Search

Your search keyword '"Troìa, A"' showing total 479 results

Search Constraints

Start Over You searched for: Author "Troìa, A" Remove constraint Author: "Troìa, A"
479 results on '"Troìa, A"'

Search Results

2. Feature Analysis of Encrypted Malicious Traffic

3. Advancement on Security Applications of Private Intersection Sum Protocol

4. Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

5. Creating Valid Adversarial Examples of Malware

6. Methylprednisolone alone or combined with cyclosporine or mycophenolate mofetil for the treatment of immune‐mediated hemolytic anemia in dogs, a prospective study

7. Classification and Online Clustering of Zero-Day Malware

8. Experimental Demonstration of ML-Based DWDM System Margin Estimation

9. Employing Channel Probing to Derive End-of-Life Service Margins for Optical Spectrum Services. To appear in OPTICA Journal of Optical Communications and Networking

10. Tolypella hispanica

11. Tolypella glomerata

12. Multifamily Malware Models

13. Generative Adversarial Networks and Image-Based Malware Classification

14. Hidden Markov Models with Momentum

16. Convolutional Neural Networks for Image Spam Detection

17. A Comparison of Static, Dynamic, and Hybrid Analysis for Malware Detection

19. 'To Be or Not to Be' a Conscientious Objector to Voluntary Abortion: An Italian Web-Survey of Healthcare Workers

20. Analysis of the nonlinear dynamics of a chirping-frequency Alfv\'en mode in a Tokamak equilibrium

21. Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

25. Clickbait Detection in YouTube Videos

26. Sentiment Analysis for Troll Detection on Weibo

27. Malware Classification Using Long Short-Term Memory Models

28. Malware Classification with Word Embedding Features

29. Aberrant Number of Vessels in the Umbilical Cord: What Do We Know?

30. Exploring the Father’s Role in Determining Neonatal Birth Weight: A Narrative Review

31. New-onset organ dysfunction as a screening tool for the identification of sepsis and outcome prediction in dogs with systemic inflammation

32. Relations Among Teachers’ Efficacy Beliefs, Knowledge, Preparation, Abilities, and Practices: Expanding Our Understanding of Teacher Characteristics That Impact Writing Instruction

33. BERT for Malware Classification

35. Clickbait Detection for YouTube Videos

37. Fake Malware Generation Using HMM and GAN

38. Menopausal Hormone Therapy, an Ever-Present Topic: A Pilot Survey about Women’s Experience and Medical Doctors’ Approach

41. A twin pregnancy with partial hydatidiform mole and a coexisting normal fetus delivered at term: A case report and literature review

42. A Comparative Analysis of Android Malware

43. Transfer Learning for Image-Based Malware Classification

44. Malware Detection Using Dynamic Birthmarks

46. Word Embeddings for Fake Malware Generation

47. Twitter Bots’ Detection with Benford’s Law and Machine Learning

48. A Blockchain-Based Tamper-Resistant Logging Framework

49. Robustness of Image-Based Malware Analysis

50. Advancement on Security Applications of Private Intersection Sum Protocol

Catalog

Books, media, physical & digital resources