http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Detection-Process+INR+loc%3Ain Search: Malware Detection Process - Zipri.in

Malware Detection Process

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Malware-Detection-Process","processingTimeMs":1,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Malware-Detection-Process
                    [processingTimeMs] => 1
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Detection-Process+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"malware-detection-process inr loc:in","totalEstimatedMatches":137,"nextOffset":120,"currentOffset":0,"value":{"F39B59D7CE3AC2FA46D6C502492DB38E22D8217C":{"name":"flowchart for virus and antivirus class 7 computers - Brainly.in","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.zZrr1httjnNj0lSdF0gDnAHaG7?pid=Api","datePublished":"2023-06-04T22:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/dfc/4e2ff01cd6a15c17f111c3e9e09bff32.jpg","hostPageUrl":"https://brainly.in/question/56432416","contentSize":"38999 B","width":813,"height":761,"cDNContentUrl":"https://th.bing.com/th/id/R.cd9aebd61b6d8e7363d2549d1748039c?rik=P7mVfeyjLK9kbQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C7128D22E83BD294205C6D64AF2CA3EC7D95B93F","accentColor":"506D7B"},"CD0E854C1C74B3C5398C62BD2D0D78ADF13CEB70":{"name":"A Hierarchical Approach for Android Malware Detection Using ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.moafVx5BAlRnUa0S4iCN2gHaIc?pid=Api","datePublished":"2021-02-10T06:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-10-00432/article_deploy/html/images/electronics-10-00432-g001.png","hostPageUrl":"https://www.mdpi.com/2079-9292/10/4/432","contentSize":"740176 B","width":2391,"height":2725,"cDNContentUrl":"https://th.bing.com/th/id/R.9a869f571e4102546751ad12e2208dda?rik=3OBYxMFHO1yTyA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"07BEC31FDA87D0D2DB26C8935C3B47C1C458E0DC","accentColor":"0095CC"},"D5223CDFCC0073ABBB7549527E527F1AD60BCE0B":{"name":"Adversarial Samples on Android Malware Detection Systems for IoT Systems","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.vgT40Vv92Rt_kgQmjhzKxgHaFE?pid=Api","datePublished":"2019-02-25T13:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/sensors/sensors-19-00974/article_deploy/html/images/sensors-19-00974-g001.png?1571144142","hostPageUrl":"https://www.mdpi.com/1424-8220/19/4/974","contentSize":"1678304 B","width":3101,"height":2120,"cDNContentUrl":"https://th.bing.com/th/id/R.be04f8d15bfdd91b7f9204268e1ccac6?rik=XSLD%2fcwAN7q7Vw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B0ECB06DA1F725E7259457BBBA3700CCFDC3225D","accentColor":"CB9A00"},"FD14FE0584D06452FCF5E171BDAD72310668801A":{"name":"Phishing Email Detection Model Using Deep Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.NbSx3WIpuc4QWhS2df0UcwHaFJ?pid=Api","datePublished":"2023-10-15T06:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/electronics/electronics-12-04261/article_deploy/html/images/electronics-12-04261-g003.png?1697351114","hostPageUrl":"https://www.mdpi.com/2079-9292/12/20/4261","contentSize":"1005314 B","width":3129,"height":2178,"cDNContentUrl":"https://th.bing.com/th/id/R.35b4b1dd6229b9ce105a14b675fd1473?rik=30HvUEgNRiXPXw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A10886601327DADB171E5FCF25460D4850EF41DF","accentColor":"CAC901"},"807199F9C7BFACF6AA6A59EB2A053D1F828A25B7":{"name":"Malware Forensics Guide – Static and Dynamic Approach – Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api","datePublished":"2017-02-03T18:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png","hostPageUrl":"https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/","contentSize":"451756 B","width":1600,"height":764,"cDNContentUrl":"https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708","accentColor":"CB7600"},"5C0039107061BB6D1830EF8F2E93808CC1945A76":{"name":"Robust Intelligent Malware Detection Using Deep Learning | S-Logix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api","datePublished":"2022-06-16T23:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/","contentSize":"40012 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67A5491CC80839E2F8FE0381D6BB1607019300C5","accentColor":"004B95"},"2AC87FD22BA2E9892DCA280589D628277EBDC538":{"name":"Malaria Detection Accelerated: Combing a High-Throughput NanoZoomer ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.z6bwlkmpAj4a4MjNSWQKaAHaGW?pid=Api","datePublished":"2022-10-14T08:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/pathogens/pathogens-11-01182/article_deploy/html/images/pathogens-11-01182-g001.png","hostPageUrl":"https://www.mdpi.com/2076-0817/11/10/1182","contentSize":"1099881 B","width":3622,"height":3110,"cDNContentUrl":"https://th.bing.com/th/id/R.cfa6f09649a9023e1ae0c8cd49640a68?rik=ooz3LbIqnpjSrA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"835CDBE772826D985082ACD2989E2AB22DF78CA2","accentColor":"8E2020"},"8F9A0CEEE9D005F0C7173C0B12A2447EF043D9D5":{"name":"Malware Detection System Project","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Qxkt11bUWWVhvjh1NAwlkAHaEK?pid=Api","datePublished":"2023-11-05T14:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/sytw02floHA/maxresdefault.jpg","hostPageUrl":"https://www.finalproject.in/post/malware-detection-system-project","contentSize":"101684 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.43192dd756d4596561be3875340c2590?rik=%2bKnA7p4NUA98cQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D9D340FE7442A21B0C3717C0F500D9EEEC0A9F8","accentColor":"C5A506"},"0AA93679CCE508ABB4A3596E39D399DD9CC25B8B":{"name":"Exploit Kit - Definition - Trend Micro IN","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.AXSfjXG_lnLSRwwaszRn6gHaEP?pid=Api","datePublished":"2019-04-09T01:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://documents.trendmicro.com/images/tex/articles/exploitkit-figure-1.jpg","hostPageUrl":"http://www.trendmicro.co.in/vinfo/in/security/definition/exploit-kit","contentSize":"123862 B","width":1500,"height":858,"cDNContentUrl":"https://th.bing.com/th/id/R.01749f8d71bf9672d2470c1ab33467ea?rik=oJpjl8xegLpLOg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B8B52CC9DD993D93E6953A4BBA805ECC97639AA0","accentColor":"C78B04"},"F3BB1DE963B79ACE3C00B7F57E6423896DFAB40C":{"name":"Recent Advances in Understanding R-Process Nucleosynthesis in Metal ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.nBza4jfLLO0XyobJjKVY9AHaEa?pid=Api","datePublished":"2026-01-18T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/universe/universe-11-00229/article_deploy/html/images/universe-11-00229-g001.png?1752225193","hostPageUrl":"https://www.mdpi.com/2218-1997/11/7/229","contentSize":"574256 B","width":2406,"height":1432,"cDNContentUrl":"https://th.bing.com/th/id/R.9c1cdae237cb2ced17ca86c98ca558f4?rik=P7vRnjZ7qezDAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C04BAFD6983246E75F7B00C3ECA97B369ED1BB3F","accentColor":"0BA8C0"},"21FAADFFC0612CF3545CC9DC274051627469C89E":{"name":"Similarity-Based Malware Classification Using Graph Neural Networks","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.1a6qrTBJytHiRKLsZ4wpigHaDI?pid=Api","datePublished":"2022-10-26T09:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g001.png?1667885589","hostPageUrl":"https://www.mdpi.com/2076-3417/12/21/10837","contentSize":"1009729 B","width":3306,"height":1395,"cDNContentUrl":"https://th.bing.com/th/id/R.d5aeaaad3049cad1e244a2ec678c298a?rik=Eq%2fa%2fwwWwj9FxQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E98C964726150472CD9CC5453FC2160CFFDAAF12","accentColor":"C47107"},"57B8EF721DB42607C5EE731E928323A8CA7FB4CF":{"name":"Next-Generation Sequencing in the Human Respiratory Virome Study ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.bCSjFYi0iI1smkv5h26_8AHaD5?pid=Api","datePublished":"2022-12-17T10:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://encyclopedia.pub/media/item_content/202212/638960020f7ddmicroorganisms-10-02327-g002.png","hostPageUrl":"https://encyclopedia.pub/entry/37647","contentSize":"514994 B","width":3177,"height":1673,"cDNContentUrl":"https://th.bing.com/th/id/R.6c24a31588b4888d6c9a4bf9876ebff0?rik=dYv%2bJ9FLYnBc7g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FC4BF7AC8A323829E137EE5C70624BD127FE8B75","accentColor":"BD4D0E"},"021999917F826C745E085E3DFA7447FA5E21620E":{"name":"Malware Removal","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.4MrmadfsCUUlK6DaMIH3bgHaEE?pid=Api","datePublished":"2021-04-09T20:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://codelancer.in/assets/img/services-details/malwareremoval.png","hostPageUrl":"https://codelancer.in/malwareremoval","contentSize":"486864 B","width":820,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.e0cae669d7ec0945252ba0da3081f76e?rik=IJGZGfcoxkflgA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E02612E5AF7447AFD3E580E547C628F719999120","accentColor":"B88F13"},"79AE0CE9FBCC7A8C943A825B7E0A1A11ACE8D32E":{"name":"Android Malware Detection Techniques: A Literature Review | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.4_dmO-uuOhgHwgBwxMbUpgHaDN?pid=Api","datePublished":"2022-08-26T00:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/digital-forensics/android-malware-detection-techniques-a-literature-review.jpg","hostPageUrl":"https://slogix.in/digital-forensics/android-malware-detection-techniques-a-literature-review/","contentSize":"54400 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.e3f7663bebae3a1807c20070c4c6d4a6?rik=l%2brAnr%2fMp8hJow&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E23D8ECA11A1A0E7B528A349C8A7CCBF9EC0EA97","accentColor":"004B95"},"9550C50BCAAEC546DF8BF5CB127E0F677D69FD07":{"name":"Android malware detection using deep learning-Python Project | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.CwTFZNca78Dnt3u4kqMeMAHaDN?pid=Api","datePublished":"2022-05-06T05:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning/","contentSize":"61554 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.0b04c564d71aefc0e7b77bb892a31e30?rik=WQVcsKzqXGT9uA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70DF96D776F0E721BC5FB8FD645CEAACB05C0559","accentColor":"004A95"},"EDF40B6E649C863F2B78645D1784F7AE7C0EC803":{"name":"Available Programs","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.FwPH4YEfCGF63bCCM8yTwQHaEK?pid=Api","datePublished":"2025-08-13T17:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dfl.iiit.ac.in/fdp/fdp.png","hostPageUrl":"https://dfl.iiit.ac.in/courses","contentSize":"1023917 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.1703c7e1811f08617addb08233cc93c1?rik=3k%2bw5kbJaPOyhw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"308CE0C7EA7F4871D54687B2F368C946E6B04FDE","accentColor":"3C6F8F"},"C937FAEFED22AFFE9A40A8B4C330866216C10950":{"name":"Buy Malware Analysis and Intrusion Detection in Cyber-Physical Systems ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.9HlrQPHBb4f-i4mUwZUjEAAAAA?pid=Api","datePublished":"2023-10-05T23:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41gy9NvMP5L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Malware-Analysis-Intrusion-Detection-Cyber-Physical/dp/1668486679","contentSize":"21854 B","width":312,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.f4796b40f1c16f87fe8b8994c1952310?rik=nHOv%2ft4i%2bu%2bpBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"05901C612668033C4B8A04A9EFFA22DEFEAF739C","accentColor":"278DA4"},"9818C312E52C5592A87E06ED3EDD5024D9C0CFCD":{"name":"Trending Project Ideas for Final Year Students in Computer Science","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.5GXtgvxE0H9JtkhvxWfYQQHaEK?pid=Api","datePublished":"2025-01-24T15:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.wixstatic.com/media/11bc1d_65e12941da6c4a849abff1a1d579dfd0~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11bc1d_65e12941da6c4a849abff1a1d579dfd0~mv2.png","hostPageUrl":"https://www.finalproject.in/post/trending-project-ideas-for-final-year-students-in-computer-science","contentSize":"1016149 B","width":980,"height":551,"cDNContentUrl":"https://th.bing.com/th/id/R.e465ed82fc44d07f49b6486fc567d841?rik=iYE8IV7CVSmK5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DCFC0C9D4205DDE3DE60E78A2955C25E213C8189","accentColor":"966535"},"B0C5C445687A41A4DCCB1990A620B3A86FDA03BC":{"name":"7 Key Best Practices for Developing Secure Applications - Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.hNfWCd1wikwgJYBKySukVQHaEC?pid=Api","datePublished":"2025-03-19T02:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2025/03/malware-detection.jpg","hostPageUrl":"https://www.yeahhub.com/7-key-best-practices-for-developing-secure-applications/","contentSize":"89828 B","width":1596,"height":870,"cDNContentUrl":"https://th.bing.com/th/id/R.84d7d609dd708a4c2025804ac92ba455?rik=C1xMVIanFErNvA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CB30ADF68A3B026A0991BCCD4A14A786544C5C0B","accentColor":"31B417"},"4716BB7012FC885F49E85B0DE54791F92F8019D1":{"name":"How to Create a Netskope Profile | Dell India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.s1RIjHdvaj9_Ep8zd0lf8AHaFk?pid=Api","datePublished":"2021-04-11T21:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://supportkb.dell.com/img/ka06P000000QTl9QAG/ka06P000000QTl9QAG_en_US_8.jpeg","hostPageUrl":"https://www.dell.com/support/kbdoc/en-in/000126833/how-to-create-a-netskope-profile","contentSize":"26986 B","width":800,"height":601,"cDNContentUrl":"https://th.bing.com/th/id/R.b354488c776f6a3f7f129f3377495ff0?rik=dGG7ByHPiPWUjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1D9108F29F19745ED0B58E94F588CF2107BB6174","accentColor":"1595B6"},"97689A7C91702D7AF7AAC9DC274051627469C89E":{"name":"Similarity-Based Malware Classification Using Graph Neural Networks","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.gILvkPdVYVrKCsVl2n-6iAHaB_?pid=Api","datePublished":"2022-10-26T09:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g006.png","hostPageUrl":"https://www.mdpi.com/2076-3417/12/21/10837","contentSize":"347766 B","width":3285,"height":882,"cDNContentUrl":"https://th.bing.com/th/id/R.8082ef90f755615aca0ac565da7fba88?rik=eYapxxkH0qd%2fqg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E98C964726150472CD9CAA7FA7D20719C7A98679","accentColor":"187AB3"},"7E279B3706C1D5C43140C9DC274051627469C89E":{"name":"Similarity-Based Malware Classification Using Graph Neural Networks","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.I5SC9uKg8e_Z3voXG6T_1gHaDj?pid=Api","datePublished":"2022-10-26T09:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g009.png","hostPageUrl":"https://www.mdpi.com/2076-3417/12/21/10837","contentSize":"586641 B","width":3261,"height":1563,"cDNContentUrl":"https://th.bing.com/th/id/R.239482f6e2a0f1efd9defa171ba4ffd6?rik=53K5c2AcXUwTBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E98C964726150472CD9C04134C5D1C6073B972E7","accentColor":"C4B407"},"4406A69803D3A3ECDDBA49A5DDEEBEEC659E4AD0":{"name":"Building Resilience in Manufacturing: The Critical Need for OT ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.J5GH5VkD-ZMo9UlWTXOJOgHaEK?pid=Api","datePublished":"2024-12-10T16:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rockwellautomation.scene7.com/is/image/rockwellautomation/malware-cyber-threats-SHS-2279624513.2400.jpg","hostPageUrl":"https://www.rockwellautomation.com/en-in/company/news/magazines/cybersecurity-resilience-dragos.html","contentSize":"127174 B","width":2400,"height":1350,"cDNContentUrl":"https://th.bing.com/th/id/R.279187e55903f99328f549564d73893a?rik=RGBqiTA9Os7dqw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0DA4E956CEEBEEDD5A94ABDDCE3A3D30896A6044","accentColor":"390109"},"F90FE7EB571C6BA327014491D12044C1252A65E4":{"name":"Capsid-Targeted Viral Inactivation: A Novel Tactic for Inhibiting ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7wxuhwcXI7Ktkd9oWVpi8wHaH6?pid=Api","datePublished":"2016-09-21T09:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/viruses/viruses-08-00258/article_deploy/html/images/viruses-08-00258-g001-1024.png","hostPageUrl":"https://www.mdpi.com/1999-4915/8/9/258","contentSize":"544562 B","width":959,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.ef0c6e87071723b2ad91df68595a62f3?rik=n%2fB%2bvnXBtjpyEA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4E56A2521C44021D194410723AB6C175BE7EF09F","accentColor":"BB5510"},"02CDAC6ADFF5839D6859BF1609380FAFB2E6BE38":{"name":"How to check a site for viruses: tools overview","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rENH8iopjHmScJv_91niHQHaEc?pid=Api","datePublished":"2020-06-24T13:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://serpstat.com/img/blog/how-to-check-a-website-for-viruses/1571328512image2.png","hostPageUrl":"https://serpstat.com/blog/how-to-check-a-website-for-viruses/","contentSize":"175093 B","width":1069,"height":641,"cDNContentUrl":"https://th.bing.com/th/id/R.ac4347f22a298c7992709bfff759e21d?rik=INzKpv1fONmGlQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"83EB6E2BFAF0839061FB9586D9385FFDA6CADC20","accentColor":"C76804"},"25C16F560B714B80E30AD470A524B6E9D1ABECE9":{"name":"Buy Android Malware Detection using Machine Learning Book Online at Low ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.z3n_Bx2857QceKe5EnuykAAAAA?pid=Api","datePublished":"2025-07-27T09:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41Y3YfrK-RL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Android-Malware-Detection-Machine-Learning/dp/303074664X","contentSize":"19156 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.cf79ff071dbce7b41c78a7b9127bb290?rik=Uhz2ZbAXtAg%2boA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9ECEBA1D9E6B425A074DA03E08B417B065F61C52","accentColor":"BC510F"},"E71EE04CFD0D58E5F3754ED39FB9EC10BFF115A8":{"name":"Malware Data Science: Attack Detection and Attribution eBook : Saxe ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.iIJZ3qXgCQ6vUZdakWqtsgAAAA?pid=Api","datePublished":"2025-06-27T10:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51xvda8SrVL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Malware-Data-Science-Detection-Attribution-ebook/dp/B077X1V9SY","contentSize":"28671 B","width":339,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.888259dea5e0090eaf51975a916aadb2?rik=fuEOxN%2fQhV4%2fVw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8A511FFB01CE9BF93DE4573F5E85D0DFC40EE17E","accentColor":"6C9F2C"},"3A72AFEF54C1526A4B58CFFD9FF459974C91BFEC":{"name":"What is Malware, and How to Protect Against It?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.KGxNsAb-2cEGzY8kp_IuYQHaEK?pid=Api","datePublished":"2017-09-07T20:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://content.kaspersky-labs.com/fm/press-releases/63/63459fdac7669bf9de01be2aaf38470b/processed/gettyimages-1353240272-q75.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it","contentSize":"62793 B","width":670,"height":376,"cDNContentUrl":"https://th.bing.com/th/id/R.286c4db006fed9c106cd8f24a7f22e61?rik=oyf6%2fkUcJaa0hQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CEFB19C479954FF9DFFC85B4A6251C45FEFA27A3","accentColor":"0CA4BF"},"B4601722AF5DFD3A768185D8DAA745D7C2FD5809":{"name":"Buy Malware Detection: 27 (Advances in Information Security) Book ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.K3fuGtMSBV-Iuse-mrm93gAAAA?pid=Api","datePublished":"2025-07-27T06:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41pqsXiDGqL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Malware-Detection-Advances-Information-Security/dp/0387327207","contentSize":"13671 B","width":279,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.2b77ee1ad312055f88bac7be9ab9bdde?rik=SwZxIvrV36NnGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9085DF2C7D547AAD8D581867A3DFD5FA2271064B","accentColor":"046CBA"},"F32544D05AFCEC457BF1BD85188383FED567DB5F":{"name":"Radar Target Detection Algorithm Using Convolutional Neural Network to ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.VDCb6DwqEXRRvsTcv9FSZQHaGr?pid=Api","datePublished":"2022-09-11T08:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-22-06868/article_deploy/html/images/sensors-22-06868-g010.png","hostPageUrl":"https://www.mdpi.com/1424-8220/22/18/6868","contentSize":"37741 B","width":2874,"height":2593,"cDNContentUrl":"https://th.bing.com/th/id/R.54309be83c2a117451bec4dcbfd15265?rik=P1JEDaXPzlS3Hw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F5BD765DEF38388158DB1FB754CECFA50D44523F","accentColor":"414141"},"ED85E4C2CAAF3487B6737AB2D721CD5BCBAEFA38":{"name":"Report on malware detection - Malware Detection Using Machine Learning ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.v6MjCVlNGYjFXVV_rJ0dnQHaJl?pid=Api","datePublished":"2022-09-16T11:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/25916942943f9f1b6230f27626318393/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-kakinada/computer-science-engineering/report-on-malware-detection/29646569","contentSize":"184516 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.bfa32309594d1988c55d557fac9d1d9d?rik=3lhOLKz6Q3hrNw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"83AFEABCB5DC127D2BA7376B7843FAAC2C4E58DE","accentColor":"0984C2"},"7F88137A9C7E2461CF59ACD032ED86E0E19A0CA0":{"name":"Cryptominers’ Anatomy: Cryptomining Internals | Akamai","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.3XE-KeVEo428vV-2oawTJAHaEK?pid=Api","datePublished":"2025-02-06T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.akamai.com/site/en/images/blog/2024/thumbnails/edge-1080x608-1.png","hostPageUrl":"https://www.akamai.com/blog/security-research/cryptominer-anatomy-internals","contentSize":"93233 B","width":1080,"height":608,"cDNContentUrl":"https://th.bing.com/th/id/R.dd713e29e544a38dbcbd5fb6a1ac1324?rik=94gxp8nnQhb8lQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0AC0A91E0E68DE230DCA95FC1642E7C9A73188F7","accentColor":"010A0F"},"1507C2366CCEFE5B050CF664B4A3CD595C393789":{"name":"Various Types of Malware- Their Symptoms, Prevention and Removal - Blog ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.fdbaljSZc3TPXBPnOepmgQHaEK?pid=Api","datePublished":"2018-08-04T15:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.v2web.in/blog/wp-content/uploads/2018/08/Different-types-of-Malware-explained.jpg","hostPageUrl":"https://www.v2web.in/blog/various-types-of-malware-their-symptoms-prevention-and-removal/","contentSize":"99145 B","width":560,"height":315,"cDNContentUrl":"https://th.bing.com/th/id/R.7dd6da9634997374cf5c13e739ea6681?rik=UXAsY8bs77VQwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"987393C595DC3A4B466FC050B5EFECC6632C7051","accentColor":"024AC9"},"706ACAAE73469314624E7AA0BBEBFC888453804A":{"name":"Top 3 Process Monitoring Tools for Malware Analysis - Tech Hyme","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.cm0obREASvaUSgW_cQSelgHaEH?pid=Api","datePublished":"2024-07-01T15:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2024/07/Process-Monitoring-Tools.jpg","hostPageUrl":"https://techhyme.com/top-3-process-monitoring-tools-for-malware-analysis/","contentSize":"46081 B","width":1596,"height":887,"cDNContentUrl":"https://th.bing.com/th/id/R.726d286d11004af6944a05bf71049e96?rik=B6as6jdkOUEm5A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A408354888CFBEBB0AA7E42641396437EAACA607","accentColor":"04A3C7"},"A6C81957E4DC55B880BCDBA7EB9D04E3875EE2E9":{"name":"Online Malware Detection | ESET","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.fKeqyduT-OKrSU9dNgSSdAAAAA?pid=Api","datePublished":"2017-01-01T00:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.eset.com/fileadmin/_processed_/0/5/csm_threat-analysis-grey_b8ef86f61a.png","hostPageUrl":"https://www.eset.com/in/home/online-scanner/","contentSize":"4707 B","width":80,"height":80,"cDNContentUrl":"https://th.bing.com/th/id/R.7ca7aac9db93f8e2ab494f5d36049274?rik=aoyRdU7NVYsIyw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"9E2EE5783E40D9BE7ABDCB088B55CD4E75918C6A","accentColor":"434E57"},"7930062655B9FFFCC8E1791EA684AAEB6830E81A":{"name":"Intrusion Detection System (IDS) in Cyber Security","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.uGwvHxYVpQZhQtssugccdQHaD4?pid=Api","datePublished":"2011-06-13T01:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.insecure.in/images/cover/intrusion-detection-system.webp","hostPageUrl":"https://www.insecure.in/intrusion-detection-system","contentSize":"25708 B","width":1200,"height":628,"cDNContentUrl":"https://th.bing.com/th/id/R.b86c2f1f1615a5066142db2cba071c75?rik=lwNgYlWb%2f8%2bMHg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A18E0386BEAA486AE1971E8CCFFF9B5562600397","accentColor":"C1630A"},"92A1DCFD7CF1D4A60D68D40E449416C680E7DF02":{"name":"9 Static Detection Methods To Identify Viruses - Tech Hyme","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.AoFDZBidc_Ivjb-q13G5dQHaE4?pid=Api","datePublished":"2023-05-22T13:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2023/05/Computer-Viruses-Techhyme.jpg","hostPageUrl":"https://techhyme.com/9-static-detection-methods-to-identify-viruses/","contentSize":"160253 B","width":1350,"height":890,"cDNContentUrl":"https://th.bing.com/th/id/R.02814364189d73f22f8dbfaad771b975?rik=KRrN38cfTWrQhg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"20FD7E086C614944E04D86D06A4D1FC7DFCD1A29","accentColor":"806F4B"},"43C4358F0CE0A2CB17C230AEC2703BAEF4C0CC4C":{"name":"Improving Phage-Biofilm In Vitro Experimentation","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.75ko4AQg1AeynZA6mvRBigHaDx?pid=Api","datePublished":"2021-06-19T11:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/viruses/viruses-13-01175/article_deploy/html/images/viruses-13-01175-ag-550.jpg?1624100009","hostPageUrl":"https://www.mdpi.com/1999-4915/13/6/1175","contentSize":"69307 B","width":550,"height":280,"cDNContentUrl":"https://th.bing.com/th/id/R.ef9928e00420d407b29d903a9af4418a?rik=NExT%2bMAOKrxxLA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C4CC0C4FEAB3072CEA032C71BC2A0EC0F8534C34","accentColor":"463163"},"718AADBCE13782D35A01E1C1E5D66D1716A94CAD":{"name":"Home [mohali.ptu.ac.in]","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xZR_eIxOIFx82HnrqN2QSAHaHa?pid=Api","datePublished":"2017-06-01T09:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mohali.ptu.ac.in/Uploads/134064465164432831.jpeg","hostPageUrl":"https://mohali.ptu.ac.in/","contentSize":"206257 B","width":1280,"height":1280,"cDNContentUrl":"https://th.bing.com/th/id/R.c5947f788c4e205c7cd879eba8dd9048?rik=F6jayx5zKD2lEA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DAC49A6171D66D5E1C1E10A53D28731ECBDAA817","accentColor":"1B80B0"},"5890A9B4CBCB436D6E29E1C1E5D66D1716A94CAD":{"name":"Home [mohali.ptu.ac.in]","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.IMeb7_ThZMpZfK_9DfGduAHaJQ?pid=Api","datePublished":"2017-06-01T09:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mohali.ptu.ac.in/Uploads/134093101979362001.jpeg","hostPageUrl":"https://mohali.ptu.ac.in/","contentSize":"313080 B","width":1024,"height":1280,"cDNContentUrl":"https://th.bing.com/th/id/R.20c79beff4e164ca597caffd0df19db8?rik=hQmaS7y8NNbmkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DAC49A6171D66D5E1C1E92E6D634BCBC4B9A0985","accentColor":"C10A12"},"C4792C03B3CDF1A28A1D564BC0E233AA1633E13A":{"name":"AI in Cybersecurity: Deep Packet Inspection and Malware Detection Using ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api","datePublished":"2025-12-14T02:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://johal.in/content/images/2025/08/logo-1.png","hostPageUrl":"https://johal.in/ai-in-cybersecurity-deep-packet-inspection-and-malware-detection-using-cnn-and-network-flow-data-2026/","contentSize":"1411915 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0","isTransparent":true,"imageId":"A31E3361AA332E0CB465D1A82A1FDC3B30C2974C","accentColor":"0054AC"},"1501FE709318DCA2778155ED92006AA584648CCD":{"name":"SteelTech Engineering","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.nKKLyQNSlZR_I-2KdU3zaQHaDg?pid=Api","datePublished":"2016-04-08T06:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.steeltechengg.com/images/3d%20model%20preparation.jpg","hostPageUrl":"http://www.steeltechengg.com/bimmethodology.html","contentSize":"362920 B","width":969,"height":458,"cDNContentUrl":"https://th.bing.com/th/id/R.9ca28bc9035295947f23ed8a754df369?rik=URDvBzmBzSp3GA&riu=http%3a%2f%2fwww.steeltechengg.com%2fimages%2f3d+model+preparation.jpg&ehk=8sUldSPl9hyTtybtHsjFxUTW%2bsAOliOeme3PfaJnyoM%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DCC846485AA60029DE5518772ACD813907EF1051","accentColor":"0E6FBD"},"F30C3A7CB7E2D52C8F8A9B70D64465641B802F1A":{"name":"Deep Learning-Based Change Detection in Remote Sensing Images: A Review","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rJAaJ_uuLK5bGuXDiLWrJwHaE8?pid=Api","datePublished":"2022-02-11T15:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/remotesensing/remotesensing-14-00871/article_deploy/html/images/remotesensing-14-00871-g001.png","hostPageUrl":"https://www.mdpi.com/2072-4292/14/4/871","contentSize":"486370 B","width":3285,"height":2190,"cDNContentUrl":"https://th.bing.com/th/id/R.ac901a27fbae2cae5b1ae5c388b5ab27?rik=P8Cjx3suXcL4qA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A1F208B14656446D07B9A8F8C25D2E7BC7A3C03F","accentColor":"AB5820"},"B7F3BA29F00C1F71F511DEF141F5840B51D4EDD0":{"name":"Leak tester to detect and calculate leakages - LD 500 | CS INSTRUMENTS","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.X5194d0gCcZTHFkvb_DqxwHaFL?pid=Api","datePublished":"2019-09-02T06:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cs-instruments.com/cs-data/Produktbilder/PNG/Leckage/603/image-thumb__603__product/Leakage_detection_process_map_en_b.df918d36.png","hostPageUrl":"https://www.cs-instruments.com/leak-tester-ld500-to-detect-and-calculate-leakages/","contentSize":"447506 B","width":1440,"height":1008,"cDNContentUrl":"https://th.bing.com/th/id/R.5f9d7de1dd2009c6531c592f6ff0eac7?rik=ez%2brkg%2fA8RdfEQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0DDE4D15B0485F141FED115F17F1C00F92AB3F7B","accentColor":"305A4C"},"84755057E8476A6D3F2F4148BDD222B25E6891FE":{"name":"Malware - Free computer icons","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.gg7LzYD3OTHBxpzq2VHNXgHaHa?pid=Api","datePublished":"2018-10-26T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-icons-png.flaticon.com/512/1176/1176560.png","hostPageUrl":"https://www.flaticon.com/free-icon/malware_1176560","contentSize":"13455 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.820ecbcd80f73931c1c69cead951cd5e?rik=SFcFdY50ptbz8g&pid=ImgRaw&r=0","isTransparent":true,"imageId":"EF1986E52B222DDB8414F2F3D6A6748E75055748","accentColor":"CB0012"},"7C2AAC5E3042320DEA758EA06A3F15DC8EB2D41A":{"name":"Development and Evaluation of Duplex MIRA-qPCR Assay for Simultaneous ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Tqbu1Jg9gKrGuSlPQcOvIQHaDm?pid=Api","datePublished":"2022-08-27T14:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/microorganisms/microorganisms-10-01734/article_deploy/html/images/microorganisms-10-01734-g001.png","hostPageUrl":"https://www.mdpi.com/2076-2607/10/9/1734","contentSize":"1338306 B","width":4434,"height":2152,"cDNContentUrl":"https://th.bing.com/th/id/R.4ea6eed4983d80aac6b9294f41c3af21?rik=x6LK5QMkI9CuVw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A14D2BE8CD51F3A60AE857AED0232403E5CAA2C7","accentColor":"1582B6"},"A54D06D3AC27800E0C999C252BEBD6E8514ACC0F":{"name":"International Journal of Engineering and Computer Science","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ePArDcEZaDdvfx5ZxyDSLgHaHa?pid=Api","datePublished":"2017-03-29T09:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ijecs.in/media.php?path=covers%2Fijecs%2F5433%2Fartcover.jpg","hostPageUrl":"https://www.ijecs.in/","contentSize":"255412 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.78f02b0dc11968376f7f1e59c720d22e?rik=WtRgPcpyCODAmQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F0CCA4158E6DBEB252C999C0E00872CA3D60D45A","accentColor":"1E98AD"},"5E5DFF873706B4AA02FB249FA8AFF6BCA2059868":{"name":"P.C.Viruses: Detection, Analysis and Cure : Solomon, Alan: Amazon.in: Books","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.0Cf0YvxRF3YzTNtKllCq6wAAAA?pid=Api","datePublished":"2021-07-10T12:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41i3i1qM7dL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/PC-Viruses-Detection-Analysis-Cure/dp/3540196919","contentSize":"17204 B","width":312,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.d027f462fc511776334cdb4a9650aaeb?rik=5dX%2feHNgS6ogvw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8689502ACB6FFA8AF942BF20AA4B607378FFD5E5","accentColor":"1C343A"},"E21D8DA1CC5E8EB65FFD245ED34D9E1A490A89A2":{"name":"Robust_Malware_Detection_for_Internet_Of_(Battlefield)_Things_Devices","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.pEM1t_gbE9DtDuL4pEz_BAHaKG?pid=Api","datePublished":"2025-09-01T19:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://projectfix.in/assets/uploads/product/pro-main-38.png","hostPageUrl":"https://projectfix.in/project/robust-malware-detection-for-internet-of-battlefield-things-devices","contentSize":"26720 B","width":550,"height":750,"cDNContentUrl":"https://th.bing.com/th/id/R.a44335b7f81b13d0ed0ee2f8a44cff04?rik=LtHYGszl6Gv13w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2A98A094A1E9D43DE542DFF56BE8E5CC1AD8D12E","accentColor":"CB0100"},"2F3C3D8BC656EF0465C9898B3D8E980B929B529F":{"name":"Object