نتایج جستجو برای: drug misuses
تعداد نتایج: 590094 فیلتر نتایج به سال:
About two years ago, I discussed in Current Content@ (C@ ) when and how it might be relevant to use citation analysis to evaluate faculty research. 1 On August 30, 1985, a symposium on the use and abuse of citation analysis was held at the annual meeting of the British Association for the Advancement of Science at the University of Strathclyde in Glasglow, Scotland. On that occasion, ISP’s dire...
s a lecturer of biomedical writing, I have usually been asked about the impact factor of journals and how authors can publish their scientific manuscripts in journals with high impact factors. This is particularly important for faculty members since recently, many officials in Iran evaluate the scientific merit of an article based on the impact factor of the journal that published it. Sometimes...
Software exploits are one of the major threats to the Internet security. A large family of exploits works by corrupting memory of the victim process to execute malicious code. To quickly respond to these attacks, it is critical to automatically diagnose such exploits to find out how they circumvent existing defense mechanisms. Because of the complexity of the victim programs and sophistication ...
API misuses are well-known causes of software crashes and security vulnerabilities. However, their detection repair is challenging given that the correct usages (third-party) api s might be obscure to developers client programs. This paper presents first empirical study assess ability existing ...
Several studies showed that misuses of cryptographic APIs are common in real-world code (e.g., Apache projects and Android apps). There exist several open-sourced commercial security tools automatically screen Java programs to detect misuses. To compare their accuracy guarantees, we develop two comprehensive benchmarks named CryptoAPI-Bench ApacheCryptoAPI-Bench. consists 181 unit test cases co...
This report considers the application of Artificial Intelligence (AI) techniques to the problem of misuse detection within telecommunications environments. A broad survey of techniques is provided, that covers inter alia rule based systems, case based reasoning, pattern matching, clustering and feature extraction, artificial neural networks, genetic algorithms, artificial immune systems, agent ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید