These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

160 related articles for article (PubMed ID: 17416165)

  • 21. Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset.
    Moualla S; Khorzom K; Jafar A
    Comput Intell Neurosci; 2021; 2021():5557577. PubMed ID: 34220999
    [TBL] [Abstract][Full Text] [Related]  

  • 22. An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.
    Zheng D; Hong Z; Wang N; Chen P
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32204314
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms.
    Li Y; Xu W; Li W; Li A; Liu Z
    Math Biosci Eng; 2022 Jan; 19(2):2030-2042. PubMed ID: 35135240
    [TBL] [Abstract][Full Text] [Related]  

  • 24. An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks.
    Sarafijanović S; Le Boudec JY
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1076-87. PubMed ID: 16252818
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A hybrid network intrusion detection using darwinian particle swarm optimization and stacked autoencoder hoeffding tree.
    Seraphim BI; Poovammal E; Ramana K; Kryvinska N; Penchalaiah N
    Math Biosci Eng; 2021 Sep; 18(6):8024-8044. PubMed ID: 34814287
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Blind information-theoretic multiuser detection algorithms for DS-CDMA and WCDMA downlink systems.
    Waheed K; Salem FM
    IEEE Trans Neural Netw; 2005 Jul; 16(4):937-48. PubMed ID: 16121734
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Frequency-Based Representation of Massive Alerts and Combination of Indicators by Heterogeneous Intrusion Detection Systems for Anomaly Detection.
    Park H; Choi YJ
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746198
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Reinforcement learning for resource allocation in LEO satellite networks.
    Usaha W; Barria JA
    IEEE Trans Syst Man Cybern B Cybern; 2007 Jun; 37(3):515-27. PubMed ID: 17550108
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Intrusion Detection System Based on Pattern Recognition.
    Abdeldayem MM
    Arab J Sci Eng; 2022 Nov; ():1-9. PubMed ID: 36373125
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Takagi-Sugeno fuzzy-model-based fault detection for networked control systems with Markov delays.
    Zheng Y; Fang H; Wang HO
    IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):924-9. PubMed ID: 16903375
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Large scale nonlinear control system fine-tuning through learning.
    Kosmatopoulos EB; Kouvelas A
    IEEE Trans Neural Netw; 2009 Jun; 20(6):1009-23. PubMed ID: 19369154
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Advancements in intrusion detection: A lightweight hybrid RNN-RF model.
    Khan N; Mohmand MI; Rehman SU; Ullah Z; Khan Z; Boulila W
    PLoS One; 2024; 19(6):e0299666. PubMed ID: 38905163
    [TBL] [Abstract][Full Text] [Related]  

  • 33. An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs.
    Liu G; Zhao H; Fan F; Liu G; Xu Q; Nazir S
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214308
    [TBL] [Abstract][Full Text] [Related]  

  • 34. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.
    Sun X; Yan B; Zhang X; Rong C
    PLoS One; 2015; 10(10):e0139513. PubMed ID: 26447696
    [TBL] [Abstract][Full Text] [Related]  

  • 35.
    Imrana Y; Xiang Y; Ali L; Abdul-Rauf Z; Hu YC; Kadry S; Lim S
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271164
    [TBL] [Abstract][Full Text] [Related]  

  • 36. RSU-Based Online Intrusion Detection and Mitigation for VANET.
    Haydari A; Yilmaz Y
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236712
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Adaptation and change detection with a sequential Monte Carlo scheme.
    Matsumoto T; Yosui K
    IEEE Trans Syst Man Cybern B Cybern; 2007 Jun; 37(3):592-606. PubMed ID: 17550114
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Distributed visual-target-surveillance system in wireless sensor networks.
    Wang X; Wang S; Bi D
    IEEE Trans Syst Man Cybern B Cybern; 2009 Oct; 39(5):1134-46. PubMed ID: 19336319
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A knowledge-based framework for image enhancement in aviation security.
    Singh M; Singh S; Partridge D
    IEEE Trans Syst Man Cybern B Cybern; 2004 Dec; 34(6):2354-65. PubMed ID: 15619935
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Synchronization of continuous dynamical networks with discrete-time communications.
    Wang YW; Xiao JW; Wen C; Guan ZH
    IEEE Trans Neural Netw; 2011 Dec; 22(12):1979-86. PubMed ID: 22042155
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.