Detection-Based System for Traffic Signs on Drone-Captured Images","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.a6E-IrlCxnVerl3mls2S7QHaDb?pid=Api","datePublished":"2023-02-07T10:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/drones/drones-07-00112/article_deploy/html/images/drones-07-00112-g001.png","hostPageUrl":"https://www.mdpi.com/2504-446X/7/2/112","contentSize":"1092215 B","width":3262,"height":1513,"cDNContentUrl":"https://th.bing.com/th/id/R.6ba13e22b942c6755eae5de696cd92ed?rik=8sPTuGxl%2fkBWnA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F925B929B089E8D3B8989C5640FE656CB8D3C3F2","accentColor":"1987B2"},"F4B76520046CA5EFDC0C0EE02B11184FC04B5DC2":{"name":"Laptop & Computer Virus Removal | Antivirus Services in Noida Sector 62 ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.DQwbVYIPNrmRCH-pWoESVgHaCu?pid=Api","datePublished":"2020-09-05T02:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.bhumicomputer.in/images/malware-virus-removal.png","hostPageUrl":"https://www.bhumicomputer.in/malware-virus-removal.html","contentSize":"46666 B","width":1360,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.0d0c1b55820f36b991087fa95a811256?rik=T3tWAkDGWv7NwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2CD5B40CF48111B20EE0C0CDFE5AC64002567B4F","accentColor":"BF4D00"},"609F7BC9FCDA6C7F4DA692E8ACD031313DD9F6AA":{"name":"Diagnosis and Detection of Viruses Infecting ICRISAT Mandate Crops ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.VjVBJxlXqHhsbOP6Yr4nOQAAAA?pid=Api","datePublished":"2023-09-23T11:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://oar.icrisat.org/2389/1.haspreviewThumbnailVersion/Diagnosis-and-detection-of-viruses.pdf","hostPageUrl":"https://oar.icrisat.org/2389/","contentSize":"22686 B","width":214,"height":302,"cDNContentUrl":"https://th.bing.com/th/id/R.563541271957a8786c6ce3fa62be2739?rik=Bvm3nM%2btxvfUag&riu=http%3a%2f%2foar.icrisat.org%2f2389%2f1.haspreviewThumbnailVersion%2fDiagnosis-and-detection-of-viruses.pdf&ehk=aQJblUxePvRa%2fN2v6Vke4QQ4crpT0urP8n%2bF0r3nDss%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AA6F9DD313130DCA8E296AD4F7C6ADCF9CB7F906","accentColor":"1C766B"},"F85DA2E7B3B9032A819DE1C1E5D66D1716A94CAD":{"name":"Home [mohali.ptu.ac.in]","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.K-mVhxe_EGincrpH-8qsCwHaFj?pid=Api","datePublished":"2017-06-01T09:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mohali.ptu.ac.in/Uploads/134064467517076332.jpeg","hostPageUrl":"https://mohali.ptu.ac.in/","contentSize":"163470 B","width":1280,"height":960,"cDNContentUrl":"https://th.bing.com/th/id/R.2be9958717bf1068a772ba47fbcaac0b?rik=j9UqfjubMKIY2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DAC49A6171D66D5E1C1ED918A2309B3B7E2AD58F","accentColor":"477074"},"3C116A8958A9CCC1EB9D32D384E04CD79223A548":{"name":"AI Free Trial | Oracle India","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Jax9CTZU8bEA5hc-c9pBFAHaDX?pid=Api","datePublished":"2025-02-26T05:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.oracle.com/a/ocom/img/rc24full-ai-anomaly-detection.png","hostPageUrl":"https://www.oracle.com/in/artificial-intelligence/what-is-ai/get-started/","contentSize":"95309 B","width":1344,"height":612,"cDNContentUrl":"https://th.bing.com/th/id/R.25ac7d093654f1b100e6173e73da4114?rik=wxGmmIWazBy%2b2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"845A32297DC40E483D23D9BE1CCC9A8598A611C3","accentColor":"043F76"},"0495DD9C0F1F2E81B4D9D9277EA2FE1390D4B3A3":{"name":"A Comprehensive Guide to Navisworks for BIM Clash Detection","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.TbyE6okyE6NxYYg7M7Se1AHaDt?pid=Api","datePublished":"2024-07-11T03:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.novatr.com/hubfs/Clash%20detection%20Process%2c%20benefits%2c%20and%20future%20scope.jpg","hostPageUrl":"https://www.novatr.com/blog/navisworks-for-clash-detection","contentSize":"65098 B","width":1024,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.4dbc84ea893213a37161883b33b49ed4?rik=QFndyfDx4hhLnQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3A3B4D0931EF2AE7729D9D4B18E2F1F0C9DD5940","accentColor":"26AC1F"},"62C55F8EAD4C614A90B25C70DF31F01AF5584175":{"name":"Miniproject-malware - Project - ANATAMY OF MALWARE DETECTION SYSTEM ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.M0crILyhdKjujLQKyVpaLQHaKd?pid=Api","datePublished":"2022-08-24T06:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/c49c7657fea15c84afd7979fd088e92f/thumb_1200_1696.png","hostPageUrl":"https://www.studocu.com/in/document/mahatma-gandhi-university/cyber-forensic/miniproject-malware-project/30452763","contentSize":"181257 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.33472b20bca174a8ee8cb40ac95a5a2d?rik=Jlz16NrEFqQJKw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5714855FA10F13FD07C52B09A416C4DAE8F55C26","accentColor":"444444"},"15D2622DA1944D138C437C7D6CE97D5507F341E6":{"name":"PCR Process Steps Explained - Cole-Parmer India","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.LfrP--y8YELlaLQjnuvDowHaG3?pid=Api","datePublished":"2020-06-09T12:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cms-resources.coleparmer.com/t/pcr-process-workflow-ta32.jpg","hostPageUrl":"https://www.coleparmer.in/tech-article/pcr-process-steps-explained","contentSize":"55202 B","width":876,"height":812,"cDNContentUrl":"https://th.bing.com/th/id/R.2dfacffbecbc6042e568b4239eebc3a3?rik=US0m0hpJ1DHINA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6E143F7055D79EC6D7C734C831D4491AD2262D51","accentColor":"B4171E"},"2122B480C985D1879DD2BFC6C32DEA64068B4A36":{"name":"Recent Development of Fluorescent Nanodiamonds for Optical Biosensing ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hdS2YHxj7ZtE9JimA6DasgHaEx?pid=Api","datePublished":"2022-12-19T07:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/biosensors/biosensors-12-01181/article_deploy/html/images/biosensors-12-01181-g006.png","hostPageUrl":"https://www.mdpi.com/2079-6374/12/12/1181","contentSize":"1133230 B","width":2721,"height":1756,"cDNContentUrl":"https://th.bing.com/th/id/R.85d4b6607c63ed9b44f498a603a0dab2?rik=EiJLCJxYHXjZLQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"63A4B86046AED23C6CFB2DD9781D589C084B2212","accentColor":"CAC801"},"7A9244C0BBF98F121EDD0F0B96C4D36840CE9033":{"name":"Recent Advancements in Nanobiosensors: Current Trends, Challenges ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4MYUTEH5v_XQ7NeS9Nq6hAHaDg?pid=Api","datePublished":"2022-10-18T12:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/biosensors/biosensors-12-00892/article_deploy/html/images/biosensors-12-00892-g010.png","hostPageUrl":"https://www.mdpi.com/2079-6374/12/10/892","contentSize":"2064820 B","width":3700,"height":1749,"cDNContentUrl":"https://th.bing.com/th/id/R.e0c6144c41f9bff5d0ecd792f4daba84?rik=pylEDLuf%2bCHh3Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3309EC04863D4C69B0F0DDE121F89FBB0C4429A7","accentColor":"C1250A"},"7791B4757268DED2BDD7C9CA9CB8E5852AA05ACE":{"name":"Autopsy filetype - A concept in cybersecurity - To perform file type ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.KVE_ItvyTbEg-3BEV0jmsQHaKd?pid=Api","datePublished":"2024-11-22T12:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/2327de8902db4da15a2f4ca4cd104f96/thumb_1200_1696.png","hostPageUrl":"https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-hyderabad/computer-science/autopsy-filetype-a-concept-in-cybersecurity/111582472","contentSize":"186869 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.29513f22dbf24db120fb70445748e6b1?rik=dxlLVyeG7S3bfQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ECA50AA2585E8BC9AC9C7DDB2DED8627574B1977","accentColor":"424242"},"523099DA906E7C987F7458F65B36D7B8F18739D1":{"name":"Biosensors Coupled with Signal Amplification Technology for the ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.eqbg8AgFsJjL7vlh1DvWngHaFN?pid=Api","datePublished":"2021-06-09T07:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/biosensors/biosensors-11-00190/article_deploy/html/images/biosensors-11-00190-g012a.png","hostPageUrl":"https://www.mdpi.com/2079-6374/11/6/190","contentSize":"1134392 B","width":2400,"height":1689,"cDNContentUrl":"https://th.bing.com/th/id/R.7aa6e0f00805b098cbeef961d43bd69e?rik=JQOZrQnmx4n3Rw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1D93781F8B7D63B56F8547F789C7E609AD990325","accentColor":"B38818"},"0D45C18445A7280DDEC7993D1217615CCB64C4EC":{"name":"Services - BIM","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.hmiXtkzFm1bsKrDPRbEbbgHaCz?pid=Api","datePublished":"2021-07-22T12:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.prisminfratech.in/assets/image/BIM/bim.gif","hostPageUrl":"https://www.prisminfratech.in/bim.html","contentSize":"317062 B","width":1754,"height":664,"proxyContentUrl":"https://tse3.mm.bing.net/th/id/OGC.866897b64cc59b56ec2ab0cf45b11b6e?pid=Api&rurl=https%3a%2f%2fwww.prisminfratech.in%2fassets%2fimage%2fBIM%2fbim.gif&ehk=ORsXL1YjxdfIX4oGSfSuUzkJLxUfMs%2b8HLsSdH9PmBA%3d","cDNContentUrl":"https://th.bing.com/th/id/R.866897b64cc59b56ec2ab0cf45b11b6e?rik=0FQcSFR6gtDtfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE4C46BCC5167121D3997CEDD0827A54481C54D0","accentColor":"BF770C"},"56236410733303EBF2600EC1173847F5D3AC296D":{"name":"Kaspersky Free Virus Removal Tool for Windows Download","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.te_1tihsi7QezHC7yhYuZAHaFx?pid=Api","datePublished":"2015-10-31T07:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://lh3.googleusercontent.com/-9dijtWyxOvk/VjJSxroCzhI/AAAAAAAATDc/u8i5BGfQAfs/kaspersky%252520free%252520virus%252520removal%252520tool%25255B3%25255D.jpg?imgmax=800","hostPageUrl":"https://www.hackinguniversity.in/2015/10/kaspersky-free-virus-removal-tool.html","contentSize":"77277 B","width":770,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.b5eff5b6286c8bb41ecc70bbca162e64?rik=ZTJGATczML4vBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D692CA3D5F7483711CE0062FBE30333701463265","accentColor":"C79404"},"793F9A7ABAE471F9913AD3A1A1CAADF6F0958F21":{"name":"Best Free Trojan Virus Removal Solutions You Should Try in 2026","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.0ua_y9nYhK7zUrSn7q6-AwHaD5?pid=Api","datePublished":"2023-12-11T16:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/recoverit/article/best-free-trojan-remover.jpg","hostPageUrl":"https://recoverit.wondershare.com/windows-computer-tips/free-trojan-remover.html","contentSize":"31860 B","width":1328,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.d2e6bfcbd9d884aef352b4a7eeaebe03?rik=l%2fOpp6tOF58Zow&pid=ImgRaw&r=0","isTransparent":false,"imageId":"12F8590F6FDAAC1A1A3DA3199F174EABA7A9F397","accentColor":"BB6210"},"00CF03A307634B11AFBDDB7701168F14A96C3B17":{"name":"Review of Wafer Surface Defect Detection Methods","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SUfZh3AGL_pG-o9DpN0y8AHaGT?pid=Api","datePublished":"2023-04-10T10:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/electronics/electronics-12-01787/article_deploy/html/images/electronics-12-01787-g006.png?1681122551","hostPageUrl":"https://www.mdpi.com/2079-9292/12/8/1787","contentSize":"350619 B","width":2357,"height":2008,"cDNContentUrl":"https://th.bing.com/th/id/R.4947d98770062ffa46fa8f43a4dd32f0?rik=APwwOnA2tBH62w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"71B3C69A41F8611077BDDBFA11B436703A30FC00","accentColor":"604F5E"},"882C352CBA87372B8FB6D68EA147CA690D8107FC":{"name":"Deep Learning-Based Automatic Safety Helmet Detection System for ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.5Ndk_Ze_NE1BzOWk1qPSxgHaCW?pid=Api","datePublished":"2022-08-18T14:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-12-08268/article_deploy/html/images/applsci-12-08268-g002.png?1660901032","hostPageUrl":"https://www.mdpi.com/2076-3417/12/16/8268","contentSize":"574400 B","width":3213,"height":1020,"cDNContentUrl":"https://th.bing.com/th/id/R.e4d764fd97bf344d41cce5a4d6a3d2c6?rik=iMJTwqt4c7L4aw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CF7018D096AC741AE86D6BF8B27378ABC253C288","accentColor":"326699"},"04E0CB6FBC9F31F0E71905A76541D9E6F6AAF8CA":{"name":"One-Pixel Attack for Continuous-Variable Quantum Key Distribution Systems","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.IG2AiynCkij8bcRXxjZYZwHaCh?pid=Api","datePublished":"2023-01-27T09:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/photonics/photonics-10-00129/article_deploy/html/images/photonics-10-00129-g001.png?1676430245","hostPageUrl":"https://www.mdpi.com/2304-6732/10/2/129","contentSize":"364808 B","width":4283,"height":1460,"cDNContentUrl":"https://th.bing.com/th/id/R.206d808b29c29228fc6dc457c6365867?rik=QA689sv5Ew9%2bkQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AC8FAA6F6E9D14567A50917E0F13F9CBF6BC0E40","accentColor":"B9A800"},"487F9CC31CE8154C817990D8FBDA296600B34BE9":{"name":"Lentiviral Vectors for T Cell Engineering: Clinical Applications ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.G0imPcr5ZEdGCDB4oqC7LAHaDU?pid=Api","datePublished":"2021-08-02T14:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/viruses/viruses-13-01528/article_deploy/html/images/viruses-13-01528-g003-550.jpg","hostPageUrl":"https://www.mdpi.com/1999-4915/13/8/1528","contentSize":"52470 B","width":550,"height":246,"cDNContentUrl":"https://th.bing.com/th/id/R.1b48a63dcaf9644746083078a2a0bb2c?rik=hPfJPMGOUcQYlw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9EB43B006692ADBF8D099718C4518EC13CC9F784","accentColor":"38934D"},"48164BC7A5A573E6CEC67B3AFE196D00945FFBA9":{"name":"A Novel Layered and Advanced Nitrogen Removal Filter with Gravel and ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.UqTCvKhe3RN2rjWPxeLT9wHaDO?pid=Api","datePublished":"2023-05-18T13:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/water/water-15-01919/article_deploy/html/images/water-15-01919-g001.png","hostPageUrl":"https://www.mdpi.com/2073-4441/15/10/1919","contentSize":"565127 B","width":2975,"height":1299,"cDNContentUrl":"https://th.bing.com/th/id/R.52a4c2bca85edd1376ae358fc5e2d3f7?rik=hGG0fFpaN27sbA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9ABFF54900D691EFA3B76CEC6E375A5A7CB46184","accentColor":"A75A24"},"167A36B71878CDF332A24EBBDD5A0C46C6F71B8A":{"name":"Application of Neural Network in Predicting H2S from an Acid Gas ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.hAieEIBm4YdsvEP0exSlvgHaE9?pid=Api","datePublished":"2023-01-16T07:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-23-01020/article_deploy/html/images/sensors-23-01020-g002-550.jpg","hostPageUrl":"https://www.mdpi.com/1424-8220/23/2/1020","contentSize":"67714 B","width":550,"height":368,"cDNContentUrl":"https://th.bing.com/th/id/R.84089e108066e1876cbc43f47b14a5be?rik=Yadje4GH3D8jKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A8B17F6C64C0A5DDBBE42A233FDC87817B63A761","accentColor":"68616A"},"BC2FE1F93D640EE6E53F6457926D695533892B4D":{"name":"Detecting Phishing Attempts: Determine If an Email is Safe?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yL_zP3lHsJ2oihJC5R4uCQHaFj?pid=Api","datePublished":"2023-03-24T16:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.bouncify.in/blog/content/images/2023/03/phishing.png","hostPageUrl":"https://blog.bouncify.in/blog/detecting-phishing-attempts-how-to-determine-if-an-email-is-safe/","contentSize":"73970 B","width":530,"height":398,"cDNContentUrl":"https://th.bing.com/th/id/R.c8bff33f7947b09da88a1242e51e2e09?rik=y%2fIen9NG4G5e8w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D4B298335596D6297546F35E6EE046D39F1EF2CB","accentColor":"004AB5"},"7D89F4AE379C14B27CBC480F94A29C1D8A856D46":{"name":"21CSC310J Malware Analysis - CT1 Set C Questions & Answers - Studocu","thumbnailUrl":"https://tse4.mm.bing.net/th?id=OIF.D%2b%2b5ZDI8B%2fT5GcOX2ntEDA&pid=Api","datePublished":"2026-03-05T11:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/47fa92cf1b00c4c0a5b54a382a66e59b/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/srm-institute-of-science-and-technology/malware-analysis/21csc310j-malware-analysis-ct1-set-c-questions-answers/154984027","contentSize":"476988 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.e98f8687ba117dfdce6a1efd7cfa7a80?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64D658A8D1C92A49F084CBC72B41C973EA4F98D7","accentColor":"CC0000","isFresh":true},"C61813373D6617300EAFBEC523613F2C350C98C1":{"name":"Cyber Security Advisory: Data Wiper Malware","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Me0_LMojgxBVdRuFFugI8gHaDt?pid=Api","datePublished":"2022-05-26T09:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://taxguru.in/wp-content/uploads/2022/05/Cyber-Security-Advisory-Data-Wiper-Malware.jpg","hostPageUrl":"https://taxguru.in/corporate-law/cyber-security-advisory-data-wiper-malware.html","contentSize":"14430 B","width":600,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.31ed3f2cca23831055751b8516e808f2?rik=bIExc9NmcQPg%2bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1C89C053C2F316325CEBFAE0037166D37331816C","accentColor":"BF0C10"},"DF7AF76208555553F67C4083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.eshLbjI4YmNOniJgOLlE1gHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/06/25170954/hinglish-diamond.jpeg","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"208004 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.7ac84b6e323862634e9e226038b944d6?rik=%2fad%2fJoBVVTVvxw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804C76F35555580267FA7FD","accentColor":"C79904"},"2165F9646E247354C7424083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.BJBgTAar1iPgrkRW8yBCygHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/06/12112632/hindi.jpeg","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"279027 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.0490604c06abd623e0ae4456f32042ca?rik=ElafRuZCN0V8JA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804247C453742E6469F5612","accentColor":"043E69"},"8DFE48A0643FA339B5CDA66F160AAE1870862155":{"name":"RGDiNet: Efficient Onboard Object Detection with Faster R-CNN for Air ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.K7SG_C1c3GmM2WzWoTSp1QHaIK?pid=Api","datePublished":"2021-03-01T09:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-21-01677/article_deploy/html/images/sensors-21-01677-g003.png","hostPageUrl":"https://www.mdpi.com/1424-8220/21/5/1677","contentSize":"909347 B","width":3030,"height":3342,"cDNContentUrl":"https://th.bing.com/th/id/R.2bb486fc2d5cdc698cd96cd6a134a9d5?rik=2O%2bECkbzOpNb3A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5512680781EAA061F66ADC5B933AF3460A84EFD8","accentColor":"BA1111"},"1D9E62DB11F81FA83F6C9E52D6C2483A9F3A7F59":{"name":"Removal of Siloxanes from Model Biogas by Means of Deep Eutectic ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.IuGLE3IgR4qeHijSuwgY4AHaDb?pid=Api","datePublished":"2021-01-06T09:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/materials/materials-14-00241/article_deploy/html/images/materials-14-00241-g001.png","hostPageUrl":"https://www.mdpi.com/1996-1944/14/2/241","contentSize":"847760 B","width":3544,"height":1641,"cDNContentUrl":"https://th.bing.com/th/id/R.22e18b137220478a9e1e28d2bb0818e0?rik=0ekmvRGP8Yrzxg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"95F7A3F9A3842C6D25E9C6F38AF18F11BD26E9D1","accentColor":"3F568C"},"2100C3EF9583E9C97E0E4F15CD1B3BD33ED67FF2":{"name":"कोरोना वायरस आपदा (Covid 19) – विज्ञान विश्व","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7gO6a5wowaH5U5o1zg1DTAHaEk?pid=Api","datePublished":"2020-04-01T11:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://viralzone.expasy.org/resources/Baltimore.png","hostPageUrl":"https://vigyanvishwa.in/2020/03/31/covid-19/","contentSize":"67036 B","width":967,"height":597,"cDNContentUrl":"https://th.bing.com/th/id/R.ee03ba6b9c28c1a1f9539a35ce0d434c?rik=EgA8%2flk4npzn4A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2FF76DE33DB3B1DC51F4E0E79C9E3859FE3C0012","accentColor":"3BB912"},"B8EF5C2812775660183B4083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.xfKE0mduqiPzTJEBvA8xJAHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/06/18130520/440-3_1750144813.jpeg","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"227813 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.c5f284d2676eaa23f34c9101bc0f3124?rik=i%2f7FgiF3ZQaBsw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804B3810665772182C5FE8B","accentColor":"861311"},"19725C0518320B74BFDA69E88DADA88F650BC422":{"name":"Recent Trends in Copper Metallization","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.lzKB_qN5oFcfJuGJK7U5AwHaFp?pid=Api","datePublished":"2022-09-14T16:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-11-02914/article_deploy/html/images/electronics-11-02914-g007.png","hostPageUrl":"https://www.mdpi.com/2079-9292/11/18/2914","contentSize":"266433 B","width":2571,"height":1960,"cDNContentUrl":"https://th.bing.com/th/id/R.973281fea379a0571f26e1892bb53903?rik=kSfFUIEjsEf7rQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"224CB056F88ADAD88E96ADFB47B0238150C52791","accentColor":"CB9B00"},"8036C929BA58C7879DD2675BA8730AB561A8E55B":{"name":"Spam Is The Dominant Method To Spread Malware In 2018 - MobyGeek.com","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.pFy2myek2WGZK_qjD-nNDQHaE8?pid=Api","datePublished":"2022-03-31T01:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.mobygeek.com/2018/12/14/email-spam-25f5.jpg","hostPageUrl":"https://mobygeek.com/ict-news/spam-is-the-dominant-method-to-spread-malware-in-2018-1387","contentSize":"101252 B","width":1678,"height":1119,"cDNContentUrl":"https://th.bing.com/th/id/R.a45cb69b27a4d961992bfaa30fe9cd0d?rik=CGOckquFfHjZLQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B55E8A165BA0378AB5762DD9787C85AB929C6308","accentColor":"C3B708"},"9DC5BF00D5D05779EF526C3C8A58D58B1618FB5C":{"name":"‘We hear about more viruses now but it may be because of better ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.dAQqrTVLovLu7kaREQV50wHaEB?pid=Api","datePublished":"2025-01-08T00:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.toiimg.com/thumb/msid-117034932,width-1070,height-580,imgsize-30210,resizemode-75,overlay-toi_sw,pt-32,y_pad-40/photo.jpg","hostPageUrl":"https://timesofindia.indiatimes.com/life-style/health-fitness/health-news/we-hear-about-more-viruses-now-but-it-may-be-because-of-better-detection/articleshow/117034925.cms","contentSize":"38933 B","width":1069,"height":580,"cDNContentUrl":"https://th.bing.com/th/id/R.74042aad354ba2f2eeee4691110579d3?rik=2Vz7AF0NdZf%2bJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C5BF8161B85D85A8C3C625FE97750D5D00FB5CD9","accentColor":"AE211D"},"2CBCB39710D2FFA18D5A4083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.OW3nsUJEzJklQbqSe7BJNgHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/06/16114023/anthro.jpeg","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"221933 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.396de7b14244cc992541ba927bb04936?rik=wss7eQEt%2fxrYpQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804A5D81AFF2D01793BCBC2","accentColor":"C3BA08"},"1FE9F2A2B97D6E7B29F8DB1AE9C870F809E9B680":{"name":"Is Laser Hair Reduction Permanent? - Blog","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.usz9SwA2BV_lEc3ZwY8q9gHaE8?pid=Api","datePublished":"2019-08-03T21:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaya.in/media/.renditions/wysiwyg/2f0cc222b7.jpg","hostPageUrl":"https://www.kaya.in/blog/laser-hair-removal-permanent-hair-removal-solution-unwanted-hair","contentSize":"84366 B","width":1000,"height":667,"cDNContentUrl":"https://th.bing.com/th/id/R.baccfd4b0036055fe511cdd9c18f2af6?rik=8Z4vKpvX5reSjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"086B9E908F078C9EA1BD8F92B7E6D79B2A2F9EF1","accentColor":"C02F0B"},"2CBBA3440DD0AEE65F299DEB41BE30FE1F920924":{"name":"Point-of-Need DNA Testing for Detection of Foodborne Pathogenic Bacteria","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.A2G8_2Emaz2jd-ff5lQ9OgHaEp?pid=Api","datePublished":"2019-03-04T16:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/sensors/sensors-19-01100/article_deploy/html/images/sensors-19-01100-ag-550.jpg?1571179533","hostPageUrl":"https://www.mdpi.com/1424-8220/19/5/1100","contentSize":"92143 B","width":550,"height":345,"cDNContentUrl":"https://th.bing.com/th/id/R.0361bcff61266b3da377e7dfe6543d3a?rik=wrs6RNAN6m71kg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"429029F1EF03EB14BED992F56EEA0DD0443ABBC2","accentColor":"A57F26"},"A140DC31B6EECC4AFA6038ECDA77D22E39098CD9":{"name":"Detection and Enumeration of Bacteria, Yeast, Viruses, and Protozoan in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2Dny56mvfsJ-tZzg0kRXMgAAAA?pid=Api","datePublished":"2022-08-08T00:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/xif0q/book/w/3/x/detection-and-enumeration-of-bacteria-yeast-viruses-and-original-imagk3jrp48bsuny.jpeg","hostPageUrl":"https://www.flipkart.com/detection-enumeration-bacteria-yeast-viruses-protozoan-foods-freshwater/p/itm162aa07efbeb2","contentSize":"16905 B","width":206,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.d839f2e7a9af7ec27eb59ce0d2445732?rik=GgTNE2vuzKSvBg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fw%2f3%2fx%2fdetection-and-enumeration-of-bacteria-yeast-viruses-and-original-imagk3jrp48bsuny.jpeg&ehk=hOBmfdvZ2eSYd%2fg4SiktGrk2TMePNo4vu%2byRka8zugg%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DC89093E22D77ADCE8306AFA4CCEE6B13CD041A","accentColor":"65B516"},"D9376E34F6F79408D5259D8C358BF1F910BF7C0D":{"name":"Understanding Agobot: The Pioneering Modular Malware - Tech Hyme","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.6lU4EhO8QB1plEQuTYT5YwHaDq?pid=Api","datePublished":"2023-08-13T03:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2023/08/Agobot-Malware-Techhyme-1024x506.jpg","hostPageUrl":"https://techhyme.com/understanding-agobot-the-pioneering-modular-malware/","contentSize":"17646 B","width":1024,"height":506,"cDNContentUrl":"https://th.bing.com/th/id/R.ea55381213bc401d6994442e4d84f963?rik=nXPmQ29%2fSYBdUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D0C7FB019F1FB853C8D9525D80497F6F43E6739D","accentColor":"C3084E"},"7E3BED1FB48156895640DF1BFB23D6DF35D106E2":{"name":"Underwater Object Detection Based on Improved EfficientDet","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.pgT5Zfl4PPLD8u645geepgHaIM?pid=Api","datePublished":"2022-09-08T14:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/remotesensing/remotesensing-14-04487/article_deploy/html/images/remotesensing-14-04487-g005.png","hostPageUrl":"https://www.mdpi.com/2072-4292/14/18/4487","contentSize":"19386 B","width":1568,"height":1735,"cDNContentUrl":"https://th.bing.com/th/id/R.a604f965f9783cf2c3f2eeb8e6079ea6?rik=57Pe8UsYZZhlBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2E601D53FD6D32BFB1FD04659865184BF1DEB3E7","accentColor":"333131"},"AC708F11E8E1CBC53BBE3508E3A4455F79A8EE66":{"name":"Research Progress on Integrated Treatment Technologies of Rural ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.hI7lQ1zegIpj3RtPjielPgHaEt?pid=Api","datePublished":"2022-08-06T11:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/water/water-14-02439/article_deploy/html/images/water-14-02439-g001.png","hostPageUrl":"https://www.mdpi.com/2073-4441/14/15/2439","contentSize":"1301845 B","width":3176,"height":2017,"cDNContentUrl":"https://th.bing.com/th/id/R.848ee5435cde808a63dd1b4f8e27a53e?rik=ygf4EY4evFyz6w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66EE8A97F5544A3E8053EBB35CBC1E8E11F807CA","accentColor":"0595C6"},"41BFE5EB562673C424609518C8B5201E732A133E":{"name":"Chemically Modified Biosorbents and Their Role in the Removal of ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-LKHUoVYpGt0fpeApKRpiAHaEv?pid=Api","datePublished":"2020-05-29T10:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/water/water-12-01551/article_deploy/html/images/water-12-01551-g001.png?1602212431","hostPageUrl":"https://www.mdpi.com/2073-4441/12/6/1551","contentSize":"228221 B","width":2375,"height":1520,"cDNContentUrl":"https://th.bing.com/th/id/R.f8b287528558a46b747e9780a4a46988?rik=FPtevmViN0xCBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E331A237E1025B8C815906424C376265BE5EFB14","accentColor":"373231"},"7057D24D6260C18C1416A66F160AAE1870862155":{"name":"RGDiNet: Efficient Onboard Object Detection with Faster R-CNN for Air ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.IT0bvrCZcHZAfLWzM2p4ngHaGe?pid=Api","datePublished":"2021-03-01T09:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-21-01677/article_deploy/html/images/sensors-21-01677-g001.png","hostPageUrl":"https://www.mdpi.com/1424-8220/21/5/1677","contentSize":"319497 B","width":2946,"height":2579,"cDNContentUrl":"https://th.bing.com/th/id/R.213d1bbeb0997076407cb5b3336a789e?rik=B3Ut1CYGHMhBYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5512680781EAA061F66A6141C81C0626D42D7507","accentColor":"CC0000"},"22721C8F5234AD6E8CD455B07F1EB182414005BE":{"name":"Detection of Bacteria, Viruses, Parasites and Fungi : Amazon.in: Books","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.SpJD2WPSwgbUL1tO6ta_bQAAAA?pid=Api","datePublished":"2020-12-15T14:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/21MxV8bmAdL.jpg","hostPageUrl":"https://www.amazon.in/Detection-Bacteria-Viruses-Parasites-Fungi/dp/9048185459","contentSize":"5562 B","width":125,"height":187,"cDNContentUrl":"https://th.bing.com/th/id/R.4a9243d963d2c206d42f5b4eead6bf6d?rik=IifB%2bCVD2ubITQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EB500414281BE1F70B554DC8E6DA4325F8C12722","accentColor":"134473"},"10B422CA37CD3048043092D8A5B8C486532070BB":{"name":"Entrenamiento y despliegue de modelos a partir de conjuntos de datos ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.JyrsmTYlVVzQ9GN-fs-lUgHaEV?pid=Api","datePublished":"2022-12-23T12:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://docs.oracle.com/es/solutions/models-credit-card-fraud-detection/img/cc-fraud-detection-architecture.png","hostPageUrl":"https://docs.oracle.com/es/solutions/models-credit-card-fraud-detection/","contentSize":"125265 B","width":1288,"height":754,"cDNContentUrl":"https://th.bing.com/th/id/R.272aec993625555cd0f4637e7ecfa552?rik=AUsirHPcA4RAAw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BB070235684C8B5A8D2903408403DC73AC224B01","accentColor":"496F7B"},"D7FEA7C44761C4E9A8C8247A7B4F3B10E59BA138":{"name":"Oncolytic Virotherapy in Glioma Tumors","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.JTaiyy4pz4EfhbUaI45NIwHaDX?pid=Api","datePublished":"2020-10-14T15:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/ijms/ijms-21-07604/article_deploy/html/images/ijms-21-07604-g001.png?1602746581","hostPageUrl":"https://www.mdpi.com/1422-0067/21/20/7604","contentSize":"1899700 B","width":3579,"height":1625,"cDNContentUrl":"https://th.bing.com/th/id/R.2536a2cb2e29cf811f85b51a238e4d23?rik=fe96THQWTJ6KjA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"831AB95E01B3F4B7A7428C8A9E4C16744C7AEF7D","accentColor":"139CB3"},"7C0E2B7FBD9375E4D3FDC861F48D295F32D2C6B7":{"name":"Buy Android Malware Detection and Adversarial Methods Book Online at ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Uy7c1rGeRknEw1y-CXCtZwAAAA?pid=Api","datePublished":"2024-02-08T07:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41j64QlTOGL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Android-Malware-Detection-Adversarial-Methods/dp/9819714583","contentSize":"15645 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.532edcd6b19e4649c4c35cbe0970ad67?rik=x%2bCy99s5V0493w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B6C2D23F592D84F168CDF3D4E5739DBF7B2E0C7","accentColor":"1C4960"},"D8F4677D426F9650B6497185F74EEAAD068BC621":{"name":"New Sky Energy Changes the Game for Biogas | Rockwell Automation","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.cFlGvXYqKAnNNFbdWVFywAHaEK?pid=Api","datePublished":"2023-02-05T03:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rockwellautomation.scene7.com/is/image/rockwellautomation/16x9-new-sky-energy-biogas-h2s-removal-skid.2400.jpg","hostPageUrl":"https://www.rockwellautomation.com/en-in/company/news/case-studies/new-sky-energy-biogas-h2s.html","contentSize":"743834 B","width":2400,"height":1350,"cDNContentUrl":"https://th.bing.com/th/id/R.705946bd762a2809cd3456dd595172c0?rik=jU921yT2aQVrlA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"126CB860DAAEE47F5817946B0569F624D7764F8D","accentColor":"1468B7"},"0FADE25BF583C1F530FA4911E18A46A9107AE692":{"name":"A Video-Based Fire Detection Using Deep Learning Models","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.B6Qu7KdJbygsyN-s2lTtKgHaDw?pid=Api","datePublished":"2019-07-18T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-09-02862/article_deploy/html/images/applsci-09-02862-g005.png?1564559851","hostPageUrl":"https://www.mdpi.com/2076-3417/9/14/2862","contentSize":"851098 B","width":2436,"height":1236,"cDNContentUrl":"https://th.bing.com/th/id/R.07a42eeca7496f282cc8dfacda54ed2a?rik=8NoutV84HF8Drw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"296EA7019A64A81E1194AF035F1C385FB52EDAF0","accentColor":"B34C18"},"7FFD071BBB922E4C9A3ECD55AEC7A0D221429B3C":{"name":"Transfer Learning with Deep Convolutional Neural Network (CNN) for ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.S3ytG6GpuCqtICQe1PjAhwHaEb?pid=Api","datePublished":"2020-05-06T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-10-03233/article_deploy/html/images/applsci-10-03233-g008.png?1590214485","hostPageUrl":"https://www.mdpi.com/2076-3417/10/9/3233","contentSize":"1011557 B","width":3676,"height":2200,"cDNContentUrl":"https://th.bing.com/th/id/R.4b7cad1ba1a9b82aad20241ed4f8c087?rik=999wsbsp4sSp4w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C3B924122D0A7CEA55DCE3A9C4E229BBB170DFF7","accentColor":"B78408"},"356732F887E1AB0CA6634083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Ia7s76FemiH8hS7-PLd-3QHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/12/22130727/440-87_1766135155.webp","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"129346 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.21aeecefa15e9a21fc852efe3cb77edd?rik=U3Yjj3geusBqNg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804366AC0BA1E788F237653","accentColor":"830525"},"E5847ABB56500D730014D6675792AE0B03902BA1":{"name":"Review of the Data-Driven Methods for Electricity Fraud Detection in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.dq2xy6AnK_lyvpAwXmVwhwHaEV?pid=Api","datePublished":"2023-03-19T10:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/energies/energies-16-02852/article_deploy/html/images/energies-16-02852-g001.png","hostPageUrl":"https://www.mdpi.com/1996-1073/16/6/2852","contentSize":"705717 B","width":3193,"height":1870,"cDNContentUrl":"https://th.bing.com/th/id/R.76adb1cba0272bf972be90305e657087?rik=Xkinu2UF0DcAQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1AB20930B0EA2975766D410037D00565BBA7485E","accentColor":"B31918"},"A279B4D97F4B6E948E9726813F9BBB202D577DAA":{"name":"How to remove virus from laptop without antivirus | How-to","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wkLVktOKn-5hlgZwthqzPwHaEK?pid=Api","datePublished":"2022-04-12T09:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.hindustantimes.com/tech/img/2022/04/12/960x540/virus-4811655_1920_1649754727576_1649754757869.jpg","hostPageUrl":"https://tech.hindustantimes.com/how-to/how-to-remove-virus-from-laptop-without-antivirus-71649754629285.html","contentSize":"166723 B","width":960,"height":540,"cDNContentUrl":"https://th.bing.com/th/id/R.c242d592d38a9fee61960670b61ab33f?rik=KpdLnfe05knoeQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AAD775D202BBB9F3186279E849E6B4F79D4B972A","accentColor":"1813B8"},"3EE31122BE78AF6B44008C523A77227ECD12322B":{"name":"Partial Thromboplastin Time Wikipedia, 58% OFF","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.wP6Q-iHFiTvhJM0_ctpeaAHaEK?pid=Api","datePublished":"2023-11-26T01:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://osmose-it.s3.amazonaws.com/iT1RRXkiSxq6kYObD0sg90UGTTeYVYzu/_.jpg","hostPageUrl":"https://www.elevate.in/?w=partial-thromboplastin-time-wikipedia-cc-RErqowso","contentSize":"143862 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.c0fe90fa21c5893be124cd3f72da5e68?rik=4z4RIuuH%2brZEAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B22321DCE72277A325C80044B6FA87EB22113EE3","accentColor":"13447B"},"3FE753C8D69362B9B448677C971CB34E2AB8DF51":{"name":"Mercury Removal from Natural Gas - Mercury Removal Unit | Pall Corporation","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.gKndVAeD-a6-EnwSNVxCKAHaEG?pid=Api","datePublished":"2019-11-30T16:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pall.co.in/content/dam/pall/oil-gas/application-images/mercury-removal-process-flow-diagram.PNG?