These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

198 related articles for article (PubMed ID: 29713296)

  • 1. Statistical Models for Predicting Threat Detection From Human Behavior.
    Kelley T; Amon MJ; Bertenthal BI
    Front Psychol; 2018; 9():466. PubMed ID: 29713296
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Detecting phishing websites using machine learning technique.
    Dutta AK
    PLoS One; 2021; 16(10):e0258361. PubMed ID: 34634081
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior.
    Weems CF; Ahmed I; Richard GG; Russell JD; Neill EL
    PLoS One; 2018; 13(12):e0207408. PubMed ID: 30540758
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Deep Learning-Based Innovative Technique for Phishing Detection in Modern Security with Uniform Resource Locators.
    Aldakheel EA; Zakariah M; Gashgari GA; Almarshad FA; Alzahrani AIA
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177607
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Improving the phishing website detection using empirical analysis of Function Tree and its variants.
    Balogun AO; Adewole KS; Raheem MO; Akande ON; Usman-Hamza FE; Mabayoje MA; Akintola AG; Asaju-Gbolagade AW; Jimoh MK; Jimoh RG; Adeyemo VE
    Heliyon; 2021 Jul; 7(7):e07437. PubMed ID: 34278030
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Quantifying Phishing Susceptibility for Detection and Behavior Decisions.
    Canfield CI; Fischhoff B; Davis A
    Hum Factors; 2016 Dec; 58(8):1158-1172. PubMed ID: 27562565
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Hybrid Approach for Alluring Ads Phishing Attack Detection Using Machine Learning.
    Shaukat MW; Amin R; Muslam MMA; Alshehri AH; Xie J
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836902
    [TBL] [Abstract][Full Text] [Related]  

  • 11. User Information Sharing and Hospital Website Privacy Policies.
    McCoy MS; Wu A; Burdyl S; Kim Y; Smith NK; Gonzales R; Friedman AB
    JAMA Netw Open; 2024 Apr; 7(4):e245861. PubMed ID: 38602678
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An effective detection approach for phishing websites using URL and HTML features.
    Aljofey A; Jiang Q; Rasool A; Chen H; Liu W; Qu Q; Wang Y
    Sci Rep; 2022 May; 12(1):8842. PubMed ID: 35614133
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks.
    Martin J; Dubé C; Coovert MD
    Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Effectiveness of and user preferences for security awareness training methodologies.
    Tschakert KF; Ngamsuriyaroj S
    Heliyon; 2019 Jun; 5(6):e02010. PubMed ID: 31338464
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Examining E-Loyalty in a Sexual Health Website: Cross-Sectional Study.
    Nunn A; Crutzen R; Haag D; Chabot C; Carson A; Ogilvie G; Shoveller J; Gilbert M
    JMIR Public Health Surveill; 2017 Nov; 3(4):e75. PubMed ID: 29097352
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The effectiveness of internet-based e-learning on clinician behavior and patient outcomes: a systematic review protocol.
    Sinclair P; Kable A; Levett-Jones T
    JBI Database System Rev Implement Rep; 2015 Jan; 13(1):52-64. PubMed ID: 26447007
    [TBL] [Abstract][Full Text] [Related]  

  • 17. User information seeking behaviour: perceptions and reality. An evaluation of the WHO Labresources Internet portal.
    Madle G; Berger A; Cognat S; Menna S; Kostkova P
    Inform Health Soc Care; 2009 Jan; 34(1):30-8. PubMed ID: 19306197
    [TBL] [Abstract][Full Text] [Related]  

  • 18. An intelligent cyber security phishing detection system using deep learning techniques.
    Mughaid A; AlZu'bi S; Hnaif A; Taamneh S; Alnajjar A; Elsoud EA
    Cluster Comput; 2022; 25(6):3819-3828. PubMed ID: 35602317
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Comparative evaluation of machine learning algorithms for phishing site detection.
    Almujahid NF; Haq MA; Alshehri M
    PeerJ Comput Sci; 2024; 10():e2131. PubMed ID: 38983211
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
    Xiong A; Proctor RW; Yang W; Li N
    Hum Factors; 2017 Jun; 59(4):640-660. PubMed ID: 28060529
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.