X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
bioinformatics (2) 2
calculating (2) 2
computing (2) 2
counting (2) 2
electric digital data processing (2) 2
physics (2) 2
1584-1655 (1) 1
1588-1657 (1) 1
acetyl-l-carnitine (1) 1
acetylcarnitine - pharmacology (1) 1
acetylcholine (1) 1
active avoidance behavior (1) 1
agrumes (1) 1
analysensystem (1) 1
animals (1) 1
aquarellen (1) 1
arbeitsbedingung (1) 1
art (1) 1
art collections (1) 1
art collections, private (1) 1
arts (1) 1
aurantium, citrus (1) 1
banksealer (1) 1
behavior, animal - drug effects (1) 1
bergamia, citrus (1) 1
betriebssystem (1) 1
betrug (1) 1
betrugsaufdeckung (1) 1
biology (1) 1
bitter orange tree (1) 1
bitter orange trees (1) 1
botanical illustration (1) 1
carnitine - analogs & derivatives (1) 1
catalogs (1) 1
catalogs and collections (1) 1
catalogues (1) 1
citron tree (1) 1
citron trees (1) 1
citrus (1) 1
citrus aurantium (1) 1
citrus aurantiums (1) 1
citrus bergamia (1) 1
citrus bergamias (1) 1
citrus fruit (1) 1
citrus fruits in art (1) 1
citrus grandi (1) 1
citrus grandis (1) 1
citrus hystrices (1) 1
citrus hystrix (1) 1
citrus limon (1) 1
citrus maxima (1) 1
citrus medica (1) 1
citrus medicas (1) 1
citrus reticulata (1) 1
citrus reticulatas (1) 1
citrusvruchten (1) 1
collections d'art (1) 1
computer science, information systems (1) 1
conditioning, operant - drug effects (1) 1
dal pozzo, cassiano (1) 1
dal pozzo, cassiano, 1588-1657 (1) 1
dal pozzo, cassiano, 1588-1657 art collections (1) 1
dal pozzo, cassiano, 1588-1657 natural history collections (1) 1
dans l'art (1) 1
dessin de la renaissance (1) 1
detektorsystem (1) 1
drawing, italian (1) 1
entscheidungsunterstützungssystem (1) 1
extinction, psychological - drug effects (1) 1
ferrari, giovanni battista (1) 1
ferrari, giovanni battista, 1584-1655 (1) 1
ferrari, giovanni battista, 1584-1655. hesperides (1) 1
file-system (1) 1
fraud and anomaly detection (1) 1
fruit in art (1) 1
fruit, citrus (1) 1
fruits (1) 1
genussmittel (1) 1
hystrices, citrus (1) 1
iconografie (1) 1
injections, intraperitoneal (1) 1
injections, intraventricular (1) 1
intrusion (1) 1
italian watercolor painting (1) 1
kaffir lime (1) 1
katalog (1) 1
kipphebel (1) 1
körnigkeit (1) 1
lemon tree (1) 1
lemon trees (1) 1
lime, kaffir (1) 1
male (1) 1
malware (1) 1
mandarin orange tree (1) 1
mandarin orange trees (1) 1
maxima, citrus (1) 1
medicas, citrus (1) 1
medicine (1) 1
memory - drug effects (1) 1
mimicry attack (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


F1000Research, ISSN 2046-1402, 2014, Volume 3, p. 140
Comparing protein interaction networks can reveal interesting patterns of interactions for a specific function or process in distantly related species. In this... 
Bioinformatics
Journal Article
F1000Research, ISSN 2046-1402, 2014, Volume 3, p. 140
Comparing protein interaction networks can reveal interesting patterns of interactions for a specific function or process in distantly related species. In this... 
Bioinformatics
Journal Article
ACM International Conference Proceeding Series, 12/2016, Volume 5-9-, pp. 336 - 347
Conference Proceeding
06/2018
A protection system and a protection method for protecting a computer system against ransomware attacks is provided. The system and method effectively detect... 
COMPUTING | COUNTING | PHYSICS | ELECTRIC DIGITAL DATA PROCESSING | CALCULATING
Patent
06/2018
The protection system for protecting computer system against ransomware attacks, comprising: an I/O manager for intercepting I/O request packets from a... 
COMPUTING | COUNTING | PHYSICS | ELECTRIC DIGITAL DATA PROCESSING | CALCULATING
Patent
Proceedings of the 32nd Annual Conference on computer security applications, 12/2016, pp. 336 - 347
Preventive and reactive security measures can only partially mitigate the damage caused by modern ransomware attacks. Indeed, the remarkable amount of illicit... 
Conference Proceeding
Journal Article
ACM Transactions on Privacy and Security, ISSN 2471-2566, 06/2018, Volume 21, Issue 3
The significant growth of banking fraud, fueled by the underground economy of malware, has raised the need for effective detection systems. Therefore, in the... 
Online banking | Fraud and anomaly detection | Spending pattern granularity analysis | Mimicry attack | mimicry attack | spending pattern granularity analysis | COMPUTER SCIENCE, INFORMATION SYSTEMS | fraud and anomaly detection | INTRUSION | BANKSEALER
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.