نتایج جستجو برای: malicious
تعداد نتایج: 12653 فیلتر نتایج به سال:
MD, Corresponding author, academic member, Iranian Institute for Encyclopedia research, Department of Medical Sciences, MSRT, Allameh Tababataei University, Tehran, Iran, PO Box 19615-866, E mail: [email protected] MD, Faculty of Medicine, Tehran University of Medical Sciences, Tehran, Iran. MSc, Special Medical Center, Tehran, Iran MSc, Biology Department, Science and Research Branch, Islami...
Knowledge sharing and transfer are essential for learning in groups, especially when group members have different disciplinary expertise and collaborate online. ComputerSupported Collaborative Learning (CSCL) environments have been designed to facilitate transactive knowledge sharing and transfer in collaborative problem-solving settings. This study investigates how knowledge sharing and transf...
In this paper the noise suppression with the help of a wavelet transform in synthesis imaging is presented. The method has been used to treat dirty maps observed with the Miyun Synthesis Radio Telescope (MSRT), and the results indicate that the de-noising with the help of the wavelet transform is satisfactory and prospective.
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...
Malicious software is one of the concerns of the contemporary computing environment. Malcontents, pranksters, vandals, and adversaries all have the potential ability to disrupt the conduct of our computing business. Prudence dictates that we analyze the situation and take appropriate countermeasures. As with other concerns, the first responsive step is to perform a risk analysis. In the risk an...
IntroductIon Malicious software (malware) allows an intruder to take over or damage a target host without the owner's consent and often without his or her knowledge. Over the past thirty years, malware has become a more serious worldwide problem as Internet-connected computers have proliferated and operating systems have become more complex. Today, the average PC user must be more cognizant of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید