skip to main content
Language:
Primo Advanced Search
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search Query Term
Primo Advanced Search prefilters

Results 1 - 20 of 3,475  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Data at rest analysis for an APT detection Treatment of code overlap by static analysis
Material Type:
Article
Add to My Research

Data at rest analysis for an APT detection Treatment of code overlap by static analysis

International journal of digital information and wireless communications, 2021-10, Vol.11 (4), p.75

COPYRIGHT 2021 The Society of Digital Information and Wireless Communications ;ISSN: 2225-658X ;EISSN: 2225-658X

Full text available

2
Three responses to the Trojan Horse Affair podcast
Material Type:
Article
Add to My Research

Three responses to the Trojan Horse Affair podcast

Soundings (London, England), 2022-06, Vol.81 (81), p.106-109 [Peer Reviewed Journal]

COPYRIGHT 2022 Lawrence & Wishart Ltd. ;ISSN: 1362-6620 ;EISSN: 1741-0797 ;DOI: 10.3898/SOUN:81.REVIEWS.2022

Full text available

3
Macrophages: a Trojan horse in COVID-19?
Material Type:
Article
Add to My Research

Macrophages: a Trojan horse in COVID-19?

Nature reviews. Immunology, 2020-06, Vol.20 (6), p.351-351 [Peer Reviewed Journal]

COPYRIGHT 2020 Nature Publishing Group ;Springer Nature Limited 2020. ;Springer Nature Limited 2020 ;ISSN: 1474-1733 ;EISSN: 1474-1741 ;DOI: 10.1038/s41577-020-0317-2 ;PMID: 32303696

Full text available

4
Saifan and the Weaponization of Trade Secrets
Material Type:
Article
Add to My Research

Saifan and the Weaponization of Trade Secrets

Verfassungsblog, 2023-06 (2366-7044) [Peer Reviewed Journal]

EISSN: 2366-7044

Full text available

5
The Role and Regulation of Thromboxane A[sub.2] Signaling in Cancer-Trojan Horses and Misdirection
Material Type:
Article
Add to My Research

The Role and Regulation of Thromboxane A[sub.2] Signaling in Cancer-Trojan Horses and Misdirection

Molecules (Basel, Switzerland), 2022-09, Vol.27 (19) [Peer Reviewed Journal]

COPYRIGHT 2022 MDPI AG ;ISSN: 1420-3049 ;EISSN: 1420-3049 ;DOI: 10.3390/molecules27196234

Full text available

6
Android Spyware Detection Using Machine Learning: A Novel Dataset
Material Type:
Article
Add to My Research

Android Spyware Detection Using Machine Learning: A Novel Dataset

Sensors (Basel, Switzerland), 2022-08, Vol.22 (15), p.5765 [Peer Reviewed Journal]

2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2022 by the authors. 2022 ;ISSN: 1424-8220 ;EISSN: 1424-8220 ;DOI: 10.3390/s22155765 ;PMID: 35957337

Full text available

7
An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL)
Material Type:
Article
Add to My Research

An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL)

PloS one, 2024-05, Vol.19 (5), p.e0302196-e0302196 [Peer Reviewed Journal]

Copyright: © 2024 Sankaranarayanan et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. ;COPYRIGHT 2024 Public Library of Science ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0302196 ;PMID: 38820435

Full text available

8
Is It Legal?
Material Type:
Article
Add to My Research

Is It Legal?

Journal of intellectual freedom & privacy, 2021-06, Vol.6 (1), p.17-18

Copyright American Library Association Spring 2021 ;ISSN: 2474-7459 ;EISSN: 2474-7459 ;DOI: 10.5860/jifp.v6i1.7595

Full text available

9
Mobile Spyware Identification and Categorization: A Systematic Review
Material Type:
Article
Add to My Research

Mobile Spyware Identification and Categorization: A Systematic Review

Informatica (Ljubljana), 2023-09, Vol.47 (8) [Peer Reviewed Journal]

ISSN: 0350-5596 ;EISSN: 1854-3871 ;DOI: 10.31449/inf.v47i8.4881

Full text available

10
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
Material Type:
Article
Add to My Research

A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things

IET communications, 2022-03, Vol.16 (5), p.421-432 [Peer Reviewed Journal]

2021 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology ;ISSN: 1751-8628 ;EISSN: 1751-8636 ;DOI: 10.1049/cmu2.12301

Full text available

11
In Silico Analysis of the Ga[sup.3+]/Fe[sup.3+] Competition for Binding the Iron-Scavenging Siderophores of IP. aeruginosa/I—Implementation of Three Gallium-Based Complexes in the “Trojan Horse” Antibacterial Strategy
Material Type:
Article
Add to My Research

In Silico Analysis of the Ga[sup.3+]/Fe[sup.3+] Competition for Binding the Iron-Scavenging Siderophores of IP. aeruginosa/I—Implementation of Three Gallium-Based Complexes in the “Trojan Horse” Antibacterial Strategy

