These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

164 related articles for article (PubMed ID: 17416165)

  • 1. An automatically tuning intrusion detection system.
    Yu Z; Tsai JJ; Weigert T
    IEEE Trans Syst Man Cybern B Cybern; 2007 Apr; 37(2):373-84. PubMed ID: 17416165
    [TBL] [Abstract][Full Text] [Related]  

  • 2. AdaBoost-based algorithm for network intrusion detection.
    Hu W; Hu W; Maybank S
    IEEE Trans Syst Man Cybern B Cybern; 2008 Apr; 38(2):577-83. PubMed ID: 18348941
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Min-max hyperellipsoidal clustering for anomaly detection in network security.
    Sarasamma ST; Zhu QA
    IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):887-901. PubMed ID: 16903372
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Intrusion detection using rough set classification.
    Zhang LH; Zhang GH; Zhang J; Bai YC
    J Zhejiang Univ Sci; 2004 Sep; 5(9):1076-86. PubMed ID: 15323002
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Evolutionary neural networks for anomaly detection based on the behavior of a program.
    Han SJ; Cho SB
    IEEE Trans Syst Man Cybern B Cybern; 2006 Jun; 36(3):559-70. PubMed ID: 16761810
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Intelligent agent-based intrusion detection system using enhanced multiclass SVM.
    Ganapathy S; Yogesh P; Kannan A
    Comput Intell Neurosci; 2012; 2012():850259. PubMed ID: 23056036
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Dynamic sample size detection in learning command line sequence for continuous authentication.
    Traore I; Woungang I; Nakkabi Y; Obaidat MS; Ahmed AA; Khalilian B
    IEEE Trans Syst Man Cybern B Cybern; 2012 Oct; 42(5):1343-56. PubMed ID: 22514203
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hierarchical Kohonenen net for anomaly detection in network security.
    Sarasamma ST; Zhu QA; Huff J
    IEEE Trans Syst Man Cybern B Cybern; 2005 Apr; 35(2):302-12. PubMed ID: 15828658
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features.
    Amudha P; Karthik S; Sivakumari S
    ScientificWorldJournal; 2015; 2015():574589. PubMed ID: 26221625
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An integrated pattern recognition approach for intrusion detection.
    Pandit A; Stanley RJ; McMillin B
    Biomed Sci Instrum; 2002; 38():447-52. PubMed ID: 12085648
    [TBL] [Abstract][Full Text] [Related]  

  • 11. GAN model using field fuzz mutation for in-vehicle CAN bus intrusion detection.
    Li Z; Jiang W; Liu X; Tan K; Jin X; Yang M
    Math Biosci Eng; 2022 May; 19(7):6996-7018. PubMed ID: 35730293
    [TBL] [Abstract][Full Text] [Related]  

  • 12. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.
    N Ahmed M; Abdullah AH; Kaiwartya O
    PLoS One; 2016; 11(6):e0156885. PubMed ID: 27285146
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection.
    Binbusayyis A; Vaiyapuri T
    Heliyon; 2020 Jul; 6(7):e04262. PubMed ID: 32685709
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Novel Anomaly-Based Intrusion Detection Model Using PSOGWO-Optimized BP Neural Network and GA-Based Feature Selection.
    Sheikhi S; Kostakos P
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36502022
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method.
    Le TT; Kim H; Kang H; Kim H
    Sensors (Basel); 2022 Feb; 22(3):. PubMed ID: 35161899
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.
    Akshay Kumaar M; Samiayya D; Vincent PMDR; Srinivasan K; Chang CY; Ganesh H
    Front Public Health; 2021; 9():824898. PubMed ID: 35096763
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Sine-Cosine-Adopted African Vultures Optimization with Ensemble Autoencoder-Based Intrusion Detection for Cybersecurity in CPS Environment.
    Almuqren L; Al-Mutiri F; Maashi M; Mohsen H; Hilal AM; Alsaid MI; Drar S; Abdelbagi S
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430718
    [TBL] [Abstract][Full Text] [Related]  

  • 18. On the verification of intransitive noninterference in mulitlevel security.
    Ben Hadj-Alouane N; Lafrance S; Lin F; Mullins J; Yeddes MM
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):948-58. PubMed ID: 16240770
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment.
    Mansour RF
    Sci Rep; 2022 Jul; 12(1):12937. PubMed ID: 35902617
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Spatial-temporal modeling of malware propagation in networks.
    Chen Z; Ji C
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1291-303. PubMed ID: 16252834
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.