$OptimizedPNG$","hostPageUrl":"https://www.pall.co.in/en/oil-gas/midstream/midstream-merc-rem-unit-mru.html","contentSize":"27733 B","width":1007,"height":557,"cDNContentUrl":"https://th.bing.com/th/id/R.80a9dd540783f9aebe127c12355c4228?rik=8341jG05JptLhA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"15FD8BA2E43BC179C776844B9B26396D8C357EF3","accentColor":"CB5D00"},"0D69C110A1DA3F7E13164911E18A46A9107AE692":{"name":"A Video-Based Fire Detection Using Deep Learning Models","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rj5CpmO_nVzr34EQ-AR3aAHaFU?pid=Api","datePublished":"2019-07-18T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-09-02862/article_deploy/html/images/applsci-09-02862-g003.png","hostPageUrl":"https://www.mdpi.com/2076-3417/9/14/2862","contentSize":"295684 B","width":2142,"height":1538,"cDNContentUrl":"https://th.bing.com/th/id/R.ae3e42a663bf9d5cebdf8110f8047768?rik=0JYcARqt8%2bcxYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"296EA7019A64A81E11946131E7F3AD1A011C96D0","accentColor":"1E24AD"},"3F5C1AE11DC39B2026DCEF75D0CFED707EB72A38":{"name":"engineering tips for students | construction tips and tricks","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.6JKKJMcwxYfBrDDSyXJFywHaEB?pid=Api","datePublished":"2019-07-25T18:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.constructioncivilengineering.com/images/concrete-formwork-removal.jpg","hostPageUrl":"https://www.constructioncivilengineering.com/tips.html","contentSize":"53969 B","width":680,"height":370,"cDNContentUrl":"https://th.bing.com/th/id/R.e8928a24c730c587c1ac30d2c97245cb?rik=88WhHtE8uQJizQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"83A27BE707DEFC0D57FECD6202B93CD11EA1C5F3","accentColor":"A16D2A"},"E87E2EE63AE240EC1B5DFDA08DC2338C40F2EDAE":{"name":"Acid Gas Removal Unit (AGRU) | Amine Gas Treating | Pall Corporation","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7c6frIPSTsIKXohsEGe_zgHaEe?pid=Api","datePublished":"2019-11-24T18:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pall.co.in/content/dam/pall/oil-gas/misc-/acid-gas-process-flow.PNG?$OptimizedPNG$","hostPageUrl":"https://www.pall.co.in/en/oil-gas/refining/refinery-amine-systems.html","contentSize":"35494 B","width":888,"height":537,"cDNContentUrl":"https://th.bing.com/th/id/R.edce9fac83d24ec20a5e886c1067bfce?rik=jufibqMuBM6x1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EADE2F04C8332CD80ADFD5B1CE042EA36EE2E78E","accentColor":"B26F19"},"880E15CD79A5CDB3C9604083C1C902EA7292C855":{"name":"Transfer and Removal Process for High Court Judge","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.VwMwl-1EXjf9xrt085Oa7AHaEt?pid=Api","datePublished":"2025-03-26T10:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.studyiq.com/articles/wp-content/uploads/2025/06/18130524/440_1750142063.jpeg","hostPageUrl":"https://www.studyiq.com/articles/removal-process-for-high-court-judge/","contentSize":"273946 B","width":1833,"height":1167,"cDNContentUrl":"https://th.bing.com/th/id/R.57033097ed445e37fdc6bb74f3939aec?rik=iOBR3Jda3DucBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"558C2927AE209C1C3804069C3BDC5A97DC51E088","accentColor":"C7B104"},"EB6C62CE1823356552AC7BCF22711F553E10B063":{"name":"APOBEC Mutagenesis in Cancer Development and Susceptibility","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.kbEmv9X0iNY_a1RSIrwE2gHaEV?pid=Api","datePublished":"2024-01-15T15:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/cancers/cancers-16-00374/article_deploy/html/images/cancers-16-00374-g001.png?1706058817","hostPageUrl":"https://www.mdpi.com/2072-6694/16/2/374","contentSize":"545288 B","width":3618,"height":2121,"cDNContentUrl":"https://th.bing.com/th/id/R.91b126bfd5f488d63f6b545222bc04da?rik=vsYm7IEyU1Ylyg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"360B01E355F11722FCB7CA2556533281EC26C6BE","accentColor":"C1810A"},"A7A81B8354F7C2823541284602816761FFD9C0DA":{"name":"Early Crop Disease Detection with AI: Strategies for Prevention","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.UoH9nwQUBkjIeEENS-kJ-QHaEK?pid=Api","datePublished":"2024-03-27T07:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.xenonstack.com/hs-fs/hubfs/cnn-model-for-crop-disease-detection.png?width=2560&height=1440&name=cnn-model-for-crop-disease-detection.png","hostPageUrl":"https://www.xenonstack.com/use-cases/crop-disease-detection-with-ai","contentSize":"362544 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.5281fd9f04140648c878410d4be909f9?rik=eoqxOEV%2fLChTFA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AD0C9DFF1676182064821453282C7F4538B18A7A","accentColor":"BEA50D"},"4EBDDCA8B2DD642EB684F6733291A764485BF98A":{"name":"The Sobel and Laplacian Edge Detectors - AI Shack","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.68_-6csTQCrfRbSBrm5_-wAAAA?pid=Api","datePublished":"2020-01-15T16:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://aishack.in/static/img/tut/conv-laplacian.jpg","hostPageUrl":"http://aishack.in/tutorials/sobel-laplacian-edge-detectors/","contentSize":"8507 B","width":296,"height":165,"cDNContentUrl":"https://th.bing.com/th/id/R.ebcffee9cb13402adf45b481ae6e7ffb?rik=5NvNiivdRuJrSA&riu=http%3a%2f%2faishack.in%2fstatic%2fimg%2ftut%2fconv-laplacian.jpg&ehk=KhNWGlwd9mnpZ%2bWw9w1NeWsrXkHrxmS60W07UX0c2sc%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A89FB584467A1923376F486BE246DD2B8ACDDBE4","accentColor":"666666"},"43C1927B2499A2B3E9BD3E664DE8F486766DAB39":{"name":"Roche Cell Death Detection ELIS Roche","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.FJUidLUtfXYyQ61P_ycHsQAAAA?pid=Api","datePublished":"2015-02-21T20:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.sigmaaldrich.com/deepweb/assets/sigmaaldrich/product/images/286/525/8b40bb49-e749-46ba-abfb-39c777cfe71d/640/8b40bb49-e749-46ba-abfb-39c777cfe71d.jpg","hostPageUrl":"https://www.sigmaaldrich.com/US/en/product/roche/11544675001","contentSize":"38447 B","width":444,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.14952274b52d7d763243ad4fff2707b1?rik=NBwpt0KZKjue2w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93BAD667684F8ED466E3DB9E3B2A9942B7291C34","accentColor":"064EB8"},"928CB4073AD066E0802CBD9DE96B60FB57E020B4":{"name":"Real-Time Facial Emotion Recognition Framework for Employees of ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.V__h4dWkENKHvrF-wJ3p3wHaD-?pid=Api","datePublished":"2021-11-09T12:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-11-10540/article_deploy/html/images/applsci-11-10540-g001-550.jpg","hostPageUrl":"https://www.mdpi.com/2076-3417/11/22/10540","contentSize":"28494 B","width":550,"height":295,"cDNContentUrl":"https://th.bing.com/th/id/R.57ffe1e1d5a410d287beb17ec09de9df?rik=KchLcKMNZg4Iwg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4B020E75BF06B69ED9DBC2080E660DA3704BC829","accentColor":"2D6D9E"},"DF81386B0BEFD9B7E0817DF249D54210E8530ACE":{"name":"A Tribute to M.S. Swaminathan: The Man Who Fed India and Pioneered the ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.58hw2n8KAhH_j77soJC7-gAAAA?pid=Api","datePublished":"2025-08-22T02:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://currentaffairs.adda247.com/wp-content/uploads/multisite/sites/5/2025/08/20104739/GkHTtkCbcAAYpvx-1536x1026-1-1-300x169.jpg","hostPageUrl":"https://currentaffairs.adda247.com/a-tribute-to-m-s-swaminathan-the-man-who-fed-india-and-pioneered-the-green-revolution/","contentSize":"11828 B","width":300,"height":169,"cDNContentUrl":"https://th.bing.com/th/id/R.e7c870da7f0a0211ff8fbeeca090bbfa?rik=%2fRiDtrD%2bnXsOGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ECA0358E01245D942FD7180E7B9DFEB0B68318FD","accentColor":"1C5C3C"},"CE0DE9570E37985504BD60D940C4527BC016BF8E":{"name":"Smart Process Mapping for SOX Process Controls","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.W9bJ9gmfPld6sbnxaRqQ3AHaFF?pid=Api","datePublished":"2022-08-16T13:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.processhorizon.com/content/images/size/w600/2022/06/PO_process.png","hostPageUrl":"https://blog.processhorizon.com/smart-process-mapping-for-sox-process-controls/","contentSize":"79792 B","width":821,"height":564,"cDNContentUrl":"https://th.bing.com/th/id/R.5bd6c9f6099f3e577ab1b9f1691a90dc?rik=7NCedeBziVVA2w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E8FB610CB7254C049D06DB40558973E0759ED0EC","accentColor":"40618B"},"C57677CA9438E0EC8FF3BE4F1736E9F5BF101181":{"name":"Wisdom Tooth Removal: Indications, Preparation, & Recovery","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.KsQgFzKE5bDLmEXC2gOrMQHaE8?pid=Api","datePublished":"2022-07-27T04:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.medicoverhospitals.in/images/procedure-images/wisdom-tooth-removal.webp","hostPageUrl":"https://www.medicoverhospitals.in/procedures/wisdom-tooth-removal/","contentSize":"47982 B","width":600,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.2ac420173284e5b0cb9845c2da03ab31?rik=XGd3rEmDDs74Pw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"181101FB5F9E6371F4EB3FF8CE0E8349AC77675C","accentColor":"00478E"},"BA4F2E85B4B23C96D11630F855824E38575321B4":{"name":"A Survey of Outlier Detection Techniques in IoT: Review and Classification","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.n11aaDNckM3NvN7SROUbSQHaD6?pid=Api","datePublished":"2022-01-04T09:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/jsan/jsan-11-00004/article_deploy/html/images/jsan-11-00004-g001.png","hostPageUrl":"https://www.mdpi.com/2224-2708/11/1/4","contentSize":"150797 B","width":2395,"height":1265,"cDNContentUrl":"https://th.bing.com/th/id/R.9f5d5a68335c90cdcdbcded244e51b49?rik=q%2fTiWEsrw2kdYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4B12357583E428558F03611D69C32B4B58E2F4AB","accentColor":"30859B"},"62464E72A1AF02B5ED91124B77DEE8CD004B0D77":{"name":"Hướng dẫn về việc dọn dẹp các mảnh vỡ | FEMA.gov","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.3cUoEjqGMfE6uSWo1ab1twHaD4?pid=Api","datePublished":"2024-09-16T06:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fema.gov/sites/default/files/graphics/debris_removal_Facebook.png","hostPageUrl":"https://www.fema.gov/vi/node/debris-removal-guidelines","contentSize":"159961 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.ddc528123a8631f13ab925a8d5a6f5b7?rik=JmTkJxr6IFveGQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"77D0B400DC8EED77B42119DE5B20FA1A27E46426","accentColor":"346F97"},"D55D59EC7A470DE60734F132235DAAEEB8B28B2D":{"name":"Explainer: How a Sitting Judge Can Be Removed From Office","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.nmIwB9Fgc6iBBSI074SCewHaKe?pid=Api","datePublished":"2018-04-20T12:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.thewire.in/wp-content/uploads/2018/04/20170522/Impeachment-Proceedings-copy-768x1086.jpg","hostPageUrl":"https://thewire.in/law/explainer-impeachment-cji-judge-removal-constitution","contentSize":"148488 B","width":768,"height":1086,"cDNContentUrl":"https://th.bing.com/th/id/R.9e623007d16073a881052234ef84827b?rik=XdWVzqd00G5wQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D2B82B8BEEAAD532231F43706ED074A7CE95D55D","accentColor":"C37108"},"549D01372E4F7432E92A1D87BA8E29B1FDC70A47":{"name":"How bacteria develop antibiotic resistance - xaam.in","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.NMuoYizshrKHsBLsdREetwHaJF?pid=Api","datePublished":"2016-04-12T17:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.livemint.com/r/LiveMint/Period2/2016/04/12/Photos/w-science-graphic.jpg","hostPageUrl":"http://www.xaam.in/2016/04/how-bacteria-develop-antibiotic.html","contentSize":"287762 B","width":932,"height":1143,"cDNContentUrl":"https://th.bing.com/th/id/R.34cba8622cec86b287b012ec75111eb7?rik=RdkQc%2bL0RyOeog&riu=http%3a%2f%2fwww.livemint.com%2fr%2fLiveMint%2fPeriod2%2f2016%2f04%2f12%2fPhotos%2fw-science-graphic.jpg&ehk=He92bnhF810YH4IsGjhmMUE2e1pc8yjWpI%2fCUeeNtYw%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"74A07CDF1B92E8AB78D1A29E2347F4E27310D945","accentColor":"C78A04"},"736B1DEEA554BD00628E6C20BD8B3A46E346A21E":{"name":"Honeywell HS-81 Fire and Gas Controller | Fire Detection & Smoke Detection","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.keUjafAp_RXAyvARGMhRogHaGr?pid=Api","datePublished":"2020-10-10T06:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.honeywellbuildings.in/assets/images/fire/hs_infograph.png","hostPageUrl":"https://www.honeywellbuildings.in/fire/fire-detection-and-alarm-system/hs81","contentSize":"335482 B","width":1327,"height":1198,"cDNContentUrl":"https://th.bing.com/th/id/R.91e52369f029fd15c0caf01118c851a2?rik=N7bR7lpF2wAm6A&pid=ImgRaw&r=0","isTransparent":true,"imageId":"E12A643E64A3B8DB02C6E82600DB455AEED1B637","accentColor":"088841"}},"relatedSearches":[{"text":"Malware Virus Protection","displayText":"Malware Virus Protection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Virus+Protection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5832.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Virus+Protection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Virus+Protection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Virus Removal","displayText":"Virus Removal","webSearchUrl":"https://www.bing.com/images/search?q=Virus+Removal&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Virus+Removal","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Virus+Removal&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Scanner","displayText":"Malware Scanner","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Scanner&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Scanner","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Scanner&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Software","displayText":"Malware Detection Software","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Software&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Software","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Computer Anti-Virus","displayText":"Computer Anti-Virus","webSearchUrl":"https://www.bing.com/images/search?q=Computer+Anti-Virus&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Computer+Anti-Virus","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Computer+Anti-Virus&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Scan","displayText":"Malware Scan","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Scan&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Scan","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Scan&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Removal Tool","displayText":"Malware Removal Tool","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Removal+Tool&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Removal+Tool","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Removal+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Security","displayText":"Malware Security","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Security","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Email Malware Detection","displayText":"Email Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Email+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Email+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Email+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malicious Malware","displayText":"Malicious Malware","webSearchUrl":"https://www.bing.com/images/search?q=Malicious+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malicious+Malware","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malicious+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Network","displayText":"Malware Network","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Network&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Network","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Removal Kit","displayText":"Malware Removal Kit","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Removal+Kit&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Removal+Kit","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Removal+Kit&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Top Malware Removal Software","displayText":"Top Malware Removal Software","webSearchUrl":"https://www.bing.com/images/search?q=Top+Malware+Removal+Software&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Top+Malware+Removal+Software","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Top+Malware+Removal+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Virus Removal Prices","displayText":"Virus Removal Prices","webSearchUrl":"https://www.bing.com/images/search?q=Virus+Removal+Prices&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Virus+Removal+Prices","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Virus+Removal+Prices&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Windows Malware Detection","displayText":"Windows Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Windows+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Windows+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Windows+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Image-Based Malware Detection","displayText":"Image-Based Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Image-Based+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Image-Based+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Image-Based+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Tools","displayText":"Malware Detection Tools","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Tools&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Tools","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Tools&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Attack","displayText":"Malware Attack","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Attack&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Attack","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Android Malware Detection","displayText":"Android Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Android+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Android+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection White Logo","displayText":"Malware Detection White Logo","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+White+Logo&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+White+Logo","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+White+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Define Malware Detection","displayText":"Define Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Define+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Define+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Define+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection in Cyber Security","displayText":"Malware Detection in Cyber Security","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+in+Cyber+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Cyber+Security","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+in+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection in Local Network","displayText":"Malware Detection in Local Network","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+in+Local+Network&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Local+Network","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+in+Local+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection and Prevention","displayText":"Malware Detection and Prevention","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+and+Prevention&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+and+Prevention","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+and+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How to Check for Malware","displayText":"How to Check for Malware","webSearchUrl":"https://www.bing.com/images/search?q=How+to+Check+for+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+to+Check+for+Malware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=How+to+Check+for+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Ai Detection","displayText":"Malware Ai Detection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Ai+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Ai+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Ai+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Report","displayText":"Malware Detection Report","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Report&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Report","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+Report&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Anti-Malware","displayText":"Anti-Malware","webSearchUrl":"https://www.bing.com/images/search?q=Anti-Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Anti-Malware","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Anti-Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Context Diagram","displayText":"Malware Detection Context Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Context+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Context+Diagram","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+Context+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Methods","displayText":"Malware Detection Methods","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Methods&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5890.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Methods","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+Methods&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Sentinel Malware Detection","displayText":"Sentinel Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Sentinel+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5892.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Sentinel+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Sentinel+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection and Classification","displayText":"Malware Detection and Classification","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+and+Classification&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5894.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+and+Classification","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+and+Classification&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Remove Malware and Spyware","displayText":"Remove Malware and Spyware","webSearchUrl":"https://www.bing.com/images/search?q=Remove+Malware+and+Spyware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5896.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Remove+Malware+and+Spyware","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Remove+Malware+and+Spyware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Background","displayText":"Malware Detection Background","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Background&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5898.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Background","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Veeam Malware Detection","displayText":"Veeam Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Veeam+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5900.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Veeam+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Veeam+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Detect Malware","displayText":"Detect Malware","webSearchUrl":"https://www.bing.com/images/search?q=Detect+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5902.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Detect+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Detect+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Alert Detection","displayText":"Malware Alert Detection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Alert+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5904.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Alert+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Alert+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Intelligient Malware Detection Application Methodology","displayText":"Intelligient Malware Detection Application Methodology","webSearchUrl":"https://www.bing.com/images/search?q=Intelligient+Malware+Detection+Application+Methodology&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5906.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Intelligient+Malware+Detection+Application+Methodology","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Intelligient+Malware+Detection+Application+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Automated Malware Detection","displayText":"Automated Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Automated+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5908.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Automated+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Automated+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Malware Detection","displayText":"Types of Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5910.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Types+of+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Testing","displayText":"Malware Testing","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Testing&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5912.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Testing","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Testing&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Advanced Malware Detection","displayText":"Advanced Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Advanced+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5914.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Advanced+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Advanced+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection PNG","displayText":"Malware Detection PNG","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+PNG&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5916.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+PNG","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Detection+PNG&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Cover Page","displayText":"Malware Detection Cover Page","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Cover+Page&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5918.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Cover+Page","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+Cover+Page&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PDF Malware Detection Back Diagram","displayText":"PDF Malware Detection Back Diagram","webSearchUrl":"https://www.bing.com/images/search?q=PDF+Malware+Detection+Back+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5920.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PDF+Malware+Detection+Back+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PDF+Malware+Detection+Back+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Behavior Detection","displayText":"Malware Behavior Detection","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Behavior+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5922.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Behavior+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Behavior+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning","displayText":"Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5924.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Google Malware","displayText":"Google Malware","webSearchUrl":"https://www.bing.com/images/search?q=Google+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5926.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Google+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Google+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Flow Chart for Malware Detection","displayText":"Flow Chart for Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Flow+Chart+for+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5928.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Flow+Chart+for+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Flow+Chart+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Attack Definition","displayText":"Malware Attack Definition","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Attack+Definition&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5930.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Attack+Definition","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Attack+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1773036071626}
            [curl_error] => 
            [product_name_used] => Malware-Detection-Process
            [parsed] => Array
                (
                    [name] => malware-detection-process inr loc:in
                    [totalEstimatedMatches] => 137
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [F39B59D7CE3AC2FA46D6C502492DB38E22D8217C] => Array
                                (
                                    [name] => flowchart for virus and antivirus class 7 computers - Brainly.in
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.zZrr1httjnNj0lSdF0gDnAHaG7?pid=Api
                                    [datePublished] => 2023-06-04T22:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://hi-static.z-dn.net/files/dfc/4e2ff01cd6a15c17f111c3e9e09bff32.jpg
                                    [hostPageUrl] => https://brainly.in/question/56432416
                                    [contentSize] => 38999 B
                                    [width] => 813
                                    [height] => 761
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cd9aebd61b6d8e7363d2549d1748039c?rik=P7mVfeyjLK9kbQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C7128D22E83BD294205C6D64AF2CA3EC7D95B93F
                                    [accentColor] => 506D7B
                                )

