These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 27913717)

  • 1. Assessing the Macro-Level Correlates of Malware Infections Using a Routine Activities Framework.
    Holt TJ; Burruss GW; Bossler AM
    Int J Offender Ther Comp Criminol; 2018 May; 62(6):1720-1741. PubMed ID: 27913717
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Spatial-temporal modeling of malware propagation in networks.
    Chen Z; Ji C
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1291-303. PubMed ID: 16252834
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Method for detecting core malware sites related to biomedical information systems.
    Kim D; Choi D; Jin J
    Comput Math Methods Med; 2015; 2015():756842. PubMed ID: 25821511
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Evaluation of Machine Learning Algorithms for Malware Detection.
    Akhtar MS; Feng T
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679741
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A static analysis approach for Android permission-based malware detection systems.
    Mohamad Arif J; Ab Razak MF; Awang S; Tuan Mat SR; Ismail NSN; Firdaus A
    PLoS One; 2021; 16(9):e0257968. PubMed ID: 34591930
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol.
    Zheng R; Liu J; Liu L; Liao S; Li K; Wei J; Li L; Tian Z
    PLoS One; 2020; 15(5):e0232696. PubMed ID: 32374775
    [TBL] [Abstract][Full Text] [Related]  

  • 7. The effects of different representations on static structure analysis of computer malware signatures.
    Narayanan A; Chen Y; Pang S; Tao B
    ScientificWorldJournal; 2013; 2013():671096. PubMed ID: 23983644
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Co-similar malware infection patterns as a predictor of future risk.
    Yavneh A; Lothan R; Yamin D
    PLoS One; 2021; 16(3):e0249273. PubMed ID: 33780507
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.
    Naeem MR; Amin R; Alshamrani SS; Alshehri A
    Comput Intell Neurosci; 2022; 2022():6294058. PubMed ID: 35498213
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Web malware spread modelling and optimal control strategies.
    Liu W; Zhong S
    Sci Rep; 2017 Feb; 7():42308. PubMed ID: 28186203
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review.
    Ehsan A; Catal C; Mishra A
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298282
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Deep learning based Sequential model for malware analysis using Windows exe API Calls.
    Catak FO; Yazı AF; Elezaj O; Ahmed J
    PeerJ Comput Sci; 2020; 6():e285. PubMed ID: 33816936
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Medical systems and malware.
    Kusche KP
    J Healthc Prot Manage; 2004; 20(1):74-83. PubMed ID: 15061102
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Malware analysis using visualized image matrices.
    Han K; Kang B; Im EG
    ScientificWorldJournal; 2014; 2014():132713. PubMed ID: 25133202
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A detection method for android application security based on TF-IDF and machine learning.
    Yuan H; Tang Y; Sun W; Liu L
    PLoS One; 2020; 15(9):e0238694. PubMed ID: 32915836
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
    Kumar R; Subbiah G
    Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Statistical modeling of computer malware propagation dynamics in cyberspace.
    Fang Z; Zhao P; Xu M; Xu S; Hu T; Fang X
    J Appl Stat; 2022; 49(4):858-883. PubMed ID: 35707816
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Data augmentation based malware detection using convolutional neural networks.
    Catak FO; Ahmed J; Sahinbas K; Khand ZH
    PeerJ Comput Sci; 2021; 7():e346. PubMed ID: 33816996
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.