Results 121 to 130 of about 21,953 (219)
Efficient feature ranked hybrid framework for android Iot malware detection. [PDF]
Saeed NH +3 more
europepmc +1 more source
Contesting Regulatory Capacity: Exploring Doctrines in the Regulatory State
ABSTRACT The contemporary literature on regulation and development has emphasised the importance of low discretion devices for achieving desired policy objectives. At the same time, there has been a growing recognition that state capacity in general, and regulatory capacity more specifically, are essential for achieving development goals in a world of ...
Bruno Queiroz Cunha, Martin Lodge
wiley +1 more source
Semantic code clone detection using hybrid intermediate representations and BiLSTM networks. [PDF]
Shahbaz Ismail M, Shahzad S, Quradaa FH.
europepmc +1 more source
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien +2 more
wiley +1 more source
JDroid: Android malware detection using hybrid opcode feature vector. [PDF]
Arslan RS.
europepmc +1 more source
ABSTRACT The lack of a common variable for comparison has been a major obstacle to the development of Comparative Public Administration (CPA). State autonomy enables an integrative contextualization approach, allowing both the analysis of contextual individual country experiences and the generation of generalized comparable knowledge.
Wilson Wong
wiley +1 more source
Graph-augmented multi-modal learning framework for robust android malware detection. [PDF]
Tanveer MU +5 more
europepmc +1 more source
ABSTRACT Although some studies focus on how bureaucrats' interactions with one another affect performance, they rarely focus on why these public servants collaborate. Bureaucrats' collaboration matters because it can significantly contribute to achieving policy goals.
Nathalie Mendez
wiley +1 more source
Tunnel enabled programmable switches obfuscate network topology to defend against link flooding reconnaissance in software defined networking. [PDF]
Li X, Lee J, Son J, Lee Y.
europepmc +1 more source
Methods for safely sharing dual-use genetic data. [PDF]
Sawaya S +4 more
europepmc +1 more source