                            [CD0E854C1C74B3C5398C62BD2D0D78ADF13CEB70] => Array
                                (
                                    [name] => A Hierarchical Approach for Android Malware Detection Using ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.moafVx5BAlRnUa0S4iCN2gHaIc?pid=Api
                                    [datePublished] => 2021-02-10T06:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-10-00432/article_deploy/html/images/electronics-10-00432-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/10/4/432
                                    [contentSize] => 740176 B
                                    [width] => 2391
                                    [height] => 2725
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9a869f571e4102546751ad12e2208dda?rik=3OBYxMFHO1yTyA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 07BEC31FDA87D0D2DB26C8935C3B47C1C458E0DC
                                    [accentColor] => 0095CC
                                )

                            [D5223CDFCC0073ABBB7549527E527F1AD60BCE0B] => Array
                                (
                                    [name] => Adversarial Samples on Android Malware Detection Systems for IoT Systems
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.vgT40Vv92Rt_kgQmjhzKxgHaFE?pid=Api
                                    [datePublished] => 2019-02-25T13:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/sensors/sensors-19-00974/article_deploy/html/images/sensors-19-00974-g001.png?1571144142
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/19/4/974
                                    [contentSize] => 1678304 B
                                    [width] => 3101
                                    [height] => 2120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.be04f8d15bfdd91b7f9204268e1ccac6?rik=XSLD%2fcwAN7q7Vw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B0ECB06DA1F725E7259457BBBA3700CCFDC3225D
                                    [accentColor] => CB9A00
                                )

                            [FD14FE0584D06452FCF5E171BDAD72310668801A] => Array
                                (
                                    [name] => Phishing Email Detection Model Using Deep Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.NbSx3WIpuc4QWhS2df0UcwHaFJ?pid=Api
                                    [datePublished] => 2023-10-15T06:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/electronics/electronics-12-04261/article_deploy/html/images/electronics-12-04261-g003.png?1697351114
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/12/20/4261
                                    [contentSize] => 1005314 B
                                    [width] => 3129
                                    [height] => 2178
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.35b4b1dd6229b9ce105a14b675fd1473?rik=30HvUEgNRiXPXw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A10886601327DADB171E5FCF25460D4850EF41DF
                                    [accentColor] => CAC901
                                )

