BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

309 related articles for article (PubMed ID: 23829034)

  • 1. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Maintaining defender's reputation in anomaly detection against insider attacks.
    Zhang N; Yu W; Fu X; Das SK
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):597-611. PubMed ID: 19933017
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 7. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Adversarial risk analysis for counterterrorism modeling.
    Rios J; Rios Insua D
    Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Learning About the Effects of Alert Uncertainty in Attack and Defend Decisions via Cognitive Modeling.
    Aggarwal P; Moisan F; Gonzalez C; Dutt V
    Hum Factors; 2022 Mar; 64(2):343-358. PubMed ID: 32954818
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 11. LAFIT: Efficient and Reliable Evaluation of Adversarial Defenses With Latent Features.
    Yu Y; Gao X; Xu CZ
    IEEE Trans Pattern Anal Mach Intell; 2024 Jan; 46(1):354-369. PubMed ID: 37831567
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adversarial risk analysis with incomplete information: a level-k approach.
    Rothschild C; McLay L; Guikema S
    Risk Anal; 2012 Jul; 32(7):1219-31. PubMed ID: 22035126
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 15. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
    Payyappalli VM; Zhuang J; Jose VRR
    Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.
    Maqbool Z; Aggarwal P; Pammi VSC; Dutt V
    Front Psychol; 2020; 11():11. PubMed ID: 32063872
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation.
    Nikoloudakis Y; Kefaloukos I; Klados S; Panagiotakis S; Pallis E; Skianis C; Markakis EK
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300676
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Business continuity strategies for cyber defence: battling time and information overload.
    Streufert J
    J Bus Contin Emer Plan; 2010 Nov; 4(4):303-16. PubMed ID: 21177217
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.