These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 23983644)

  • 1. The effects of different representations on static structure analysis of computer malware signatures.
    Narayanan A; Chen Y; Pang S; Tao B
    ScientificWorldJournal; 2013; 2013():671096. PubMed ID: 23983644
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A static analysis approach for Android permission-based malware detection systems.
    Mohamad Arif J; Ab Razak MF; Awang S; Tuan Mat SR; Ismail NSN; Firdaus A
    PLoS One; 2021; 16(9):e0257968. PubMed ID: 34591930
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Evaluation of Machine Learning Algorithms for Malware Detection.
    Akhtar MS; Feng T
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679741
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A detection method for android application security based on TF-IDF and machine learning.
    Yuan H; Tang Y; Sun W; Liu L
    PLoS One; 2020; 15(9):e0238694. PubMed ID: 32915836
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.
    Naeem MR; Amin R; Alshamrani SS; Alshehri A
    Comput Intell Neurosci; 2022; 2022():6294058. PubMed ID: 35498213
    [TBL] [Abstract][Full Text] [Related]  

  • 7. FILM: Filtering and Machine Learning for Malware Detection in Edge Computing.
    Kim YJ; Park CH; Yoon M
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336322
    [TBL] [Abstract][Full Text] [Related]  

  • 8. TagSeq: Malicious behavior discovery using dynamic analysis.
    Huang YT; Sun YS; Chen MC
    PLoS One; 2022; 17(5):e0263644. PubMed ID: 35576222
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Deep learning based Sequential model for malware analysis using Windows exe API Calls.
    Catak FO; Yazı AF; Elezaj O; Ahmed J
    PeerJ Comput Sci; 2020; 6():e285. PubMed ID: 33816936
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Spatial-temporal modeling of malware propagation in networks.
    Chen Z; Ji C
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1291-303. PubMed ID: 16252834
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Intelligent malware detection based on graph convolutional network.
    Li S; Zhou Q; Zhou R; Lv Q
    J Supercomput; 2022; 78(3):4182-4198. PubMed ID: 34456504
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.
    Holt TJ; Burruss GW; Bossler AM
    Int J Offender Ther Comp Criminol; 2018 May; 62(6):1720-1741. PubMed ID: 27913717
    [TBL] [Abstract][Full Text] [Related]  

  • 13. OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
    Niu W; Cao R; Zhang X; Ding K; Zhang K; Li T
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610606
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Malware analysis using visualized image matrices.
    Han K; Kang B; Im EG
    ScientificWorldJournal; 2014; 2014():132713. PubMed ID: 25133202
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
    Kumar R; Subbiah G
    Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review.
    Ehsan A; Catal C; Mishra A
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298282
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Kullback-Liebler divergence-based representation algorithm for malware detection.
    Aboaoja FA; Zainal A; Ghaleb FA; Alghamdi NS; Saeed F; Alhuwayji H
    PeerJ Comput Sci; 2023; 9():e1492. PubMed ID: 37810364
    [TBL] [Abstract][Full Text] [Related]  

  • 18. On the evaluation of android malware detectors against code-obfuscation techniques.
    Nawaz U; Aleem M; Lin JC
    PeerJ Comput Sci; 2022; 8():e1002. PubMed ID: 35875645
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Method for detecting core malware sites related to biomedical information systems.
    Kim D; Choi D; Jin J
    Comput Math Methods Med; 2015; 2015():756842. PubMed ID: 25821511
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Malware detection based on semi-supervised learning with malware visualization.
    Gao T; Zhao L; Li X; Chen W
    Math Biosci Eng; 2021 Jul; 18(5):5995-6011. PubMed ID: 34517520
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.