                            [807199F9C7BFACF6AA6A59EB2A053D1F828A25B7] => Array
                                (
                                    [name] => Malware Forensics Guide – Static and Dynamic Approach – Yeah Hub
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api
                                    [datePublished] => 2017-02-03T18:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png
                                    [hostPageUrl] => https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/
                                    [contentSize] => 451756 B
                                    [width] => 1600
                                    [height] => 764
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708
                                    [accentColor] => CB7600
                                )

                            [5C0039107061BB6D1830EF8F2E93808CC1945A76] => Array
                                (
                                    [name] => Robust Intelligent Malware Detection Using Deep Learning | S-Logix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api
                                    [datePublished] => 2022-06-16T23:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/
                                    [contentSize] => 40012 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 67A5491CC80839E2F8FE0381D6BB1607019300C5
                                    [accentColor] => 004B95
                                )

                            [2AC87FD22BA2E9892DCA280589D628277EBDC538] => Array
                                (
                                    [name] => Malaria Detection Accelerated: Combing a High-Throughput NanoZoomer ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.z6bwlkmpAj4a4MjNSWQKaAHaGW?pid=Api
                                    [datePublished] => 2022-10-14T08:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/pathogens/pathogens-11-01182/article_deploy/html/images/pathogens-11-01182-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-0817/11/10/1182
                                    [contentSize] => 1099881 B
                                    [width] => 3622
                                    [height] => 3110
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cfa6f09649a9023e1ae0c8cd49640a68?rik=ooz3LbIqnpjSrA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 835CDBE772826D985082ACD2989E2AB22DF78CA2
                                    [accentColor] => 8E2020
                                )

                            [8F9A0CEEE9D005F0C7173C0B12A2447EF043D9D5] => Array
                                (
                                    [name] => Malware Detection System Project
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Qxkt11bUWWVhvjh1NAwlkAHaEK?pid=Api
                                    [datePublished] => 2023-11-05T14:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i.ytimg.com/vi/sytw02floHA/maxresdefault.jpg
                                    [hostPageUrl] => https://www.finalproject.in/post/malware-detection-system-project
                                    [contentSize] => 101684 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.43192dd756d4596561be3875340c2590?rik=%2bKnA7p4NUA98cQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D9D340FE7442A21B0C3717C0F500D9EEEC0A9F8
                                    [accentColor] => C5A506
                                )

                            [0AA93679CCE508ABB4A3596E39D399DD9CC25B8B] => Array
                                (
                                    [name] => Exploit Kit - Definition - Trend Micro IN
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.AXSfjXG_lnLSRwwaszRn6gHaEP?pid=Api
                                    [datePublished] => 2019-04-09T01:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://documents.trendmicro.com/images/tex/articles/exploitkit-figure-1.jpg
                                    [hostPageUrl] => http://www.trendmicro.co.in/vinfo/in/security/definition/exploit-kit
                                    [contentSize] => 123862 B
                                    [width] => 1500
                                    [height] => 858
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.01749f8d71bf9672d2470c1ab33467ea?rik=oJpjl8xegLpLOg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B8B52CC9DD993D93E6953A4BBA805ECC97639AA0
                                    [accentColor] => C78B04
                                )

                            [F3BB1DE963B79ACE3C00B7F57E6423896DFAB40C] => Array
                                (
                                    [name] => Recent Advances in Understanding R-Process Nucleosynthesis in Metal ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.nBza4jfLLO0XyobJjKVY9AHaEa?pid=Api
                                    [datePublished] => 2026-01-18T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/universe/universe-11-00229/article_deploy/html/images/universe-11-00229-g001.png?1752225193
                                    [hostPageUrl] => https://www.mdpi.com/2218-1997/11/7/229
                                    [contentSize] => 574256 B
                                    [width] => 2406
                                    [height] => 1432
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9c1cdae237cb2ced17ca86c98ca558f4?rik=P7vRnjZ7qezDAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C04BAFD6983246E75F7B00C3ECA97B369ED1BB3F
                                    [accentColor] => 0BA8C0
                                )

                            [21FAADFFC0612CF3545CC9DC274051627469C89E] => Array
                                (
                                    [name] => Similarity-Based Malware Classification Using Graph Neural Networks
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.1a6qrTBJytHiRKLsZ4wpigHaDI?pid=Api
                                    [datePublished] => 2022-10-26T09:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g001.png?1667885589
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/21/10837
                                    [contentSize] => 1009729 B
                                    [width] => 3306
                                    [height] => 1395
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d5aeaaad3049cad1e244a2ec678c298a?rik=Eq%2fa%2fwwWwj9FxQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E98C964726150472CD9CC5453FC2160CFFDAAF12
                                    [accentColor] => C47107
                                )

                            [57B8EF721DB42607C5EE731E928323A8CA7FB4CF] => Array
                                (
                                    [name] => Next-Generation Sequencing in the Human Respiratory Virome Study ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.bCSjFYi0iI1smkv5h26_8AHaD5?pid=Api
                                    [datePublished] => 2022-12-17T10:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://encyclopedia.pub/media/item_content/202212/638960020f7ddmicroorganisms-10-02327-g002.png
                                    [hostPageUrl] => https://encyclopedia.pub/entry/37647
                                    [contentSize] => 514994 B
                                    [width] => 3177
                                    [height] => 1673
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6c24a31588b4888d6c9a4bf9876ebff0?rik=dYv%2bJ9FLYnBc7g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FC4BF7AC8A323829E137EE5C70624BD127FE8B75
                                    [accentColor] => BD4D0E
                                )

                            [021999917F826C745E085E3DFA7447FA5E21620E] => Array
                                (
                                    [name] => Malware Removal
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.4MrmadfsCUUlK6DaMIH3bgHaEE?pid=Api
                                    [datePublished] => 2021-04-09T20:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://codelancer.in/assets/img/services-details/malwareremoval.png
                                    [hostPageUrl] => https://codelancer.in/malwareremoval
                                    [contentSize] => 486864 B
                                    [width] => 820
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e0cae669d7ec0945252ba0da3081f76e?rik=IJGZGfcoxkflgA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E02612E5AF7447AFD3E580E547C628F719999120
                                    [accentColor] => B88F13
                                )

                            [79AE0CE9FBCC7A8C943A825B7E0A1A11ACE8D32E] => Array
                                (
                                    [name] => Android Malware Detection Techniques: A Literature Review | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.4_dmO-uuOhgHwgBwxMbUpgHaDN?pid=Api
                                    [datePublished] => 2022-08-26T00:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/digital-forensics/android-malware-detection-techniques-a-literature-review.jpg
                                    [hostPageUrl] => https://slogix.in/digital-forensics/android-malware-detection-techniques-a-literature-review/
                                    [contentSize] => 54400 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e3f7663bebae3a1807c20070c4c6d4a6?rik=l%2brAnr%2fMp8hJow&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E23D8ECA11A1A0E7B528A349C8A7CCBF9EC0EA97
                                    [accentColor] => 004B95
                                )

                            [9550C50BCAAEC546DF8BF5CB127E0F677D69FD07] => Array
                                (
                                    [name] => Android malware detection using deep learning-Python Project | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.CwTFZNca78Dnt3u4kqMeMAHaDN?pid=Api
                                    [datePublished] => 2022-05-06T05:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning/
                                    [contentSize] => 61554 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0b04c564d71aefc0e7b77bb892a31e30?rik=WQVcsKzqXGT9uA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70DF96D776F0E721BC5FB8FD645CEAACB05C0559
                                    [accentColor] => 004A95
                                )

                            [EDF40B6E649C863F2B78645D1784F7AE7C0EC803] => Array
                                (
                                    [name] => Available Programs
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.FwPH4YEfCGF63bCCM8yTwQHaEK?pid=Api
                                    [datePublished] => 2025-08-13T17:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dfl.iiit.ac.in/fdp/fdp.png
                                    [hostPageUrl] => https://dfl.iiit.ac.in/courses
                                    [contentSize] => 1023917 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1703c7e1811f08617addb08233cc93c1?rik=3k%2bw5kbJaPOyhw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 308CE0C7EA7F4871D54687B2F368C946E6B04FDE
                                    [accentColor] => 3C6F8F
                                )

                            [C937FAEFED22AFFE9A40A8B4C330866216C10950] => Array
                                (
                                    [name] => Buy Malware Analysis and Intrusion Detection in Cyber-Physical Systems ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9HlrQPHBb4f-i4mUwZUjEAAAAA?pid=Api
                                    [datePublished] => 2023-10-05T23:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41gy9NvMP5L._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Malware-Analysis-Intrusion-Detection-Cyber-Physical/dp/1668486679
                                    [contentSize] => 21854 B
                                    [width] => 312
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f4796b40f1c16f87fe8b8994c1952310?rik=nHOv%2ft4i%2bu%2bpBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 05901C612668033C4B8A04A9EFFA22DEFEAF739C
                                    [accentColor] => 278DA4
                                )

                            [9818C312E52C5592A87E06ED3EDD5024D9C0CFCD] => Array
                                (
                                    [name] => Trending Project Ideas for Final Year Students in Computer Science
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.5GXtgvxE0H9JtkhvxWfYQQHaEK?pid=Api
                                    [datePublished] => 2025-01-24T15:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.wixstatic.com/media/11bc1d_65e12941da6c4a849abff1a1d579dfd0~mv2.png/v1/fill/w_980,h_551,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11bc1d_65e12941da6c4a849abff1a1d579dfd0~mv2.png
                                    [hostPageUrl] => https://www.finalproject.in/post/trending-project-ideas-for-final-year-students-in-computer-science
                                    [contentSize] => 1016149 B
                                    [width] => 980
                                    [height] => 551
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e465ed82fc44d07f49b6486fc567d841?rik=iYE8IV7CVSmK5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DCFC0C9D4205DDE3DE60E78A2955C25E213C8189
                                    [accentColor] => 966535
                                )

                            [B0C5C445687A41A4DCCB1990A620B3A86FDA03BC] => Array
                                (
                                    [name] => 7 Key Best Practices for Developing Secure Applications - Yeah Hub
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.hNfWCd1wikwgJYBKySukVQHaEC?pid=Api
                                    [datePublished] => 2025-03-19T02:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2025/03/malware-detection.jpg
                                    [hostPageUrl] => https://www.yeahhub.com/7-key-best-practices-for-developing-secure-applications/
                                    [contentSize] => 89828 B
                                    [width] => 1596
                                    [height] => 870
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.84d7d609dd708a4c2025804ac92ba455?rik=C1xMVIanFErNvA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CB30ADF68A3B026A0991BCCD4A14A786544C5C0B
                                    [accentColor] => 31B417
                                )

                            [4716BB7012FC885F49E85B0DE54791F92F8019D1] => Array
                                (
                                    [name] => How to Create a Netskope Profile | Dell India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.s1RIjHdvaj9_Ep8zd0lf8AHaFk?pid=Api
                                    [datePublished] => 2021-04-11T21:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://supportkb.dell.com/img/ka06P000000QTl9QAG/ka06P000000QTl9QAG_en_US_8.jpeg
                                    [hostPageUrl] => https://www.dell.com/support/kbdoc/en-in/000126833/how-to-create-a-netskope-profile
                                    [contentSize] => 26986 B
                                    [width] => 800
                                    [height] => 601
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b354488c776f6a3f7f129f3377495ff0?rik=dGG7ByHPiPWUjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1D9108F29F19745ED0B58E94F588CF2107BB6174
                                    [accentColor] => 1595B6
                                )

                            [97689A7C91702D7AF7AAC9DC274051627469C89E] => Array
                                (
                                    [name] => Similarity-Based Malware Classification Using Graph Neural Networks
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.gILvkPdVYVrKCsVl2n-6iAHaB_?pid=Api
                                    [datePublished] => 2022-10-26T09:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g006.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/21/10837
                                    [contentSize] => 347766 B
                                    [width] => 3285
                                    [height] => 882
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8082ef90f755615aca0ac565da7fba88?rik=eYapxxkH0qd%2fqg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E98C964726150472CD9CAA7FA7D20719C7A98679
                                    [accentColor] => 187AB3
                                )

                            [7E279B3706C1D5C43140C9DC274051627469C89E] => Array
                                (
                                    [name] => Similarity-Based Malware Classification Using Graph Neural Networks
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.I5SC9uKg8e_Z3voXG6T_1gHaDj?pid=Api
                                    [datePublished] => 2022-10-26T09:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-12-10837/article_deploy/html/images/applsci-12-10837-g009.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/21/10837
                                    [contentSize] => 586641 B
                                    [width] => 3261
                                    [height] => 1563
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.239482f6e2a0f1efd9defa171ba4ffd6?rik=53K5c2AcXUwTBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E98C964726150472CD9C04134C5D1C6073B972E7
                                    [accentColor] => C4B407
                                )

                            [4406A69803D3A3ECDDBA49A5DDEEBEEC659E4AD0] => Array
                                (
                                    [name] => Building Resilience in Manufacturing: The Critical Need for OT ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.J5GH5VkD-ZMo9UlWTXOJOgHaEK?pid=Api
                                    [datePublished] => 2024-12-10T16:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://rockwellautomation.scene7.com/is/image/rockwellautomation/malware-cyber-threats-SHS-2279624513.2400.jpg
                                    [hostPageUrl] => https://www.rockwellautomation.com/en-in/company/news/magazines/cybersecurity-resilience-dragos.html
                                    [contentSize] => 127174 B
                                    [width] => 2400
                                    [height] => 1350
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.279187e55903f99328f549564d73893a?rik=RGBqiTA9Os7dqw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0DA4E956CEEBEEDD5A94ABDDCE3A3D30896A6044
                                    [accentColor] => 390109
                                )

                            [F90FE7EB571C6BA327014491D12044C1252A65E4] => Array
                                (
                                    [name] => Capsid-Targeted Viral Inactivation: A Novel Tactic for Inhibiting ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7wxuhwcXI7Ktkd9oWVpi8wHaH6?pid=Api
                                    [datePublished] => 2016-09-21T09:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/viruses/viruses-08-00258/article_deploy/html/images/viruses-08-00258-g001-1024.png
                                    [hostPageUrl] => https://www.mdpi.com/1999-4915/8/9/258
                                    [contentSize] => 544562 B
                                    [width] => 959
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ef0c6e87071723b2ad91df68595a62f3?rik=n%2fB%2bvnXBtjpyEA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4E56A2521C44021D194410723AB6C175BE7EF09F
                                    [accentColor] => BB5510
                                )

                            [02CDAC6ADFF5839D6859BF1609380FAFB2E6BE38] => Array
                                (
                                    [name] => How to check a site for viruses: tools overview
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rENH8iopjHmScJv_91niHQHaEc?pid=Api
                                    [datePublished] => 2020-06-24T13:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://serpstat.com/img/blog/how-to-check-a-website-for-viruses/1571328512image2.png
                                    [hostPageUrl] => https://serpstat.com/blog/how-to-check-a-website-for-viruses/
                                    [contentSize] => 175093 B
                                    [width] => 1069
                                    [height] => 641
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ac4347f22a298c7992709bfff759e21d?rik=INzKpv1fONmGlQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 83EB6E2BFAF0839061FB9586D9385FFDA6CADC20
                                    [accentColor] => C76804
                                )

                            [25C16F560B714B80E30AD470A524B6E9D1ABECE9] => Array
                                (
                                    [name] => Buy Android Malware Detection using Machine Learning Book Online at Low ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.z3n_Bx2857QceKe5EnuykAAAAA?pid=Api
                                    [datePublished] => 2025-07-27T09:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41Y3YfrK-RL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Android-Malware-Detection-Machine-Learning/dp/303074664X
                                    [contentSize] => 19156 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cf79ff071dbce7b41c78a7b9127bb290?rik=Uhz2ZbAXtAg%2boA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9ECEBA1D9E6B425A074DA03E08B417B065F61C52
                                    [accentColor] => BC510F
                                )

                            [E71EE04CFD0D58E5F3754ED39FB9EC10BFF115A8] => Array
                                (
                                    [name] => Malware Data Science: Attack Detection and Attribution eBook : Saxe ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.iIJZ3qXgCQ6vUZdakWqtsgAAAA?pid=Api
                                    [datePublished] => 2025-06-27T10:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51xvda8SrVL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Malware-Data-Science-Detection-Attribution-ebook/dp/B077X1V9SY
                                    [contentSize] => 28671 B
                                    [width] => 339
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.888259dea5e0090eaf51975a916aadb2?rik=fuEOxN%2fQhV4%2fVw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8A511FFB01CE9BF93DE4573F5E85D0DFC40EE17E
                                    [accentColor] => 6C9F2C
                                )

                            [3A72AFEF54C1526A4B58CFFD9FF459974C91BFEC] => Array
                                (
                                    [name] => What is Malware, and How to Protect Against It?
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.KGxNsAb-2cEGzY8kp_IuYQHaEK?pid=Api
                                    [datePublished] => 2017-09-07T20:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://content.kaspersky-labs.com/fm/press-releases/63/63459fdac7669bf9de01be2aaf38470b/processed/gettyimages-1353240272-q75.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/preemptive-safety/what-is-malware-and-how-to-protect-against-it
                                    [contentSize] => 62793 B
                                    [width] => 670
                                    [height] => 376
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.286c4db006fed9c106cd8f24a7f22e61?rik=oyf6%2fkUcJaa0hQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CEFB19C479954FF9DFFC85B4A6251C45FEFA27A3
                                    [accentColor] => 0CA4BF
                                )

                            [B4601722AF5DFD3A768185D8DAA745D7C2FD5809] => Array
                                (
                                    [name] => Buy Malware Detection: 27 (Advances in Information Security) Book ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.K3fuGtMSBV-Iuse-mrm93gAAAA?pid=Api
                                    [datePublished] => 2025-07-27T06:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41pqsXiDGqL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Malware-Detection-Advances-Information-Security/dp/0387327207
                                    [contentSize] => 13671 B
                                    [width] => 279
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2b77ee1ad312055f88bac7be9ab9bdde?rik=SwZxIvrV36NnGA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9085DF2C7D547AAD8D581867A3DFD5FA2271064B
                                    [accentColor] => 046CBA
                                )

                            [F32544D05AFCEC457BF1BD85188383FED567DB5F] => Array
                                (
                                    [name] => Radar Target Detection Algorithm Using Convolutional Neural Network to ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.VDCb6DwqEXRRvsTcv9FSZQHaGr?pid=Api
                                    [datePublished] => 2022-09-11T08:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-22-06868/article_deploy/html/images/sensors-22-06868-g010.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/22/18/6868
                                    [contentSize] => 37741 B
                                    [width] => 2874
                                    [height] => 2593
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.54309be83c2a117451bec4dcbfd15265?rik=P1JEDaXPzlS3Hw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F5BD765DEF38388158DB1FB754CECFA50D44523F
                                    [accentColor] => 414141
                                )

                            [ED85E4C2CAAF3487B6737AB2D721CD5BCBAEFA38] => Array
                                (
                                    [name] => Report on malware detection - Malware Detection Using Machine Learning ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.v6MjCVlNGYjFXVV_rJ0dnQHaJl?pid=Api
                                    [datePublished] => 2022-09-16T11:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/25916942943f9f1b6230f27626318393/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-kakinada/computer-science-engineering/report-on-malware-detection/29646569
                                    [contentSize] => 184516 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bfa32309594d1988c55d557fac9d1d9d?rik=3lhOLKz6Q3hrNw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 83AFEABCB5DC127D2BA7376B7843FAAC2C4E58DE
                                    [accentColor] => 0984C2
                                )

                            [7F88137A9C7E2461CF59ACD032ED86E0E19A0CA0] => Array
                                (
                                    [name] => Cryptominers’ Anatomy: Cryptomining Internals | Akamai
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.3XE-KeVEo428vV-2oawTJAHaEK?pid=Api
                                    [datePublished] => 2025-02-06T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.akamai.com/site/en/images/blog/2024/thumbnails/edge-1080x608-1.png
                                    [hostPageUrl] => https://www.akamai.com/blog/security-research/cryptominer-anatomy-internals
                                    [contentSize] => 93233 B
                                    [width] => 1080
                                    [height] => 608
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dd713e29e544a38dbcbd5fb6a1ac1324?rik=94gxp8nnQhb8lQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0AC0A91E0E68DE230DCA95FC1642E7C9A73188F7
                                    [accentColor] => 010A0F
                                )

                            [1507C2366CCEFE5B050CF664B4A3CD595C393789] => Array
                                (
                                    [name] => Various Types of Malware- Their Symptoms, Prevention and Removal - Blog ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.fdbaljSZc3TPXBPnOepmgQHaEK?pid=Api
                                    [datePublished] => 2018-08-04T15:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.v2web.in/blog/wp-content/uploads/2018/08/Different-types-of-Malware-explained.jpg
                                    [hostPageUrl] => https://www.v2web.in/blog/various-types-of-malware-their-symptoms-prevention-and-removal/
                                    [contentSize] => 99145 B
                                    [width] => 560
                                    [height] => 315
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7dd6da9634997374cf5c13e739ea6681?rik=UXAsY8bs77VQwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 987393C595DC3A4B466FC050B5EFECC6632C7051
                                    [accentColor] => 024AC9
                                )

                            [706ACAAE73469314624E7AA0BBEBFC888453804A] => Array
                                (
                                    [name] => Top 3 Process Monitoring Tools for Malware Analysis - Tech Hyme
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.cm0obREASvaUSgW_cQSelgHaEH?pid=Api
                                    [datePublished] => 2024-07-01T15:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2024/07/Process-Monitoring-Tools.jpg
                                    [hostPageUrl] => https://techhyme.com/top-3-process-monitoring-tools-for-malware-analysis/
                                    [contentSize] => 46081 B
                                    [width] => 1596
                                    [height] => 887
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.726d286d11004af6944a05bf71049e96?rik=B6as6jdkOUEm5A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A408354888CFBEBB0AA7E42641396437EAACA607
                                    [accentColor] => 04A3C7
                                )

                            [A6C81957E4DC55B880BCDBA7EB9D04E3875EE2E9] => Array
                                (
                                    [name] => Online Malware Detection | ESET
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.fKeqyduT-OKrSU9dNgSSdAAAAA?pid=Api
                                    [datePublished] => 2017-01-01T00:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.eset.com/fileadmin/_processed_/0/5/csm_threat-analysis-grey_b8ef86f61a.png
                                    [hostPageUrl] => https://www.eset.com/in/home/online-scanner/
                                    [contentSize] => 4707 B
                                    [width] => 80
                                    [height] => 80
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7ca7aac9db93f8e2ab494f5d36049274?rik=aoyRdU7NVYsIyw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 9E2EE5783E40D9BE7ABDCB088B55CD4E75918C6A
                                    [accentColor] => 434E57
                                )

                            [7930062655B9FFFCC8E1791EA684AAEB6830E81A] => Array
                                (
                                    [name] => Intrusion Detection System (IDS) in Cyber Security
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.uGwvHxYVpQZhQtssugccdQHaD4?pid=Api
                                    [datePublished] => 2011-06-13T01:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.insecure.in/images/cover/intrusion-detection-system.webp
                                    [hostPageUrl] => https://www.insecure.in/intrusion-detection-system
                                    [contentSize] => 25708 B
                                    [width] => 1200
                                    [height] => 628
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b86c2f1f1615a5066142db2cba071c75?rik=lwNgYlWb%2f8%2bMHg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A18E0386BEAA486AE1971E8CCFFF9B5562600397
                                    [accentColor] => C1630A
                                )

                            [92A1DCFD7CF1D4A60D68D40E449416C680E7DF02] => Array
                                (
                                    [name] => 9 Static Detection Methods To Identify Viruses - Tech Hyme
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.AoFDZBidc_Ivjb-q13G5dQHaE4?pid=Api
                                    [datePublished] => 2023-05-22T13:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2023/05/Computer-Viruses-Techhyme.jpg
                                    [hostPageUrl] => https://techhyme.com/9-static-detection-methods-to-identify-viruses/
                                    [contentSize] => 160253 B
                                    [width] => 1350
                                    [height] => 890
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.02814364189d73f22f8dbfaad771b975?rik=KRrN38cfTWrQhg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 20FD7E086C614944E04D86D06A4D1FC7DFCD1A29
                                    [accentColor] => 806F4B
                                )

