Showing
1 - 1
results of
1
for search '
'
Skip to content
Home
Collections
High Impact Articles
Jawi Collection
Malay Medicine
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Reset Filters
Suggested Topics:
Malware interception
Reset Filters
Show filters (1)
Suggested Topics:
Malware interception
Search Results
Suggested Topics within your search.
Suggested Topics within your search.
Code
1
Decoy
1
Deep learning
1
Fingerprint Recognition
1
Malware
1
Malware interception
Malwares
1
Neural networks
1
OPC
1
Operating system kernel
1
Palmprint recognition
1
Performances evaluation
1
Probes
1
Resource management
1
decoy
1
deep learning
1
operating system kernel
1
Showing
1 - 1
results of
1
for search '
'
, query time: 0.05s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Decoy Processes With Optimal Performance Fingerprints
by
Rrushi, J.L
,
Sutton, S.M
Published 2023
Call Number:
Loading...
Located:
Loading...
View Fulltext in Publisher
View in Scopus
Article
Search Tools:
Get RSS Feed
—
Email this Search
Back
Narrow Search
Format
Article
1
Sources
List of Scopus
1
Collections
High Impact Journal
1
Author
Rrushi, J.L
1
Sutton, S.M
1
Language
English
1
Year of Publication
From:
To:
Loading...