These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

99 related articles for article (PubMed ID: 25685511)

  • 1. Unsupervised, low latency anomaly detection of algorithmically generated domain names by generative probabilistic modeling.
    Raghuram J; Miller DJ; Kesidis G
    J Adv Res; 2014 Jul; 5(4):423-33. PubMed ID: 25685511
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Detection of Algorithmically Generated Domain Names Using the Recurrent Convolutional Neural Network with Spatial Pyramid Pooling.
    Liu Z; Zhang Y; Chen Y; Fan X; Dong C
    Entropy (Basel); 2020 Sep; 22(9):. PubMed ID: 33286827
    [TBL] [Abstract][Full Text] [Related]  

  • 3. UMUDGA: A dataset for profiling algorithmically generated domain names in botnet detection.
    Zago M; Gil Pérez M; Martínez Pérez G
    Data Brief; 2020 Jun; 30():105400. PubMed ID: 32215308
    [TBL] [Abstract][Full Text] [Related]  

  • 4. DNS dataset for malicious domains detection.
    Marques C; Malta S; Magalhães JP
    Data Brief; 2021 Oct; 38():107342. PubMed ID: 34541265
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Learning Orthographic Structure With Sequential Generative Neural Networks.
    Testolin A; Stoianov I; Sperduti A; Zorzi M
    Cogn Sci; 2016 Apr; 40(3):579-606. PubMed ID: 26073971
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Accurate mobile malware detection and classification in the cloud.
    Wang X; Yang Y; Zeng Y
    Springerplus; 2015; 4():583. PubMed ID: 26543718
    [TBL] [Abstract][Full Text] [Related]  

  • 7. AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
    Yan G; Li Q; Guo D; Li B
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31330986
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Fast Flux Watch: A mechanism for online detection of fast flux networks.
    Al-Duwairi BN; Al-Hammouri AT
    J Adv Res; 2014 Jul; 5(4):473-9. PubMed ID: 25685515
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Generation of a large gene/protein lexicon by morphological pattern analysis.
    Tanabe L; Wilbur WJ
    J Bioinform Comput Biol; 2004 Jan; 1(4):611-26. PubMed ID: 15290756
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Protein names and how to find them.
    Franzén K; Eriksson G; Olsson F; Asker L; Lidén P; Cöster J
    Int J Med Inform; 2002 Dec; 67(1-3):49-61. PubMed ID: 12460631
    [TBL] [Abstract][Full Text] [Related]  

  • 11. [Old English plant names from the linguistic and lexicographic viewpoint].
    Sauer H; Krischke U
    Sudhoffs Arch; 2004; 88(2):175-209. PubMed ID: 15730144
    [TBL] [Abstract][Full Text] [Related]  

  • 12. COVID-19 malicious domain names classification.
    Mvula PK; Branco P; Jourdan GV; Viktor HL
    Expert Syst Appl; 2022 Oct; 204():117553. PubMed ID: 35611122
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks.
    Alauthaman M; Aslam N; Zhang L; Alasem R; Hossain MA
    Neural Comput Appl; 2018; 29(11):991-1004. PubMed ID: 29769759
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Does word length affect speech onset latencies when producing single words?
    Damian MF; Bowers JS; Stadthagen-Gonzalez H; Spalek K
    J Exp Psychol Learn Mem Cogn; 2010 Jul; 36(4):892-905. PubMed ID: 20565208
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Attention-Based Automated Feature Extraction for Malware Analysis.
    Choi S; Bae J; Lee C; Kim Y; Kim J
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32443750
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Anomaly Detection for Individual Sequences with Applications in Identifying Malicious Tools.
    Siboni S; Cohen A
    Entropy (Basel); 2020 Jun; 22(6):. PubMed ID: 33286421
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A probabilistic model for identifying protein names and their name boundaries.
    Seki K; Mostafa J
    Proc IEEE Comput Soc Bioinform Conf; 2003; 2():251-8. PubMed ID: 16452800
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Electrophysiological correlates of brand names.
    Cheung MC; Chan AS; Sze SL
    Neurosci Lett; 2010 Nov; 485(3):178-82. PubMed ID: 20833227
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Metacognitive awareness of the associative deficit for words and names.
    Berry JM; Williams HL; Usubalieva A; Kilb A
    Neuropsychol Dev Cogn B Aging Neuropsychol Cogn; 2013; 20(5):592-619. PubMed ID: 23367874
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 5.