                            [43C4358F0CE0A2CB17C230AEC2703BAEF4C0CC4C] => Array
                                (
                                    [name] => Improving Phage-Biofilm In Vitro Experimentation
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.75ko4AQg1AeynZA6mvRBigHaDx?pid=Api
                                    [datePublished] => 2021-06-19T11:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/viruses/viruses-13-01175/article_deploy/html/images/viruses-13-01175-ag-550.jpg?1624100009
                                    [hostPageUrl] => https://www.mdpi.com/1999-4915/13/6/1175
                                    [contentSize] => 69307 B
                                    [width] => 550
                                    [height] => 280
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ef9928e00420d407b29d903a9af4418a?rik=NExT%2bMAOKrxxLA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C4CC0C4FEAB3072CEA032C71BC2A0EC0F8534C34
                                    [accentColor] => 463163
                                )

                            [718AADBCE13782D35A01E1C1E5D66D1716A94CAD] => Array
                                (
                                    [name] => Home [mohali.ptu.ac.in]
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xZR_eIxOIFx82HnrqN2QSAHaHa?pid=Api
                                    [datePublished] => 2017-06-01T09:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://mohali.ptu.ac.in/Uploads/134064465164432831.jpeg
                                    [hostPageUrl] => https://mohali.ptu.ac.in/
                                    [contentSize] => 206257 B
                                    [width] => 1280
                                    [height] => 1280
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c5947f788c4e205c7cd879eba8dd9048?rik=F6jayx5zKD2lEA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DAC49A6171D66D5E1C1E10A53D28731ECBDAA817
                                    [accentColor] => 1B80B0
                                )

                            [5890A9B4CBCB436D6E29E1C1E5D66D1716A94CAD] => Array
                                (
                                    [name] => Home [mohali.ptu.ac.in]
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.IMeb7_ThZMpZfK_9DfGduAHaJQ?pid=Api
                                    [datePublished] => 2017-06-01T09:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://mohali.ptu.ac.in/Uploads/134093101979362001.jpeg
                                    [hostPageUrl] => https://mohali.ptu.ac.in/
                                    [contentSize] => 313080 B
                                    [width] => 1024
                                    [height] => 1280
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.20c79beff4e164ca597caffd0df19db8?rik=hQmaS7y8NNbmkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DAC49A6171D66D5E1C1E92E6D634BCBC4B9A0985
                                    [accentColor] => C10A12
                                )

                            [C4792C03B3CDF1A28A1D564BC0E233AA1633E13A] => Array
                                (
                                    [name] => AI in Cybersecurity: Deep Packet Inspection and Malware Detection Using ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api
                                    [datePublished] => 2025-12-14T02:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://johal.in/content/images/2025/08/logo-1.png
                                    [hostPageUrl] => https://johal.in/ai-in-cybersecurity-deep-packet-inspection-and-malware-detection-using-cnn-and-network-flow-data-2026/
                                    [contentSize] => 1411915 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => A31E3361AA332E0CB465D1A82A1FDC3B30C2974C
                                    [accentColor] => 0054AC
                                )

                            [1501FE709318DCA2778155ED92006AA584648CCD] => Array
                                (
                                    [name] => SteelTech Engineering
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.nKKLyQNSlZR_I-2KdU3zaQHaDg?pid=Api
                                    [datePublished] => 2016-04-08T06:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.steeltechengg.com/images/3d%20model%20preparation.jpg
                                    [hostPageUrl] => http://www.steeltechengg.com/bimmethodology.html
                                    [contentSize] => 362920 B
                                    [width] => 969
                                    [height] => 458
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9ca28bc9035295947f23ed8a754df369?rik=URDvBzmBzSp3GA&riu=http%3a%2f%2fwww.steeltechengg.com%2fimages%2f3d+model+preparation.jpg&ehk=8sUldSPl9hyTtybtHsjFxUTW%2bsAOliOeme3PfaJnyoM%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DCC846485AA60029DE5518772ACD813907EF1051
                                    [accentColor] => 0E6FBD
                                )

                            [F30C3A7CB7E2D52C8F8A9B70D64465641B802F1A] => Array
                                (
                                    [name] => Deep Learning-Based Change Detection in Remote Sensing Images: A Review
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rJAaJ_uuLK5bGuXDiLWrJwHaE8?pid=Api
                                    [datePublished] => 2022-02-11T15:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/remotesensing/remotesensing-14-00871/article_deploy/html/images/remotesensing-14-00871-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2072-4292/14/4/871
                                    [contentSize] => 486370 B
                                    [width] => 3285
                                    [height] => 2190
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ac901a27fbae2cae5b1ae5c388b5ab27?rik=P8Cjx3suXcL4qA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A1F208B14656446D07B9A8F8C25D2E7BC7A3C03F
                                    [accentColor] => AB5820
                                )

                            [B7F3BA29F00C1F71F511DEF141F5840B51D4EDD0] => Array
                                (
                                    [name] => Leak tester to detect and calculate leakages - LD 500 | CS INSTRUMENTS
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.X5194d0gCcZTHFkvb_DqxwHaFL?pid=Api
                                    [datePublished] => 2019-09-02T06:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.cs-instruments.com/cs-data/Produktbilder/PNG/Leckage/603/image-thumb__603__product/Leakage_detection_process_map_en_b.df918d36.png
                                    [hostPageUrl] => https://www.cs-instruments.com/leak-tester-ld500-to-detect-and-calculate-leakages/
                                    [contentSize] => 447506 B
                                    [width] => 1440
                                    [height] => 1008
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5f9d7de1dd2009c6531c592f6ff0eac7?rik=ez%2brkg%2fA8RdfEQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0DDE4D15B0485F141FED115F17F1C00F92AB3F7B
                                    [accentColor] => 305A4C
                                )

                            [84755057E8476A6D3F2F4148BDD222B25E6891FE] => Array
                                (
                                    [name] => Malware - Free computer icons
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.gg7LzYD3OTHBxpzq2VHNXgHaHa?pid=Api
                                    [datePublished] => 2018-10-26T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn-icons-png.flaticon.com/512/1176/1176560.png
                                    [hostPageUrl] => https://www.flaticon.com/free-icon/malware_1176560
                                    [contentSize] => 13455 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.820ecbcd80f73931c1c69cead951cd5e?rik=SFcFdY50ptbz8g&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => EF1986E52B222DDB8414F2F3D6A6748E75055748
                                    [accentColor] => CB0012
                                )

                            [7C2AAC5E3042320DEA758EA06A3F15DC8EB2D41A] => Array
                                (
                                    [name] => Development and Evaluation of Duplex MIRA-qPCR Assay for Simultaneous ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Tqbu1Jg9gKrGuSlPQcOvIQHaDm?pid=Api
                                    [datePublished] => 2022-08-27T14:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/microorganisms/microorganisms-10-01734/article_deploy/html/images/microorganisms-10-01734-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-2607/10/9/1734
                                    [contentSize] => 1338306 B
                                    [width] => 4434
                                    [height] => 2152
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ea6eed4983d80aac6b9294f41c3af21?rik=x6LK5QMkI9CuVw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A14D2BE8CD51F3A60AE857AED0232403E5CAA2C7
                                    [accentColor] => 1582B6
                                )

                            [A54D06D3AC27800E0C999C252BEBD6E8514ACC0F] => Array
                                (
                                    [name] => International Journal of Engineering and Computer Science
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ePArDcEZaDdvfx5ZxyDSLgHaHa?pid=Api
                                    [datePublished] => 2017-03-29T09:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ijecs.in/media.php?path=covers%2Fijecs%2F5433%2Fartcover.jpg
                                    [hostPageUrl] => https://www.ijecs.in/
                                    [contentSize] => 255412 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.78f02b0dc11968376f7f1e59c720d22e?rik=WtRgPcpyCODAmQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F0CCA4158E6DBEB252C999C0E00872CA3D60D45A
                                    [accentColor] => 1E98AD
                                )

                            [5E5DFF873706B4AA02FB249FA8AFF6BCA2059868] => Array
                                (
                                    [name] => P.C.Viruses: Detection, Analysis and Cure : Solomon, Alan: Amazon.in: Books
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.0Cf0YvxRF3YzTNtKllCq6wAAAA?pid=Api
                                    [datePublished] => 2021-07-10T12:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41i3i1qM7dL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/PC-Viruses-Detection-Analysis-Cure/dp/3540196919
                                    [contentSize] => 17204 B
                                    [width] => 312
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d027f462fc511776334cdb4a9650aaeb?rik=5dX%2feHNgS6ogvw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8689502ACB6FFA8AF942BF20AA4B607378FFD5E5
                                    [accentColor] => 1C343A
                                )

                            [E21D8DA1CC5E8EB65FFD245ED34D9E1A490A89A2] => Array
                                (
                                    [name] => Robust_Malware_Detection_for_Internet_Of_(Battlefield)_Things_Devices
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.pEM1t_gbE9DtDuL4pEz_BAHaKG?pid=Api
                                    [datePublished] => 2025-09-01T19:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://projectfix.in/assets/uploads/product/pro-main-38.png
                                    [hostPageUrl] => https://projectfix.in/project/robust-malware-detection-for-internet-of-battlefield-things-devices
                                    [contentSize] => 26720 B
                                    [width] => 550
                                    [height] => 750
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a44335b7f81b13d0ed0ee2f8a44cff04?rik=LtHYGszl6Gv13w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2A98A094A1E9D43DE542DFF56BE8E5CC1AD8D12E
                                    [accentColor] => CB0100
                                )

                            [2F3C3D8BC656EF0465C9898B3D8E980B929B529F] => Array
                                (
                                    [name] => Object Detection-Based System for Traffic Signs on Drone-Captured Images
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.a6E-IrlCxnVerl3mls2S7QHaDb?pid=Api
                                    [datePublished] => 2023-02-07T10:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/drones/drones-07-00112/article_deploy/html/images/drones-07-00112-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2504-446X/7/2/112
                                    [contentSize] => 1092215 B
                                    [width] => 3262
                                    [height] => 1513
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6ba13e22b942c6755eae5de696cd92ed?rik=8sPTuGxl%2fkBWnA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F925B929B089E8D3B8989C5640FE656CB8D3C3F2
                                    [accentColor] => 1987B2
                                )

                            [F4B76520046CA5EFDC0C0EE02B11184FC04B5DC2] => Array
                                (
                                    [name] => Laptop & Computer Virus Removal | Antivirus Services in Noida Sector 62 ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.DQwbVYIPNrmRCH-pWoESVgHaCu?pid=Api
                                    [datePublished] => 2020-09-05T02:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.bhumicomputer.in/images/malware-virus-removal.png
                                    [hostPageUrl] => https://www.bhumicomputer.in/malware-virus-removal.html
                                    [contentSize] => 46666 B
                                    [width] => 1360
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0d0c1b55820f36b991087fa95a811256?rik=T3tWAkDGWv7NwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2CD5B40CF48111B20EE0C0CDFE5AC64002567B4F
                                    [accentColor] => BF4D00
                                )

                            [609F7BC9FCDA6C7F4DA692E8ACD031313DD9F6AA] => Array
                                (
                                    [name] => Diagnosis and Detection of Viruses Infecting ICRISAT Mandate Crops ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.VjVBJxlXqHhsbOP6Yr4nOQAAAA?pid=Api
                                    [datePublished] => 2023-09-23T11:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://oar.icrisat.org/2389/1.haspreviewThumbnailVersion/Diagnosis-and-detection-of-viruses.pdf
                                    [hostPageUrl] => https://oar.icrisat.org/2389/
                                    [contentSize] => 22686 B
                                    [width] => 214
                                    [height] => 302
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.563541271957a8786c6ce3fa62be2739?rik=Bvm3nM%2btxvfUag&riu=http%3a%2f%2foar.icrisat.org%2f2389%2f1.haspreviewThumbnailVersion%2fDiagnosis-and-detection-of-viruses.pdf&ehk=aQJblUxePvRa%2fN2v6Vke4QQ4crpT0urP8n%2bF0r3nDss%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AA6F9DD313130DCA8E296AD4F7C6ADCF9CB7F906
                                    [accentColor] => 1C766B
                                )

                            [F85DA2E7B3B9032A819DE1C1E5D66D1716A94CAD] => Array
                                (
                                    [name] => Home [mohali.ptu.ac.in]
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.K-mVhxe_EGincrpH-8qsCwHaFj?pid=Api
                                    [datePublished] => 2017-06-01T09:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://mohali.ptu.ac.in/Uploads/134064467517076332.jpeg
                                    [hostPageUrl] => https://mohali.ptu.ac.in/
                                    [contentSize] => 163470 B
                                    [width] => 1280
                                    [height] => 960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2be9958717bf1068a772ba47fbcaac0b?rik=j9UqfjubMKIY2Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DAC49A6171D66D5E1C1ED918A2309B3B7E2AD58F
                                    [accentColor] => 477074
                                )

                            [3C116A8958A9CCC1EB9D32D384E04CD79223A548] => Array
                                (
                                    [name] => AI Free Trial | Oracle India
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Jax9CTZU8bEA5hc-c9pBFAHaDX?pid=Api
                                    [datePublished] => 2025-02-26T05:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.oracle.com/a/ocom/img/rc24full-ai-anomaly-detection.png
                                    [hostPageUrl] => https://www.oracle.com/in/artificial-intelligence/what-is-ai/get-started/
                                    [contentSize] => 95309 B
                                    [width] => 1344
                                    [height] => 612
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.25ac7d093654f1b100e6173e73da4114?rik=wxGmmIWazBy%2b2Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 845A32297DC40E483D23D9BE1CCC9A8598A611C3
                                    [accentColor] => 043F76
                                )

                            [0495DD9C0F1F2E81B4D9D9277EA2FE1390D4B3A3] => Array
                                (
                                    [name] => A Comprehensive Guide to Navisworks for BIM Clash Detection
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.TbyE6okyE6NxYYg7M7Se1AHaDt?pid=Api
                                    [datePublished] => 2024-07-11T03:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blog.novatr.com/hubfs/Clash%20detection%20Process%2c%20benefits%2c%20and%20future%20scope.jpg
                                    [hostPageUrl] => https://www.novatr.com/blog/navisworks-for-clash-detection
                                    [contentSize] => 65098 B
                                    [width] => 1024
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4dbc84ea893213a37161883b33b49ed4?rik=QFndyfDx4hhLnQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3A3B4D0931EF2AE7729D9D4B18E2F1F0C9DD5940
                                    [accentColor] => 26AC1F
                                )

                            [62C55F8EAD4C614A90B25C70DF31F01AF5584175] => Array
                                (
                                    [name] => Miniproject-malware - Project - ANATAMY OF MALWARE DETECTION SYSTEM ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.M0crILyhdKjujLQKyVpaLQHaKd?pid=Api
                                    [datePublished] => 2022-08-24T06:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/c49c7657fea15c84afd7979fd088e92f/thumb_1200_1696.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/mahatma-gandhi-university/cyber-forensic/miniproject-malware-project/30452763
                                    [contentSize] => 181257 B
                                    [width] => 1200
                                    [height] => 1696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.33472b20bca174a8ee8cb40ac95a5a2d?rik=Jlz16NrEFqQJKw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5714855FA10F13FD07C52B09A416C4DAE8F55C26
                                    [accentColor] => 444444
                                )

                            [15D2622DA1944D138C437C7D6CE97D5507F341E6] => Array
                                (
                                    [name] => PCR Process Steps Explained - Cole-Parmer India
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.LfrP--y8YELlaLQjnuvDowHaG3?pid=Api
                                    [datePublished] => 2020-06-09T12:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cms-resources.coleparmer.com/t/pcr-process-workflow-ta32.jpg
                                    [hostPageUrl] => https://www.coleparmer.in/tech-article/pcr-process-steps-explained
                                    [contentSize] => 55202 B
                                    [width] => 876
                                    [height] => 812
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2dfacffbecbc6042e568b4239eebc3a3?rik=US0m0hpJ1DHINA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6E143F7055D79EC6D7C734C831D4491AD2262D51
                                    [accentColor] => B4171E
                                )

                            [2122B480C985D1879DD2BFC6C32DEA64068B4A36] => Array
                                (
                                    [name] => Recent Development of Fluorescent Nanodiamonds for Optical Biosensing ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hdS2YHxj7ZtE9JimA6DasgHaEx?pid=Api
                                    [datePublished] => 2022-12-19T07:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/biosensors/biosensors-12-01181/article_deploy/html/images/biosensors-12-01181-g006.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-6374/12/12/1181
                                    [contentSize] => 1133230 B
                                    [width] => 2721
                                    [height] => 1756
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.85d4b6607c63ed9b44f498a603a0dab2?rik=EiJLCJxYHXjZLQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 63A4B86046AED23C6CFB2DD9781D589C084B2212
                                    [accentColor] => CAC801
                                )

                            [7A9244C0BBF98F121EDD0F0B96C4D36840CE9033] => Array
                                (
                                    [name] => Recent Advancements in Nanobiosensors: Current Trends, Challenges ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4MYUTEH5v_XQ7NeS9Nq6hAHaDg?pid=Api
                                    [datePublished] => 2022-10-18T12:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/biosensors/biosensors-12-00892/article_deploy/html/images/biosensors-12-00892-g010.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-6374/12/10/892
                                    [contentSize] => 2064820 B
                                    [width] => 3700
                                    [height] => 1749
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e0c6144c41f9bff5d0ecd792f4daba84?rik=pylEDLuf%2bCHh3Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3309EC04863D4C69B0F0DDE121F89FBB0C4429A7
                                    [accentColor] => C1250A
                                )

                            [7791B4757268DED2BDD7C9CA9CB8E5852AA05ACE] => Array
                                (
                                    [name] => Autopsy filetype - A concept in cybersecurity - To perform file type ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.KVE_ItvyTbEg-3BEV0jmsQHaKd?pid=Api
                                    [datePublished] => 2024-11-22T12:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/2327de8902db4da15a2f4ca4cd104f96/thumb_1200_1696.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jawaharlal-nehru-technological-university-hyderabad/computer-science/autopsy-filetype-a-concept-in-cybersecurity/111582472
                                    [contentSize] => 186869 B
                                    [width] => 1200
                                    [height] => 1696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.29513f22dbf24db120fb70445748e6b1?rik=dxlLVyeG7S3bfQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ECA50AA2585E8BC9AC9C7DDB2DED8627574B1977
                                    [accentColor] => 424242
                                )

                            [523099DA906E7C987F7458F65B36D7B8F18739D1] => Array
                                (
                                    [name] => Biosensors Coupled with Signal Amplification Technology for the ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.eqbg8AgFsJjL7vlh1DvWngHaFN?pid=Api
                                    [datePublished] => 2021-06-09T07:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/biosensors/biosensors-11-00190/article_deploy/html/images/biosensors-11-00190-g012a.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-6374/11/6/190
                                    [contentSize] => 1134392 B
                                    [width] => 2400
                                    [height] => 1689
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7aa6e0f00805b098cbeef961d43bd69e?rik=JQOZrQnmx4n3Rw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1D93781F8B7D63B56F8547F789C7E609AD990325
                                    [accentColor] => B38818
                                )

                            [0D45C18445A7280DDEC7993D1217615CCB64C4EC] => Array
                                (
                                    [name] => Services - BIM
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.hmiXtkzFm1bsKrDPRbEbbgHaCz?pid=Api
                                    [datePublished] => 2021-07-22T12:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.prisminfratech.in/assets/image/BIM/bim.gif
                                    [hostPageUrl] => https://www.prisminfratech.in/bim.html
                                    [contentSize] => 317062 B
                                    [width] => 1754
                                    [height] => 664
                                    [proxyContentUrl] => https://tse3.mm.bing.net/th/id/OGC.866897b64cc59b56ec2ab0cf45b11b6e?pid=Api&rurl=https%3a%2f%2fwww.prisminfratech.in%2fassets%2fimage%2fBIM%2fbim.gif&ehk=ORsXL1YjxdfIX4oGSfSuUzkJLxUfMs%2b8HLsSdH9PmBA%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.866897b64cc59b56ec2ab0cf45b11b6e?rik=0FQcSFR6gtDtfA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CE4C46BCC5167121D3997CEDD0827A54481C54D0
                                    [accentColor] => BF770C
                                )

                            [56236410733303EBF2600EC1173847F5D3AC296D] => Array
                                (
                                    [name] => Kaspersky Free Virus Removal Tool for Windows Download
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.te_1tihsi7QezHC7yhYuZAHaFx?pid=Api
                                    [datePublished] => 2015-10-31T07:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://lh3.googleusercontent.com/-9dijtWyxOvk/VjJSxroCzhI/AAAAAAAATDc/u8i5BGfQAfs/kaspersky%252520free%252520virus%252520removal%252520tool%25255B3%25255D.jpg?imgmax=800
                                    [hostPageUrl] => https://www.hackinguniversity.in/2015/10/kaspersky-free-virus-removal-tool.html
                                    [contentSize] => 77277 B
                                    [width] => 770
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b5eff5b6286c8bb41ecc70bbca162e64?rik=ZTJGATczML4vBg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D692CA3D5F7483711CE0062FBE30333701463265
                                    [accentColor] => C79404
                                )

                            [793F9A7ABAE471F9913AD3A1A1CAADF6F0958F21] => Array
                                (
                                    [name] => Best Free Trojan Virus Removal Solutions You Should Try in 2026
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.0ua_y9nYhK7zUrSn7q6-AwHaD5?pid=Api
                                    [datePublished] => 2023-12-11T16:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.wondershare.com/recoverit/article/best-free-trojan-remover.jpg
                                    [hostPageUrl] => https://recoverit.wondershare.com/windows-computer-tips/free-trojan-remover.html
                                    [contentSize] => 31860 B
                                    [width] => 1328
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d2e6bfcbd9d884aef352b4a7eeaebe03?rik=l%2fOpp6tOF58Zow&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 12F8590F6FDAAC1A1A3DA3199F174EABA7A9F397
                                    [accentColor] => BB6210
                                )

                            [00CF03A307634B11AFBDDB7701168F14A96C3B17] => Array
                                (
                                    [name] => Review of Wafer Surface Defect Detection Methods
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SUfZh3AGL_pG-o9DpN0y8AHaGT?pid=Api
                                    [datePublished] => 2023-04-10T10:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/electronics/electronics-12-01787/article_deploy/html/images/electronics-12-01787-g006.png?1681122551
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/12/8/1787
                                    [contentSize] => 350619 B
                                    [width] => 2357
                                    [height] => 2008
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4947d98770062ffa46fa8f43a4dd32f0?rik=APwwOnA2tBH62w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 71B3C69A41F8611077BDDBFA11B436703A30FC00
                                    [accentColor] => 604F5E
                                )

                            [882C352CBA87372B8FB6D68EA147CA690D8107FC] => Array
                                (
                                    [name] => Deep Learning-Based Automatic Safety Helmet Detection System for ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.5Ndk_Ze_NE1BzOWk1qPSxgHaCW?pid=Api
                                    [datePublished] => 2022-08-18T14:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-12-08268/article_deploy/html/images/applsci-12-08268-g002.png?1660901032
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/16/8268
                                    [contentSize] => 574400 B
                                    [width] => 3213
                                    [height] => 1020
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e4d764fd97bf344d41cce5a4d6a3d2c6?rik=iMJTwqt4c7L4aw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CF7018D096AC741AE86D6BF8B27378ABC253C288
                                    [accentColor] => 326699
                                )

                            [04E0CB6FBC9F31F0E71905A76541D9E6F6AAF8CA] => Array
                                (
                                    [name] => One-Pixel Attack for Continuous-Variable Quantum Key Distribution Systems
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.IG2AiynCkij8bcRXxjZYZwHaCh?pid=Api
                                    [datePublished] => 2023-01-27T09:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/photonics/photonics-10-00129/article_deploy/html/images/photonics-10-00129-g001.png?1676430245
                                    [hostPageUrl] => https://www.mdpi.com/2304-6732/10/2/129
                                    [contentSize] => 364808 B
                                    [width] => 4283
                                    [height] => 1460
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.206d808b29c29228fc6dc457c6365867?rik=QA689sv5Ew9%2bkQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AC8FAA6F6E9D14567A50917E0F13F9CBF6BC0E40
                                    [accentColor] => B9A800
                                )