Biomolecules (Basel, Switzerland), 2024-04, Vol.14 (4) [Peer Reviewed Journal]

COPYRIGHT 2024 MDPI AG ;ISSN: 2218-273X ;EISSN: 2218-273X ;DOI: 10.3390/biom14040487

Full text available

12
Antibody-drug conjugates in solid tumors: a look into novel targets
Material Type:
Article
Add to My Research

Antibody-drug conjugates in solid tumors: a look into novel targets

Journal of hematology and oncology, 2021-01, Vol.14 (1), p.20-20, Article 20 [Peer Reviewed Journal]

COPYRIGHT 2021 BioMed Central Ltd. ;COPYRIGHT 2021 BioMed Central Ltd. ;2021. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2021 ;ISSN: 1756-8722 ;EISSN: 1756-8722 ;DOI: 10.1186/s13045-021-01035-z ;PMID: 33509252

Full text available

13
A novel hardware Trojan detection method based on sweep‐frequency test
Material Type:
Article
Add to My Research

A novel hardware Trojan detection method based on sweep‐frequency test

Electronics letters, 2022-11, Vol.58 (23), p.887-889 [Peer Reviewed Journal]

2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 0013-5194 ;EISSN: 1350-911X ;DOI: 10.1049/ell2.12630

Full text available

14
Secure PIN-Entry Method Using One-Time PIN (OTP)
Material Type:
Article
Add to My Research

Secure PIN-Entry Method Using One-Time PIN (OTP)

IEEE access, 2023, Vol.11, p.18121-18133 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2023.3243114 ;CODEN: IAECCG

Full text available

15
Spyware in intelligence espionage operations as a threat to the state
Material Type:
Article
Add to My Research

Spyware in intelligence espionage operations as a threat to the state

Kyiv-Mohyla law & politics journal, 2023-12, Vol.8-9, p.161-171 [Peer Reviewed Journal]

EISSN: 2414-9942 ;DOI: 10.18523/kmlpj303225.2023-8-9.161-171

Full text available

16
Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines
Material Type:
Article
Add to My Research

Detection and Elimination of Spyware and Ransomware by Intercepting Kernel-Level System Routines

IEEE access, 2018, Vol.6, p.78321-78332 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2018.2884964 ;CODEN: IAECCG

Full text available

17
GSB: GNGS and SAG-BiGRU network for malware dynamic detection
Material Type:
Article
Add to My Research

GSB: GNGS and SAG-BiGRU network for malware dynamic detection

PloS one, 2024-04, Vol.19 (4), p.e0298809-e0298809 [Peer Reviewed Journal]

Copyright: © 2024 Hu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. ;COPYRIGHT 2024 Public Library of Science ;2024 Hu et al 2024 Hu et al ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0298809 ;PMID: 38635682

Full text available

18
AMDDLmodel: Android smartphones malware detection using deep learning model
Material Type:
Article
Add to My Research

AMDDLmodel: Android smartphones malware detection using deep learning model

PloS one, 2024-01, Vol.19 (1), p.e0296722-e0296722 [Peer Reviewed Journal]

Copyright: © 2024 Aamir et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. ;COPYRIGHT 2024 Public Library of Science ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0296722 ;PMID: 38241330

Full text available

19
Z2F: Heterogeneous graph-based Android malware detection
Material Type:
Article
Add to My Research

Z2F: Heterogeneous graph-based Android malware detection

PloS one, 2024-03, Vol.19 (3), p.e0300975-e0300975 [Peer Reviewed Journal]

Copyright: © 2024 Ma, Luktarhan. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. ;COPYRIGHT 2024 Public Library of Science ;2024 Ma, Luktarhan 2024 Ma, Luktarhan ;ISSN: 1932-6203 ;EISSN: 1932-6203 ;DOI: 10.1371/journal.pone.0300975 ;PMID: 38547074

Full text available

20
Applicability of machine learning in spam and phishing email filtering: review and approaches
Material Type:
Article
Add to My Research

Applicability of machine learning in spam and phishing email filtering: review and approaches

The Artificial intelligence review, 2020-10, Vol.53 (7), p.5019-5081 [Peer Reviewed Journal]

Springer Nature B.V. 2020 ;COPYRIGHT 2020 Springer ;Springer Nature B.V. 2020. ;ISSN: 0269-2821 ;EISSN: 1573-7462 ;DOI: 10.1007/s10462-020-09814-9

Full text available

Results 1 - 20 of 3,475  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (423)

Refine My Results

Creation Date 

From To
  1. Before 2005  (149)
  2. 2005 To 2009  (1,250)
  3. 2010 To 2014  (1,341)
  4. 2015 To 2020  (336)
  5. After 2020  (403)
  6. More options open sub menu

Language 

  1. English  (3,468)
  2. Japanese  (8)
  3. Czech  (4)
  4. Spanish  (3)
  5. German  (2)
  6. Portuguese  (1)
  7. Catalan  (1)
  8. Chinese  (1)
  9. More options open sub menu

Searching Remote Databases, Please Wait