What If Trojan Horse Nanoparticles Could Change the Game for HPV Gene-Targeted Therapies? [PDF]
Chokwassanasakulkit T +4 more
europepmc +1 more source
Hierarchical malware detection, family identification, and variant attribution using CNN-based hybrid models on grayscale executable images. [PDF]
Saxena M, Das T.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
Pathogenesis of tubercular retinal vasculitis: An ongoing quest. [PDF]
Putera I +4 more
europepmc +1 more source
A Review: The Beauty of Serendipity Between Integrated Circuit Security and Artificial Intelligence. [PDF]
Dong C +7 more
europepmc +1 more source
Near-Field Microwave Sensing for Chip-Level Tamper Detection. [PDF]
Saadat Safa M, Tajik S.
europepmc +1 more source
Trojan horse in obstetric complications: A case report of concurrent uterine perforation, incarcerated fallopian tube and cesarean section scar pregnancy. [PDF]
Wang L, Chen X.
europepmc +1 more source
MH-1M: A 1.34 Million-Sample Multi-Feature Android Malware Dataset with Rich Metadata. [PDF]
Bragança H +4 more
europepmc +1 more source
An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on <i>W</i> State Sharing of Specific Bits. [PDF]
Xing K, Lu R, Liu S, Lan L.
europepmc +1 more source
NASA'S <i>Lucy</i> Mission to Trojan Asteroids: Unraveling the History of the Outer Solar System. [PDF]
Levison HF +5 more
europepmc +1 more source