                            [487F9CC31CE8154C817990D8FBDA296600B34BE9] => Array
                                (
                                    [name] => Lentiviral Vectors for T Cell Engineering: Clinical Applications ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.G0imPcr5ZEdGCDB4oqC7LAHaDU?pid=Api
                                    [datePublished] => 2021-08-02T14:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/viruses/viruses-13-01528/article_deploy/html/images/viruses-13-01528-g003-550.jpg
                                    [hostPageUrl] => https://www.mdpi.com/1999-4915/13/8/1528
                                    [contentSize] => 52470 B
                                    [width] => 550
                                    [height] => 246
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b48a63dcaf9644746083078a2a0bb2c?rik=hPfJPMGOUcQYlw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9EB43B006692ADBF8D099718C4518EC13CC9F784
                                    [accentColor] => 38934D
                                )

                            [48164BC7A5A573E6CEC67B3AFE196D00945FFBA9] => Array
                                (
                                    [name] => A Novel Layered and Advanced Nitrogen Removal Filter with Gravel and ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.UqTCvKhe3RN2rjWPxeLT9wHaDO?pid=Api
                                    [datePublished] => 2023-05-18T13:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/water/water-15-01919/article_deploy/html/images/water-15-01919-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2073-4441/15/10/1919
                                    [contentSize] => 565127 B
                                    [width] => 2975
                                    [height] => 1299
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.52a4c2bca85edd1376ae358fc5e2d3f7?rik=hGG0fFpaN27sbA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9ABFF54900D691EFA3B76CEC6E375A5A7CB46184
                                    [accentColor] => A75A24
                                )

                            [167A36B71878CDF332A24EBBDD5A0C46C6F71B8A] => Array
                                (
                                    [name] => Application of Neural Network in Predicting H2S from an Acid Gas ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.hAieEIBm4YdsvEP0exSlvgHaE9?pid=Api
                                    [datePublished] => 2023-01-16T07:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-23-01020/article_deploy/html/images/sensors-23-01020-g002-550.jpg
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/23/2/1020
                                    [contentSize] => 67714 B
                                    [width] => 550
                                    [height] => 368
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.84089e108066e1876cbc43f47b14a5be?rik=Yadje4GH3D8jKg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A8B17F6C64C0A5DDBBE42A233FDC87817B63A761
                                    [accentColor] => 68616A
                                )

                            [BC2FE1F93D640EE6E53F6457926D695533892B4D] => Array
                                (
                                    [name] => Detecting Phishing Attempts: Determine If an Email is Safe?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yL_zP3lHsJ2oihJC5R4uCQHaFj?pid=Api
                                    [datePublished] => 2023-03-24T16:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blog.bouncify.in/blog/content/images/2023/03/phishing.png
                                    [hostPageUrl] => https://blog.bouncify.in/blog/detecting-phishing-attempts-how-to-determine-if-an-email-is-safe/
                                    [contentSize] => 73970 B
                                    [width] => 530
                                    [height] => 398
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c8bff33f7947b09da88a1242e51e2e09?rik=y%2fIen9NG4G5e8w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D4B298335596D6297546F35E6EE046D39F1EF2CB
                                    [accentColor] => 004AB5
                                )

                            [7D89F4AE379C14B27CBC480F94A29C1D8A856D46] => Array
                                (
                                    [name] => 21CSC310J Malware Analysis - CT1 Set C Questions & Answers - Studocu
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th?id=OIF.D%2b%2b5ZDI8B%2fT5GcOX2ntEDA&pid=Api
                                    [datePublished] => 2026-03-05T11:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/47fa92cf1b00c4c0a5b54a382a66e59b/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/srm-institute-of-science-and-technology/malware-analysis/21csc310j-malware-analysis-ct1-set-c-questions-answers/154984027
                                    [contentSize] => 476988 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e98f8687ba117dfdce6a1efd7cfa7a80?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 64D658A8D1C92A49F084CBC72B41C973EA4F98D7
                                    [accentColor] => CC0000
                                    [isFresh] => 1
                                )

                            [C61813373D6617300EAFBEC523613F2C350C98C1] => Array
                                (
                                    [name] => Cyber Security Advisory: Data Wiper Malware
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Me0_LMojgxBVdRuFFugI8gHaDt?pid=Api
                                    [datePublished] => 2022-05-26T09:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://taxguru.in/wp-content/uploads/2022/05/Cyber-Security-Advisory-Data-Wiper-Malware.jpg
                                    [hostPageUrl] => https://taxguru.in/corporate-law/cyber-security-advisory-data-wiper-malware.html
                                    [contentSize] => 14430 B
                                    [width] => 600
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.31ed3f2cca23831055751b8516e808f2?rik=bIExc9NmcQPg%2bg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1C89C053C2F316325CEBFAE0037166D37331816C
                                    [accentColor] => BF0C10
                                )

                            [DF7AF76208555553F67C4083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.eshLbjI4YmNOniJgOLlE1gHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/06/25170954/hinglish-diamond.jpeg
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 208004 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7ac84b6e323862634e9e226038b944d6?rik=%2fad%2fJoBVVTVvxw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804C76F35555580267FA7FD
                                    [accentColor] => C79904
                                )

                            [2165F9646E247354C7424083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.BJBgTAar1iPgrkRW8yBCygHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/06/12112632/hindi.jpeg
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 279027 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0490604c06abd623e0ae4456f32042ca?rik=ElafRuZCN0V8JA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804247C453742E6469F5612
                                    [accentColor] => 043E69
                                )

                            [8DFE48A0643FA339B5CDA66F160AAE1870862155] => Array
                                (
                                    [name] => RGDiNet: Efficient Onboard Object Detection with Faster R-CNN for Air ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.K7SG_C1c3GmM2WzWoTSp1QHaIK?pid=Api
                                    [datePublished] => 2021-03-01T09:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-21-01677/article_deploy/html/images/sensors-21-01677-g003.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/21/5/1677
                                    [contentSize] => 909347 B
                                    [width] => 3030
                                    [height] => 3342
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2bb486fc2d5cdc698cd96cd6a134a9d5?rik=2O%2bECkbzOpNb3A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5512680781EAA061F66ADC5B933AF3460A84EFD8
                                    [accentColor] => BA1111
                                )

                            [1D9E62DB11F81FA83F6C9E52D6C2483A9F3A7F59] => Array
                                (
                                    [name] => Removal of Siloxanes from Model Biogas by Means of Deep Eutectic ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.IuGLE3IgR4qeHijSuwgY4AHaDb?pid=Api
                                    [datePublished] => 2021-01-06T09:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/materials/materials-14-00241/article_deploy/html/images/materials-14-00241-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1996-1944/14/2/241
                                    [contentSize] => 847760 B
                                    [width] => 3544
                                    [height] => 1641
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.22e18b137220478a9e1e28d2bb0818e0?rik=0ekmvRGP8Yrzxg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 95F7A3F9A3842C6D25E9C6F38AF18F11BD26E9D1
                                    [accentColor] => 3F568C
                                )

                            [2100C3EF9583E9C97E0E4F15CD1B3BD33ED67FF2] => Array
                                (
                                    [name] => कोरोना वायरस आपदा (Covid 19) – विज्ञान विश्व
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7gO6a5wowaH5U5o1zg1DTAHaEk?pid=Api
                                    [datePublished] => 2020-04-01T11:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://viralzone.expasy.org/resources/Baltimore.png
                                    [hostPageUrl] => https://vigyanvishwa.in/2020/03/31/covid-19/
                                    [contentSize] => 67036 B
                                    [width] => 967
                                    [height] => 597
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ee03ba6b9c28c1a1f9539a35ce0d434c?rik=EgA8%2flk4npzn4A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2FF76DE33DB3B1DC51F4E0E79C9E3859FE3C0012
                                    [accentColor] => 3BB912
                                )

                            [B8EF5C2812775660183B4083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.xfKE0mduqiPzTJEBvA8xJAHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/06/18130520/440-3_1750144813.jpeg
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 227813 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c5f284d2676eaa23f34c9101bc0f3124?rik=i%2f7FgiF3ZQaBsw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804B3810665772182C5FE8B
                                    [accentColor] => 861311
                                )

                            [19725C0518320B74BFDA69E88DADA88F650BC422] => Array
                                (
                                    [name] => Recent Trends in Copper Metallization
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.lzKB_qN5oFcfJuGJK7U5AwHaFp?pid=Api
                                    [datePublished] => 2022-09-14T16:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-11-02914/article_deploy/html/images/electronics-11-02914-g007.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/11/18/2914
                                    [contentSize] => 266433 B
                                    [width] => 2571
                                    [height] => 1960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.973281fea379a0571f26e1892bb53903?rik=kSfFUIEjsEf7rQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 224CB056F88ADAD88E96ADFB47B0238150C52791
                                    [accentColor] => CB9B00
                                )

                            [8036C929BA58C7879DD2675BA8730AB561A8E55B] => Array
                                (
                                    [name] => Spam Is The Dominant Method To Spread Malware In 2018 - MobyGeek.com
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.pFy2myek2WGZK_qjD-nNDQHaE8?pid=Api
                                    [datePublished] => 2022-03-31T01:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.mobygeek.com/2018/12/14/email-spam-25f5.jpg
                                    [hostPageUrl] => https://mobygeek.com/ict-news/spam-is-the-dominant-method-to-spread-malware-in-2018-1387
                                    [contentSize] => 101252 B
                                    [width] => 1678
                                    [height] => 1119
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a45cb69b27a4d961992bfaa30fe9cd0d?rik=CGOckquFfHjZLQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B55E8A165BA0378AB5762DD9787C85AB929C6308
                                    [accentColor] => C3B708
                                )

                            [9DC5BF00D5D05779EF526C3C8A58D58B1618FB5C] => Array
                                (
                                    [name] => ‘We hear about more viruses now but it may be because of better ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.dAQqrTVLovLu7kaREQV50wHaEB?pid=Api
                                    [datePublished] => 2025-01-08T00:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.toiimg.com/thumb/msid-117034932,width-1070,height-580,imgsize-30210,resizemode-75,overlay-toi_sw,pt-32,y_pad-40/photo.jpg
                                    [hostPageUrl] => https://timesofindia.indiatimes.com/life-style/health-fitness/health-news/we-hear-about-more-viruses-now-but-it-may-be-because-of-better-detection/articleshow/117034925.cms
                                    [contentSize] => 38933 B
                                    [width] => 1069
                                    [height] => 580
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.74042aad354ba2f2eeee4691110579d3?rik=2Vz7AF0NdZf%2bJQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C5BF8161B85D85A8C3C625FE97750D5D00FB5CD9
                                    [accentColor] => AE211D
                                )

                            [2CBCB39710D2FFA18D5A4083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.OW3nsUJEzJklQbqSe7BJNgHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/06/16114023/anthro.jpeg
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 221933 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.396de7b14244cc992541ba927bb04936?rik=wss7eQEt%2fxrYpQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804A5D81AFF2D01793BCBC2
                                    [accentColor] => C3BA08
                                )

                            [1FE9F2A2B97D6E7B29F8DB1AE9C870F809E9B680] => Array
                                (
                                    [name] => Is Laser Hair Reduction Permanent? - Blog
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.usz9SwA2BV_lEc3ZwY8q9gHaE8?pid=Api
                                    [datePublished] => 2019-08-03T21:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaya.in/media/.renditions/wysiwyg/2f0cc222b7.jpg
                                    [hostPageUrl] => https://www.kaya.in/blog/laser-hair-removal-permanent-hair-removal-solution-unwanted-hair
                                    [contentSize] => 84366 B
                                    [width] => 1000
                                    [height] => 667
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.baccfd4b0036055fe511cdd9c18f2af6?rik=8Z4vKpvX5reSjw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 086B9E908F078C9EA1BD8F92B7E6D79B2A2F9EF1
                                    [accentColor] => C02F0B
                                )

                            [2CBBA3440DD0AEE65F299DEB41BE30FE1F920924] => Array
                                (
                                    [name] => Point-of-Need DNA Testing for Detection of Foodborne Pathogenic Bacteria
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.A2G8_2Emaz2jd-ff5lQ9OgHaEp?pid=Api
                                    [datePublished] => 2019-03-04T16:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/sensors/sensors-19-01100/article_deploy/html/images/sensors-19-01100-ag-550.jpg?1571179533
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/19/5/1100
                                    [contentSize] => 92143 B
                                    [width] => 550
                                    [height] => 345
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0361bcff61266b3da377e7dfe6543d3a?rik=wrs6RNAN6m71kg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 429029F1EF03EB14BED992F56EEA0DD0443ABBC2
                                    [accentColor] => A57F26
                                )

                            [A140DC31B6EECC4AFA6038ECDA77D22E39098CD9] => Array
                                (
                                    [name] => Detection and Enumeration of Bacteria, Yeast, Viruses, and Protozoan in ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2Dny56mvfsJ-tZzg0kRXMgAAAA?pid=Api
                                    [datePublished] => 2022-08-08T00:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://rukmini1.flixcart.com/image/300/300/xif0q/book/w/3/x/detection-and-enumeration-of-bacteria-yeast-viruses-and-original-imagk3jrp48bsuny.jpeg
                                    [hostPageUrl] => https://www.flipkart.com/detection-enumeration-bacteria-yeast-viruses-protozoan-foods-freshwater/p/itm162aa07efbeb2
                                    [contentSize] => 16905 B
                                    [width] => 206
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d839f2e7a9af7ec27eb59ce0d2445732?rik=GgTNE2vuzKSvBg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fw%2f3%2fx%2fdetection-and-enumeration-of-bacteria-yeast-viruses-and-original-imagk3jrp48bsuny.jpeg&ehk=hOBmfdvZ2eSYd%2fg4SiktGrk2TMePNo4vu%2byRka8zugg%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DC89093E22D77ADCE8306AFA4CCEE6B13CD041A
                                    [accentColor] => 65B516
                                )

                            [D9376E34F6F79408D5259D8C358BF1F910BF7C0D] => Array
                                (
                                    [name] => Understanding Agobot: The Pioneering Modular Malware - Tech Hyme
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.6lU4EhO8QB1plEQuTYT5YwHaDq?pid=Api
                                    [datePublished] => 2023-08-13T03:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2023/08/Agobot-Malware-Techhyme-1024x506.jpg
                                    [hostPageUrl] => https://techhyme.com/understanding-agobot-the-pioneering-modular-malware/
                                    [contentSize] => 17646 B
                                    [width] => 1024
                                    [height] => 506
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ea55381213bc401d6994442e4d84f963?rik=nXPmQ29%2fSYBdUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D0C7FB019F1FB853C8D9525D80497F6F43E6739D
                                    [accentColor] => C3084E
                                )

                            [7E3BED1FB48156895640DF1BFB23D6DF35D106E2] => Array
                                (
                                    [name] => Underwater Object Detection Based on Improved EfficientDet
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.pgT5Zfl4PPLD8u645geepgHaIM?pid=Api
                                    [datePublished] => 2022-09-08T14:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/remotesensing/remotesensing-14-04487/article_deploy/html/images/remotesensing-14-04487-g005.png
                                    [hostPageUrl] => https://www.mdpi.com/2072-4292/14/18/4487
                                    [contentSize] => 19386 B
                                    [width] => 1568
                                    [height] => 1735
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a604f965f9783cf2c3f2eeb8e6079ea6?rik=57Pe8UsYZZhlBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2E601D53FD6D32BFB1FD04659865184BF1DEB3E7
                                    [accentColor] => 333131
                                )

                            [AC708F11E8E1CBC53BBE3508E3A4455F79A8EE66] => Array
                                (
                                    [name] => Research Progress on Integrated Treatment Technologies of Rural ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.hI7lQ1zegIpj3RtPjielPgHaEt?pid=Api
                                    [datePublished] => 2022-08-06T11:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/water/water-14-02439/article_deploy/html/images/water-14-02439-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2073-4441/14/15/2439
                                    [contentSize] => 1301845 B
                                    [width] => 3176
                                    [height] => 2017
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.848ee5435cde808a63dd1b4f8e27a53e?rik=ygf4EY4evFyz6w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66EE8A97F5544A3E8053EBB35CBC1E8E11F807CA
                                    [accentColor] => 0595C6
                                )

                            [41BFE5EB562673C424609518C8B5201E732A133E] => Array
                                (
                                    [name] => Chemically Modified Biosorbents and Their Role in the Removal of ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-LKHUoVYpGt0fpeApKRpiAHaEv?pid=Api
                                    [datePublished] => 2020-05-29T10:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/water/water-12-01551/article_deploy/html/images/water-12-01551-g001.png?1602212431
                                    [hostPageUrl] => https://www.mdpi.com/2073-4441/12/6/1551
                                    [contentSize] => 228221 B
                                    [width] => 2375
                                    [height] => 1520
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f8b287528558a46b747e9780a4a46988?rik=FPtevmViN0xCBg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E331A237E1025B8C815906424C376265BE5EFB14
                                    [accentColor] => 373231
                                )

                            [7057D24D6260C18C1416A66F160AAE1870862155] => Array
                                (
                                    [name] => RGDiNet: Efficient Onboard Object Detection with Faster R-CNN for Air ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.IT0bvrCZcHZAfLWzM2p4ngHaGe?pid=Api
                                    [datePublished] => 2021-03-01T09:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-21-01677/article_deploy/html/images/sensors-21-01677-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/21/5/1677
                                    [contentSize] => 319497 B
                                    [width] => 2946
                                    [height] => 2579
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.213d1bbeb0997076407cb5b3336a789e?rik=B3Ut1CYGHMhBYQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5512680781EAA061F66A6141C81C0626D42D7507
                                    [accentColor] => CC0000
                                )

                            [22721C8F5234AD6E8CD455B07F1EB182414005BE] => Array
                                (
                                    [name] => Detection of Bacteria, Viruses, Parasites and Fungi : Amazon.in: Books
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.SpJD2WPSwgbUL1tO6ta_bQAAAA?pid=Api
                                    [datePublished] => 2020-12-15T14:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/21MxV8bmAdL.jpg
                                    [hostPageUrl] => https://www.amazon.in/Detection-Bacteria-Viruses-Parasites-Fungi/dp/9048185459
                                    [contentSize] => 5562 B
                                    [width] => 125
                                    [height] => 187
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4a9243d963d2c206d42f5b4eead6bf6d?rik=IifB%2bCVD2ubITQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EB500414281BE1F70B554DC8E6DA4325F8C12722
                                    [accentColor] => 134473
                                )

                            [10B422CA37CD3048043092D8A5B8C486532070BB] => Array
                                (
                                    [name] => Entrenamiento y despliegue de modelos a partir de conjuntos de datos ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.JyrsmTYlVVzQ9GN-fs-lUgHaEV?pid=Api
                                    [datePublished] => 2022-12-23T12:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://docs.oracle.com/es/solutions/models-credit-card-fraud-detection/img/cc-fraud-detection-architecture.png
                                    [hostPageUrl] => https://docs.oracle.com/es/solutions/models-credit-card-fraud-detection/
                                    [contentSize] => 125265 B
                                    [width] => 1288
                                    [height] => 754
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.272aec993625555cd0f4637e7ecfa552?rik=AUsirHPcA4RAAw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => BB070235684C8B5A8D2903408403DC73AC224B01
                                    [accentColor] => 496F7B
                                )

                            [D7FEA7C44761C4E9A8C8247A7B4F3B10E59BA138] => Array
                                (
                                    [name] => Oncolytic Virotherapy in Glioma Tumors
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.JTaiyy4pz4EfhbUaI45NIwHaDX?pid=Api
                                    [datePublished] => 2020-10-14T15:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/ijms/ijms-21-07604/article_deploy/html/images/ijms-21-07604-g001.png?1602746581
                                    [hostPageUrl] => https://www.mdpi.com/1422-0067/21/20/7604
                                    [contentSize] => 1899700 B
                                    [width] => 3579
                                    [height] => 1625
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2536a2cb2e29cf811f85b51a238e4d23?rik=fe96THQWTJ6KjA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 831AB95E01B3F4B7A7428C8A9E4C16744C7AEF7D
                                    [accentColor] => 139CB3
                                )

                            [7C0E2B7FBD9375E4D3FDC861F48D295F32D2C6B7] => Array
                                (
                                    [name] => Buy Android Malware Detection and Adversarial Methods Book Online at ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Uy7c1rGeRknEw1y-CXCtZwAAAA?pid=Api
                                    [datePublished] => 2024-02-08T07:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41j64QlTOGL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Android-Malware-Detection-Adversarial-Methods/dp/9819714583
                                    [contentSize] => 15645 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.532edcd6b19e4649c4c35cbe0970ad67?rik=x%2bCy99s5V0493w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B6C2D23F592D84F168CDF3D4E5739DBF7B2E0C7
                                    [accentColor] => 1C4960
                                )

                            [D8F4677D426F9650B6497185F74EEAAD068BC621] => Array
                                (
                                    [name] => New Sky Energy Changes the Game for Biogas | Rockwell Automation
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.cFlGvXYqKAnNNFbdWVFywAHaEK?pid=Api
                                    [datePublished] => 2023-02-05T03:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://rockwellautomation.scene7.com/is/image/rockwellautomation/16x9-new-sky-energy-biogas-h2s-removal-skid.2400.jpg
                                    [hostPageUrl] => https://www.rockwellautomation.com/en-in/company/news/case-studies/new-sky-energy-biogas-h2s.html
                                    [contentSize] => 743834 B
                                    [width] => 2400
                                    [height] => 1350
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.705946bd762a2809cd3456dd595172c0?rik=jU921yT2aQVrlA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 126CB860DAAEE47F5817946B0569F624D7764F8D
                                    [accentColor] => 1468B7
                                )

                            [0FADE25BF583C1F530FA4911E18A46A9107AE692] => Array
                                (
                                    [name] => A Video-Based Fire Detection Using Deep Learning Models
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.B6Qu7KdJbygsyN-s2lTtKgHaDw?pid=Api
                                    [datePublished] => 2019-07-18T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-09-02862/article_deploy/html/images/applsci-09-02862-g005.png?1564559851
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/9/14/2862
                                    [contentSize] => 851098 B
                                    [width] => 2436
                                    [height] => 1236
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.07a42eeca7496f282cc8dfacda54ed2a?rik=8NoutV84HF8Drw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 296EA7019A64A81E1194AF035F1C385FB52EDAF0
                                    [accentColor] => B34C18
                                )

                            [7FFD071BBB922E4C9A3ECD55AEC7A0D221429B3C] => Array
                                (
                                    [name] => Transfer Learning with Deep Convolutional Neural Network (CNN) for ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.S3ytG6GpuCqtICQe1PjAhwHaEb?pid=Api
                                    [datePublished] => 2020-05-06T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-10-03233/article_deploy/html/images/applsci-10-03233-g008.png?1590214485
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/10/9/3233
                                    [contentSize] => 1011557 B
                                    [width] => 3676
                                    [height] => 2200
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4b7cad1ba1a9b82aad20241ed4f8c087?rik=999wsbsp4sSp4w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C3B924122D0A7CEA55DCE3A9C4E229BBB170DFF7
                                    [accentColor] => B78408
                                )

                            [356732F887E1AB0CA6634083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Ia7s76FemiH8hS7-PLd-3QHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/12/22130727/440-87_1766135155.webp
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 129346 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.21aeecefa15e9a21fc852efe3cb77edd?rik=U3Yjj3geusBqNg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804366AC0BA1E788F237653
                                    [accentColor] => 830525
                                )

                            [E5847ABB56500D730014D6675792AE0B03902BA1] => Array
                                (
                                    [name] => Review of the Data-Driven Methods for Electricity Fraud Detection in ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.dq2xy6AnK_lyvpAwXmVwhwHaEV?pid=Api
                                    [datePublished] => 2023-03-19T10:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/energies/energies-16-02852/article_deploy/html/images/energies-16-02852-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1996-1073/16/6/2852
                                    [contentSize] => 705717 B
                                    [width] => 3193
                                    [height] => 1870
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.76adb1cba0272bf972be90305e657087?rik=Xkinu2UF0DcAQQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1AB20930B0EA2975766D410037D00565BBA7485E
                                    [accentColor] => B31918
                                )

                            [A279B4D97F4B6E948E9726813F9BBB202D577DAA] => Array
                                (
                                    [name] => How to remove virus from laptop without antivirus | How-to
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wkLVktOKn-5hlgZwthqzPwHaEK?pid=Api
                                    [datePublished] => 2022-04-12T09:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.hindustantimes.com/tech/img/2022/04/12/960x540/virus-4811655_1920_1649754727576_1649754757869.jpg
                                    [hostPageUrl] => https://tech.hindustantimes.com/how-to/how-to-remove-virus-from-laptop-without-antivirus-71649754629285.html
                                    [contentSize] => 166723 B
                                    [width] => 960
                                    [height] => 540
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c242d592d38a9fee61960670b61ab33f?rik=KpdLnfe05knoeQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AAD775D202BBB9F3186279E849E6B4F79D4B972A
                                    [accentColor] => 1813B8
                                )

