لینک های اصلی
انواع جستجو
ارتباط
پیشنهادها
صفحه اصلی/فنی و مهندسی
Mahan_rg
nima20
m_karimkhani
Rezaei_b
faramarz3211
نمایش
علاقه مندی ها +
Linear stability of delayed reaction–diffusion systems
20000 تومان
A saddle point least squares approach for primal mixed formulations of second order PDEs
Stability analysis of a stage structure model with spatiotemporal delay effect
30000 تومان
Lie symmetry analysis and exact solutions of (3+1) dimensional Yu–Toda–Sasa–Fukuyama equation in mathematical physics
A modified second-order Arnoldi method for solving the quadratic eigenvalue problems
A class of modified FR conjugate gradient method and applications to non-negative matrix factorization
Derivative-free restrictively preconditioned conjugate gradient path method without line search technique for solving linear equality constrained optimization✩
A nonmonotone PRP conjugate gradient method for solving square and under-determined systems of equations
Finite difference approximation of space-fractional diffusion problems: The matrix transformation method
Abundant lump-type solutions of the Jimbo–Miwa equation in (3 + 1)-dimensions
Periodic attractor for reaction–diffusion high-order Hopfield neural networks with time-varying delays
Rational solutions and lump solutions to the generalized (3 + 1)-dimensional Shallow Water-like equation✩
Bandwidth selection of nonparametric threshold estimator in jump–diffusion models
Residual based error estimate and quasi-interpolation on polygonal meshes for high order BEM-based FEM
A new LES model derived from generalized Navier–Stokes equations with nonlinear viscosity
On determinants of cyclic pentadiagonal matrices with Toeplitz structure
Visual malware detection using local malicious pattern
Clustering for malware classification
A comparison of static, dynamic, and hybrid analysis for malware detection
A graph-based model for malware detection and classification using system-call groups
Identification of malicious android app using manifest and opcode features
Semantics-aware detection of targeted attacks: a survey
Chronicle of a Java Card death
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware
The other guys: automated analysis of marginalized malware
Plaintext side channels in TLS Chiphertex
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection
Secure and light IoT protocol (SLIP) for anti-hacking
Secure information authentication protocol between patients and medical staff in a hospital environment
A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news
اشتراک در خبرنامه ما
و دریافت آخرین اخبار و پیشنهادات