Gadi Harshitha;
- Peruboina, Sai Sushma;
- Butakov, Sergey
- Article
29
- Applied Sciences (2076-3417), 2022, v. 12, n. 7, p. 3234, doi. 10.3390/app12073234
- Hernandez-Suarez, Aldo;
- Sanchez-Perez, Gabriel;
- Toscano-Medina, Linda K.;
- Olivares-Mercado, Jesus;
- Portillo-Portilo, Jose;
- Avalos, Juan-Gerardo;
- García Villalba, Luis Javier
- Article
30
- Applied Sciences (2076-3417), 2022, v. 12, n. 3, p. 1076, doi. 10.3390/app12031076
- Pérez-Sánchez, Antonio;
- Palacios, Rafael
- Article
31
- Applied Sciences (2076-3417), 2020, v. 10, n. 22, p. 7975, doi. 10.3390/app10227975
- Iadarola, Giacomo;
- Martinelli, Fabio;
- Mercaldo, Francesco;
- Santone, Antonella
- Article
32
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6254876
- Zhang, Zhen-Hao;
- Song, Yurong;
- Xia, Lingling;
- Li, Yin-Wei;
- Zhang, Liang;
- Jiang, Guo-Ping
- Article
33
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4691203
- Article
34
- Journal of Cybersecurity & Privacy, 2025, v. 5, n. 1, p. 4, doi. 10.3390/jcp5010004
- Article
35
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 2, p. 153, doi. 10.3390/jcp4020008
- Rose, Anthony J.;
- Graham, Scott R.;
- Schubert Kabban, Christine M.;
- Krasnov, Jacob J.;
- Henry, Wayne C.
- Article
36
- TEM Journal, 2013, v. 2, n. 1, p. 83, doi. 10.18421/tem21-12
- T.A., Markina;
- A.A., Ogolyuk
- Article
37
- Neural Computing & Applications, 2022, v. 34, n. 18, p. 15165, doi. 10.1007/s00521-021-06755-4
- Seraj, Saeed;
- Khodambashi, Siavash;
- Pavlidis, Michalis;
- Polatidis, Nikolaos
- Article
38
- Neural Computing & Applications, 2017, v. 28, p. 699, doi. 10.1007/s00521-016-2374-9
- Astorino, A.;
- Chiarello, A.;
- Gaudioso, M.;
- Piccolo, A.
- Article
39
- African Journal of Computing & ICT, 2020, v. 13, n. 3, p. 42
- Subairu, S. O.;
- Alhassan, J. K.;
- Nwaocha, V. O.;
- Saidu, I. R.
- Article
40
- IETE Technical Review, 2022, v. 39, n. 2, p. 433, doi. 10.1080/02564602.2020.1854058
- Article
41
- Journal of ICT Research & Applications, 2021, v. 15, n. 3, p. 265, doi. 10.5614/itbj.ict.res.appl.2021.15.3.5
- Habtor, Saleh Abdulaziz;
- Dahah, Ahmed Haidarah Hasan
- Article
42
- Revista Cubana de Ciencias Informáticas, 2012, v. 6, n. 4, p. 62
- Hernández Moya, Yurisleidy;
- Hernández Barreiro, Daileny;
- Sánchez Arce, Luis Enrique;
- Lobaina Guzmán, Juan Carlos;
- Ripoll Méndez, Dovier Antonio
- Article
43
- Journal of Information Warfare, 2024, v. 23, n. 4, p. 1
- Article
44
- Wireless Personal Communications, 2021, v. 121, n. 3, p. 1945, doi. 10.1007/s11277-021-08748-x
- Kumari, Sangeeta;
- Upadhyay, Ranjit Kumar
- Article
45
- Wireless Personal Communications, 2018, v. 103, n. 4, p. 2947, doi. 10.1007/s11277-018-5982-0
- Liu, Yu;
- Zhang, Liqiang;
- Huang, Xiangdong
- Article
46
- Electrica, 2023, v. 23, n. 3, p. 634, doi. 10.5152/electrica.2023.23043
- Gülataş, İbrahim;
- Kılınç, Hacı Hakan;
- Aydın, Muhammed Ali;
- Zaim, Abdul Halim
- Article
47
- ISACA Journal, 2023, n. 5, p. 24
- GROSSER, PETER;
- BURCH, GERALD F.
- Article
48
- British Journal of Healthcare Computing & Information Management, 2010, p. 21
- Article
49
- International Journal of Information Security, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s10207-021-00577-0
- Koike, Kazuki;
- Kobayashi, Ryotaro;
- Katoh, Masahiko
- Article
50
- International Journal of Information Security, 2022, v. 21, n. 1, p. 61, doi. 10.1007/s10207-021-00541-y
- Lyvas, Christos;
- Ntantogian, Christoforos;
- Xenakis, Christos
- Article