                            [3EE31122BE78AF6B44008C523A77227ECD12322B] => Array
                                (
                                    [name] => Partial Thromboplastin Time Wikipedia, 58% OFF
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.wP6Q-iHFiTvhJM0_ctpeaAHaEK?pid=Api
                                    [datePublished] => 2023-11-26T01:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://osmose-it.s3.amazonaws.com/iT1RRXkiSxq6kYObD0sg90UGTTeYVYzu/_.jpg
                                    [hostPageUrl] => https://www.elevate.in/?w=partial-thromboplastin-time-wikipedia-cc-RErqowso
                                    [contentSize] => 143862 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c0fe90fa21c5893be124cd3f72da5e68?rik=4z4RIuuH%2brZEAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B22321DCE72277A325C80044B6FA87EB22113EE3
                                    [accentColor] => 13447B
                                )

                            [3FE753C8D69362B9B448677C971CB34E2AB8DF51] => Array
                                (
                                    [name] => Mercury Removal from Natural Gas - Mercury Removal Unit | Pall Corporation
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.gKndVAeD-a6-EnwSNVxCKAHaEG?pid=Api
                                    [datePublished] => 2019-11-30T16:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pall.co.in/content/dam/pall/oil-gas/application-images/mercury-removal-process-flow-diagram.PNG?$OptimizedPNG$
                                    [hostPageUrl] => https://www.pall.co.in/en/oil-gas/midstream/midstream-merc-rem-unit-mru.html
                                    [contentSize] => 27733 B
                                    [width] => 1007
                                    [height] => 557
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.80a9dd540783f9aebe127c12355c4228?rik=8341jG05JptLhA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 15FD8BA2E43BC179C776844B9B26396D8C357EF3
                                    [accentColor] => CB5D00
                                )

                            [0D69C110A1DA3F7E13164911E18A46A9107AE692] => Array
                                (
                                    [name] => A Video-Based Fire Detection Using Deep Learning Models
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rj5CpmO_nVzr34EQ-AR3aAHaFU?pid=Api
                                    [datePublished] => 2019-07-18T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-09-02862/article_deploy/html/images/applsci-09-02862-g003.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/9/14/2862
                                    [contentSize] => 295684 B
                                    [width] => 2142
                                    [height] => 1538
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ae3e42a663bf9d5cebdf8110f8047768?rik=0JYcARqt8%2bcxYQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 296EA7019A64A81E11946131E7F3AD1A011C96D0
                                    [accentColor] => 1E24AD
                                )

                            [3F5C1AE11DC39B2026DCEF75D0CFED707EB72A38] => Array
                                (
                                    [name] => engineering tips for students | construction tips and tricks
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.6JKKJMcwxYfBrDDSyXJFywHaEB?pid=Api
                                    [datePublished] => 2019-07-25T18:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.constructioncivilengineering.com/images/concrete-formwork-removal.jpg
                                    [hostPageUrl] => https://www.constructioncivilengineering.com/tips.html
                                    [contentSize] => 53969 B
                                    [width] => 680
                                    [height] => 370
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e8928a24c730c587c1ac30d2c97245cb?rik=88WhHtE8uQJizQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 83A27BE707DEFC0D57FECD6202B93CD11EA1C5F3
                                    [accentColor] => A16D2A
                                )

                            [E87E2EE63AE240EC1B5DFDA08DC2338C40F2EDAE] => Array
                                (
                                    [name] => Acid Gas Removal Unit (AGRU) | Amine Gas Treating | Pall Corporation
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7c6frIPSTsIKXohsEGe_zgHaEe?pid=Api
                                    [datePublished] => 2019-11-24T18:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pall.co.in/content/dam/pall/oil-gas/misc-/acid-gas-process-flow.PNG?$OptimizedPNG$
                                    [hostPageUrl] => https://www.pall.co.in/en/oil-gas/refining/refinery-amine-systems.html
                                    [contentSize] => 35494 B
                                    [width] => 888
                                    [height] => 537
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.edce9fac83d24ec20a5e886c1067bfce?rik=jufibqMuBM6x1Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EADE2F04C8332CD80ADFD5B1CE042EA36EE2E78E
                                    [accentColor] => B26F19
                                )

                            [880E15CD79A5CDB3C9604083C1C902EA7292C855] => Array
                                (
                                    [name] => Transfer and Removal Process for High Court Judge
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.VwMwl-1EXjf9xrt085Oa7AHaEt?pid=Api
                                    [datePublished] => 2025-03-26T10:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.studyiq.com/articles/wp-content/uploads/2025/06/18130524/440_1750142063.jpeg
                                    [hostPageUrl] => https://www.studyiq.com/articles/removal-process-for-high-court-judge/
                                    [contentSize] => 273946 B
                                    [width] => 1833
                                    [height] => 1167
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57033097ed445e37fdc6bb74f3939aec?rik=iOBR3Jda3DucBg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 558C2927AE209C1C3804069C3BDC5A97DC51E088
                                    [accentColor] => C7B104
                                )

                            [EB6C62CE1823356552AC7BCF22711F553E10B063] => Array
                                (
                                    [name] => APOBEC Mutagenesis in Cancer Development and Susceptibility
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.kbEmv9X0iNY_a1RSIrwE2gHaEV?pid=Api
                                    [datePublished] => 2024-01-15T15:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/cancers/cancers-16-00374/article_deploy/html/images/cancers-16-00374-g001.png?1706058817
                                    [hostPageUrl] => https://www.mdpi.com/2072-6694/16/2/374
                                    [contentSize] => 545288 B
                                    [width] => 3618
                                    [height] => 2121
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.91b126bfd5f488d63f6b545222bc04da?rik=vsYm7IEyU1Ylyg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 360B01E355F11722FCB7CA2556533281EC26C6BE
                                    [accentColor] => C1810A
                                )

                            [A7A81B8354F7C2823541284602816761FFD9C0DA] => Array
                                (
                                    [name] => Early Crop Disease Detection with AI: Strategies for Prevention
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.UoH9nwQUBkjIeEENS-kJ-QHaEK?pid=Api
                                    [datePublished] => 2024-03-27T07:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.xenonstack.com/hs-fs/hubfs/cnn-model-for-crop-disease-detection.png?width=2560&height=1440&name=cnn-model-for-crop-disease-detection.png
                                    [hostPageUrl] => https://www.xenonstack.com/use-cases/crop-disease-detection-with-ai
                                    [contentSize] => 362544 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5281fd9f04140648c878410d4be909f9?rik=eoqxOEV%2fLChTFA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AD0C9DFF1676182064821453282C7F4538B18A7A
                                    [accentColor] => BEA50D
                                )

                            [4EBDDCA8B2DD642EB684F6733291A764485BF98A] => Array
                                (
                                    [name] => The Sobel and Laplacian Edge Detectors - AI Shack
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.68_-6csTQCrfRbSBrm5_-wAAAA?pid=Api
                                    [datePublished] => 2020-01-15T16:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://aishack.in/static/img/tut/conv-laplacian.jpg
                                    [hostPageUrl] => http://aishack.in/tutorials/sobel-laplacian-edge-detectors/
                                    [contentSize] => 8507 B
                                    [width] => 296
                                    [height] => 165
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ebcffee9cb13402adf45b481ae6e7ffb?rik=5NvNiivdRuJrSA&riu=http%3a%2f%2faishack.in%2fstatic%2fimg%2ftut%2fconv-laplacian.jpg&ehk=KhNWGlwd9mnpZ%2bWw9w1NeWsrXkHrxmS60W07UX0c2sc%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A89FB584467A1923376F486BE246DD2B8ACDDBE4
                                    [accentColor] => 666666
                                )

                            [43C1927B2499A2B3E9BD3E664DE8F486766DAB39] => Array
                                (
                                    [name] => Roche Cell Death Detection ELIS Roche
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.FJUidLUtfXYyQ61P_ycHsQAAAA?pid=Api
                                    [datePublished] => 2015-02-21T20:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.sigmaaldrich.com/deepweb/assets/sigmaaldrich/product/images/286/525/8b40bb49-e749-46ba-abfb-39c777cfe71d/640/8b40bb49-e749-46ba-abfb-39c777cfe71d.jpg
                                    [hostPageUrl] => https://www.sigmaaldrich.com/US/en/product/roche/11544675001
                                    [contentSize] => 38447 B
                                    [width] => 444
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.14952274b52d7d763243ad4fff2707b1?rik=NBwpt0KZKjue2w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 93BAD667684F8ED466E3DB9E3B2A9942B7291C34
                                    [accentColor] => 064EB8
                                )

                            [928CB4073AD066E0802CBD9DE96B60FB57E020B4] => Array
                                (
                                    [name] => Real-Time Facial Emotion Recognition Framework for Employees of ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.V__h4dWkENKHvrF-wJ3p3wHaD-?pid=Api
                                    [datePublished] => 2021-11-09T12:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-11-10540/article_deploy/html/images/applsci-11-10540-g001-550.jpg
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/11/22/10540
                                    [contentSize] => 28494 B
                                    [width] => 550
                                    [height] => 295
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57ffe1e1d5a410d287beb17ec09de9df?rik=KchLcKMNZg4Iwg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4B020E75BF06B69ED9DBC2080E660DA3704BC829
                                    [accentColor] => 2D6D9E
                                )

                            [DF81386B0BEFD9B7E0817DF249D54210E8530ACE] => Array
                                (
                                    [name] => A Tribute to M.S. Swaminathan: The Man Who Fed India and Pioneered the ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.58hw2n8KAhH_j77soJC7-gAAAA?pid=Api
                                    [datePublished] => 2025-08-22T02:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://currentaffairs.adda247.com/wp-content/uploads/multisite/sites/5/2025/08/20104739/GkHTtkCbcAAYpvx-1536x1026-1-1-300x169.jpg
                                    [hostPageUrl] => https://currentaffairs.adda247.com/a-tribute-to-m-s-swaminathan-the-man-who-fed-india-and-pioneered-the-green-revolution/
                                    [contentSize] => 11828 B
                                    [width] => 300
                                    [height] => 169
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e7c870da7f0a0211ff8fbeeca090bbfa?rik=%2fRiDtrD%2bnXsOGA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ECA0358E01245D942FD7180E7B9DFEB0B68318FD
                                    [accentColor] => 1C5C3C
                                )

                            [CE0DE9570E37985504BD60D940C4527BC016BF8E] => Array
                                (
                                    [name] => Smart Process Mapping for SOX Process Controls
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.W9bJ9gmfPld6sbnxaRqQ3AHaFF?pid=Api
                                    [datePublished] => 2022-08-16T13:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blog.processhorizon.com/content/images/size/w600/2022/06/PO_process.png
                                    [hostPageUrl] => https://blog.processhorizon.com/smart-process-mapping-for-sox-process-controls/
                                    [contentSize] => 79792 B
                                    [width] => 821
                                    [height] => 564
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5bd6c9f6099f3e577ab1b9f1691a90dc?rik=7NCedeBziVVA2w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E8FB610CB7254C049D06DB40558973E0759ED0EC
                                    [accentColor] => 40618B
                                )

                            [C57677CA9438E0EC8FF3BE4F1736E9F5BF101181] => Array
                                (
                                    [name] => Wisdom Tooth Removal: Indications, Preparation, & Recovery
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.KsQgFzKE5bDLmEXC2gOrMQHaE8?pid=Api
                                    [datePublished] => 2022-07-27T04:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.medicoverhospitals.in/images/procedure-images/wisdom-tooth-removal.webp
                                    [hostPageUrl] => https://www.medicoverhospitals.in/procedures/wisdom-tooth-removal/
                                    [contentSize] => 47982 B
                                    [width] => 600
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2ac420173284e5b0cb9845c2da03ab31?rik=XGd3rEmDDs74Pw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 181101FB5F9E6371F4EB3FF8CE0E8349AC77675C
                                    [accentColor] => 00478E
                                )

                            [BA4F2E85B4B23C96D11630F855824E38575321B4] => Array
                                (
                                    [name] => A Survey of Outlier Detection Techniques in IoT: Review and Classification
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.n11aaDNckM3NvN7SROUbSQHaD6?pid=Api
                                    [datePublished] => 2022-01-04T09:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/jsan/jsan-11-00004/article_deploy/html/images/jsan-11-00004-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2224-2708/11/1/4
                                    [contentSize] => 150797 B
                                    [width] => 2395
                                    [height] => 1265
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9f5d5a68335c90cdcdbcded244e51b49?rik=q%2fTiWEsrw2kdYQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4B12357583E428558F03611D69C32B4B58E2F4AB
                                    [accentColor] => 30859B
                                )

                            [62464E72A1AF02B5ED91124B77DEE8CD004B0D77] => Array
                                (
                                    [name] => Hướng dẫn về việc dọn dẹp các mảnh vỡ | FEMA.gov
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.3cUoEjqGMfE6uSWo1ab1twHaD4?pid=Api
                                    [datePublished] => 2024-09-16T06:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.fema.gov/sites/default/files/graphics/debris_removal_Facebook.png
                                    [hostPageUrl] => https://www.fema.gov/vi/node/debris-removal-guidelines
                                    [contentSize] => 159961 B
                                    [width] => 1200
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ddc528123a8631f13ab925a8d5a6f5b7?rik=JmTkJxr6IFveGQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 77D0B400DC8EED77B42119DE5B20FA1A27E46426
                                    [accentColor] => 346F97
                                )

                            [D55D59EC7A470DE60734F132235DAAEEB8B28B2D] => Array
                                (
                                    [name] => Explainer: How a Sitting Judge Can Be Removed From Office
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.nmIwB9Fgc6iBBSI074SCewHaKe?pid=Api
                                    [datePublished] => 2018-04-20T12:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.thewire.in/wp-content/uploads/2018/04/20170522/Impeachment-Proceedings-copy-768x1086.jpg
                                    [hostPageUrl] => https://thewire.in/law/explainer-impeachment-cji-judge-removal-constitution
                                    [contentSize] => 148488 B
                                    [width] => 768
                                    [height] => 1086
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9e623007d16073a881052234ef84827b?rik=XdWVzqd00G5wQw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D2B82B8BEEAAD532231F43706ED074A7CE95D55D
                                    [accentColor] => C37108
                                )

                            [549D01372E4F7432E92A1D87BA8E29B1FDC70A47] => Array
                                (
                                    [name] => How bacteria develop antibiotic resistance - xaam.in
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.NMuoYizshrKHsBLsdREetwHaJF?pid=Api
                                    [datePublished] => 2016-04-12T17:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.livemint.com/r/LiveMint/Period2/2016/04/12/Photos/w-science-graphic.jpg
                                    [hostPageUrl] => http://www.xaam.in/2016/04/how-bacteria-develop-antibiotic.html
                                    [contentSize] => 287762 B
                                    [width] => 932
                                    [height] => 1143
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.34cba8622cec86b287b012ec75111eb7?rik=RdkQc%2bL0RyOeog&riu=http%3a%2f%2fwww.livemint.com%2fr%2fLiveMint%2fPeriod2%2f2016%2f04%2f12%2fPhotos%2fw-science-graphic.jpg&ehk=He92bnhF810YH4IsGjhmMUE2e1pc8yjWpI%2fCUeeNtYw%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 74A07CDF1B92E8AB78D1A29E2347F4E27310D945
                                    [accentColor] => C78A04
                                )

                            [736B1DEEA554BD00628E6C20BD8B3A46E346A21E] => Array
                                (
                                    [name] => Honeywell HS-81 Fire and Gas Controller | Fire Detection & Smoke Detection
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.keUjafAp_RXAyvARGMhRogHaGr?pid=Api
                                    [datePublished] => 2020-10-10T06:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.honeywellbuildings.in/assets/images/fire/hs_infograph.png
                                    [hostPageUrl] => https://www.honeywellbuildings.in/fire/fire-detection-and-alarm-system/hs81
                                    [contentSize] => 335482 B
                                    [width] => 1327
                                    [height] => 1198
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.91e52369f029fd15c0caf01118c851a2?rik=N7bR7lpF2wAm6A&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => E12A643E64A3B8DB02C6E82600DB455AEED1B637
                                    [accentColor] => 088841
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Malware Virus Protection
                                    [displayText] => Malware Virus Protection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Virus+Protection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5832.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Virus+Protection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Virus+Protection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Virus Removal
                                    [displayText] => Virus Removal
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Virus+Removal&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5834.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Virus+Removal
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Virus+Removal&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Malware Scanner
                                    [displayText] => Malware Scanner
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Scanner&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5836.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Scanner
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Scanner&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Malware Detection Software
                                    [displayText] => Malware Detection Software
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Software&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5838.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Software
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Computer Anti-Virus
                                    [displayText] => Computer Anti-Virus
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Computer+Anti-Virus&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5840.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Computer+Anti-Virus
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Computer+Anti-Virus&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Malware Scan
                                    [displayText] => Malware Scan
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Scan&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5842.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Scan
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Scan&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Malware Removal Tool
                                    [displayText] => Malware Removal Tool
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Removal+Tool&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5844.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Removal+Tool
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Removal+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Malware Security
                                    [displayText] => Malware Security
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Security&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5846.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Security
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => Email Malware Detection
                                    [displayText] => Email Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Email+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5848.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Email+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Email+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => Malicious Malware
                                    [displayText] => Malicious Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malicious+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5850.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malicious+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malicious+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Malware Network
                                    [displayText] => Malware Network
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Network&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5852.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Network
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Malware Removal Kit
                                    [displayText] => Malware Removal Kit
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Removal+Kit&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5854.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Removal+Kit
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Removal+Kit&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Top Malware Removal Software
                                    [displayText] => Top Malware Removal Software
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Top+Malware+Removal+Software&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5856.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Top+Malware+Removal+Software
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Top+Malware+Removal+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Virus Removal Prices
                                    [displayText] => Virus Removal Prices
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Virus+Removal+Prices&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5858.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Virus+Removal+Prices
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Virus+Removal+Prices&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Windows Malware Detection
                                    [displayText] => Windows Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Windows+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5860.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Windows+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Windows+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Image-Based Malware Detection
                                    [displayText] => Image-Based Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Image-Based+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5862.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Image-Based+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Image-Based+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => Malware Detection Tools
                                    [displayText] => Malware Detection Tools
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Tools&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5864.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Tools
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Tools&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Malware Attack
                                    [displayText] => Malware Attack
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Attack&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5866.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Attack
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Attack&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Android Malware Detection
                                    [displayText] => Android Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Android+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5868.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Android+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => Malware Detection White Logo
                                    [displayText] => Malware Detection White Logo
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+White+Logo&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5870.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+White+Logo
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+White+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => Define Malware Detection
                                    [displayText] => Define Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Define+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5872.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Define+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Define+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => Malware Detection in Cyber Security
                                    [displayText] => Malware Detection in Cyber Security
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+in+Cyber+Security&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5874.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Cyber+Security
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+in+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => Malware Detection in Local Network
                                    [displayText] => Malware Detection in Local Network
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+in+Local+Network&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5876.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Local+Network
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+in+Local+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => Malware Detection and Prevention
                                    [displayText] => Malware Detection and Prevention
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+and+Prevention&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5878.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+and+Prevention
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+and+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => How to Check for Malware
                                    [displayText] => How to Check for Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+to+Check+for+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5880.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+to+Check+for+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=How+to+Check+for+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => Malware Ai Detection
                                    [displayText] => Malware Ai Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Ai+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5882.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Ai+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Ai+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => Malware Detection Report
                                    [displayText] => Malware Detection Report
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Report&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5884.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Report
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+Report&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Anti-Malware
                                    [displayText] => Anti-Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Anti-Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5886.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Anti-Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Anti-Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => Malware Detection Context Diagram
                                    [displayText] => Malware Detection Context Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Context+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5888.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Context+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+Context+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Malware Detection Methods
                                    [displayText] => Malware Detection Methods
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Methods&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5890.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Methods
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+Methods&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [30] => Array
                                (
                                    [text] => Sentinel Malware Detection
                                    [displayText] => Sentinel Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Sentinel+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5892.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Sentinel+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Sentinel+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [31] => Array
                                (
                                    [text] => Malware Detection and Classification
                                    [displayText] => Malware Detection and Classification
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+and+Classification&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5894.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+and+Classification
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+and+Classification&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [32] => Array
                                (
                                    [text] => Remove Malware and Spyware
                                    [displayText] => Remove Malware and Spyware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Remove+Malware+and+Spyware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5896.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Remove+Malware+and+Spyware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Remove+Malware+and+Spyware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [33] => Array
                                (
                                    [text] => Malware Detection Background
                                    [displayText] => Malware Detection Background
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Background&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5898.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Background
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Background&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [34] => Array
                                (
                                    [text] => Veeam Malware Detection
                                    [displayText] => Veeam Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Veeam+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5900.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Veeam+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Veeam+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [35] => Array
                                (
                                    [text] => Detect Malware
                                    [displayText] => Detect Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Detect+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5902.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Detect+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Detect+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [36] => Array
                                (
                                    [text] => Malware Alert Detection
                                    [displayText] => Malware Alert Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Alert+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5904.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Alert+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Alert+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [37] => Array
                                (
                                    [text] => Intelligient Malware Detection Application Methodology
                                    [displayText] => Intelligient Malware Detection Application Methodology
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Intelligient+Malware+Detection+Application+Methodology&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5906.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Intelligient+Malware+Detection+Application+Methodology
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Intelligient+Malware+Detection+Application+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [38] => Array
                                (
                                    [text] => Automated Malware Detection
                                    [displayText] => Automated Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Automated+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5908.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Automated+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Automated+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [39] => Array
                                (
                                    [text] => Types of Malware Detection
                                    [displayText] => Types of Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5910.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Types+of+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [40] => Array
                                (
                                    [text] => Malware Testing
                                    [displayText] => Malware Testing
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Testing&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5912.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Testing
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Testing&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [41] => Array
                                (
                                    [text] => Advanced Malware Detection
                                    [displayText] => Advanced Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Advanced+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5914.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Advanced+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Advanced+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [42] => Array
                                (
                                    [text] => Malware Detection PNG
                                    [displayText] => Malware Detection PNG
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+PNG&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5916.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+PNG
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Detection+PNG&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [43] => Array
                                (
                                    [text] => Malware Detection Cover Page
                                    [displayText] => Malware Detection Cover Page
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Cover+Page&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5918.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Cover+Page
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+Cover+Page&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [44] => Array
                                (
                                    [text] => PDF Malware Detection Back Diagram
                                    [displayText] => PDF Malware Detection Back Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PDF+Malware+Detection+Back+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5920.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PDF+Malware+Detection+Back+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PDF+Malware+Detection+Back+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [45] => Array
                                (
                                    [text] => Malware Behavior Detection
                                    [displayText] => Malware Behavior Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Behavior+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5922.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Behavior+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Behavior+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [46] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning
                                    [displayText] => Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5924.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [47] => Array
                                (
                                    [text] => Google Malware
                                    [displayText] => Google Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Google+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5926.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Google+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Google+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [48] => Array
                                (
                                    [text] => Flow Chart for Malware Detection
                                    [displayText] => Flow Chart for Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Flow+Chart+for+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5928.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Flow+Chart+for+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Flow+Chart+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [49] => Array
                                (
                                    [text] => Malware Attack Definition
                                    [displayText] => Malware Attack Definition
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Attack+Definition&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5930.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Attack+Definition
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Attack+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1773036071626
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 50
            [first_product_sample] => Array
                (
                    [name] => flowchart for virus and antivirus class 7 computers - Brainly.in
                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.zZrr1httjnNj0lSdF0gDnAHaG7?pid=Api
                    [datePublished] => 2023-06-04T22:50:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://hi-static.z-dn.net/files/dfc/4e2ff01cd6a15c17f111c3e9e09bff32.jpg
                    [hostPageUrl] => https://brainly.in/question/56432416
                    [contentSize] => 38999 B
                    [width] => 813
                    [height] => 761
                    [cDNContentUrl] => https://th.bing.com/th/id/R.cd9aebd61b6d8e7363d2549d1748039c?rik=P7mVfeyjLK9kbQ&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => C7128D22E83BD294205C6D64AF2CA3EC7D95B93F
                    [accentColor] => 506D7B
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

Search