Abstract: New types and variants of malware are constantly and rapidly being developed. Identifying malware effectively and quickly has become a primary goal of information security analysts. This ...
Abstract: With an ambitious increase in the number of Internet of Things (IoT) terminals, IoT networks face a huge challenge which is providing diverse and complex network services with different ...
This repository contains the source code used in our paper titled Yihe Pang, Bin Liu. DisoFLAG: Accurate prediction of protein intrinsic disorder and its functions using graph-based interaction ...
This is a textbook for an introductory combinatorics course lasting one or two semesters. An extensive list of problems, ranging from routine exercises to research questions, is included. In each ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results