These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 31185579)

  • 1. Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART.
    Na G; Lim J; Lee S; Yi JH
    Sensors (Basel); 2019 Jun; 19(11):. PubMed ID: 31185579
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hybrid polylingual object model: an efficient and seamless integration of Java and native components on the Dalvik virtual machine.
    Huang Y; Chen R; Wei J; Pei X; Cao J; Prakash Jayaraman P; Ranjan R
    ScientificWorldJournal; 2014; 2014():785434. PubMed ID: 25110745
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
    Ullah F; Srivastava G; Ullah S
    J Cloud Comput (Heidelb); 2022; 11(1):75. PubMed ID: 36345308
    [TBL] [Abstract][Full Text] [Related]  

  • 4. On the evaluation of android malware detectors against code-obfuscation techniques.
    Nawaz U; Aleem M; Lin JC
    PeerJ Comput Sci; 2022; 8():e1002. PubMed ID: 35875645
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The rise of obfuscated Android malware and impacts on detection methods.
    Elsersy WF; Feizollah A; Anuar NB
    PeerJ Comput Sci; 2022; 8():e907. PubMed ID: 35494876
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
    Georgiev M; Jana S; Shmatikov V
    NDDS Symp; 2014 Feb; 2014():1-15. PubMed ID: 25485311
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
    Su X; Gong Q; Zheng Y; Liu X; Li KC
    Comput Math Methods Med; 2020; 2020():3658795. PubMed ID: 32300372
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Implementing a high-efficiency similarity analysis approach for firmware code.
    Wang Y; Wang R; Jing J; Wang H
    PLoS One; 2021; 16(1):e0245098. PubMed ID: 33434199
    [TBL] [Abstract][Full Text] [Related]  

  • 9. CAreDroid: Adaptation Framework for Android Context-Aware Applications.
    Elmalaki S; Wanner L; Srivastava M
    Proc Annu Int Conf Mob Comput Netw; 2015 Sep; 2015():386-399. PubMed ID: 26834512
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Reverse engineering approach for improving the quality of mobile applications.
    Elsayed EK; ElDahshan KA; El-Sharawy EE; Ghannam NE
    PeerJ Comput Sci; 2019; 5():e212. PubMed ID: 33816865
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments.
    Lee DH; Lee IY
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30347658
    [TBL] [Abstract][Full Text] [Related]  

  • 12. UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0.
    Choi S; Chang T; Park Y
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339557
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Malware homology determination using visualized images and feature fusion.
    Zhu X; Huang J; Wang B; Qi C
    PeerJ Comput Sci; 2021; 7():e494. PubMed ID: 33977134
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review.
    Talal M; Zaidan AA; Zaidan BB; Albahri AS; Alamoodi AH; Albahri OS; Alsalem MA; Lim CK; Tan KL; Shir WL; Mohammed KI
    J Med Syst; 2019 Jan; 43(3):42. PubMed ID: 30648217
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cross-Device Computation Coordination for Mobile Collocated Interactions with Wearables.
    Yoon H; Shin C
    Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30781408
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Enabling Virtual AAA Management in SDN-Based IoT Networks
    Zarca AM; Garcia-Carrillo D; Bernabe JB; Ortiz J; Marin-Perez R; Skarmeta A
    Sensors (Basel); 2019 Jan; 19(2):. PubMed ID: 30642089
    [TBL] [Abstract][Full Text] [Related]  

  • 17. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.
    Solano A; Dormido R; Duro N; González V
    Sensors (Basel); 2016 Oct; 16(10):. PubMed ID: 27754378
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust.
    Mora-Gimeno FJ; Mora-Mora H; Marcos-Jorquera D; Volckaert B
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30249043
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
    Park N; Kang N
    Sensors (Basel); 2015 Dec; 16(1):. PubMed ID: 26712759
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Android Inline Hooking Framework for the Securing Transmitted Data.
    Tan YA; Feng S; Cheng X; Li Y; Zheng J
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32731597
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.