-
1
The Rise of “malware”: Bibliometric Analysis of Malware Study
Published 2016Subjects: “…QA76 Computer software…”
Get full text
Article -
2
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
Published 2017Subjects: “…QA76 Computer software…”
Get full text
Get full text
Article -
3
Detecting opinion spams through supervised boosting approach
Published 2018Subjects: “…QA76 Computer software…”
Get full text
Get full text
Article -
4
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
Published 2018Subjects: “…QA76 Computer software…”
Get full text
Article -
5
Augmented reality: Effect on conceptual change of scientific
Published 2019Subjects: “…QA76 Computer software…”
Get full text
Article -
6
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
Published 2020Subjects: “…QA76 Computer software…”
Get full text
Conference or Workshop Item -
7
The prediction of undergraduate student performance in chemistry course using multilayer perceptron
Published 2020Subjects: “…QA76 Computer software…”
Get full text
Conference or Workshop Item -
8
Towards a systematic description of the feld using bibliometric analysis
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Article -
9
A static analysis approach for android permission-based malware detection systems
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Article -
10
A review : Static analysis of android malware and detection technique
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Conference or Workshop Item -
11
Geofence alerts application with GPS tracking for children monitoring (CTS)
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Get full text
Conference or Workshop Item -
12
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Article -
13
New formula to calculate the number of designs in RADG cryptosystem
Published 2021Subjects: “…QA76 Computer software…”
Get full text
Article -
14
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
Published 2022Subjects: “…QA76 Computer software…”
Get full text
Article -
15
Deep learning based hybrid analysis of malware detection and classification: A recent review
Published 2023Subjects: “…QA76 Computer software…”
Get full text
Get full text
Article -
16
Validity of fisher effect theory: Evidence from the conventional and Islamic money market in Malaysia
Published 2021Subjects: Get full text
Article -
17
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
Published 2019Subjects: Get full text
Conference or Workshop Item -
18
The rise of “blockchain”: bibliometric analysis of blockchain study
Published 2019Subjects: “…QA76 Computer software…”
Get full text
Article -
19
Systematic description of the internet of things: A bibliometric analysis
Published 2022Subjects: Get full text
Article -
20