These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 31442278)

  • 1. Open source software security vulnerability detection based on dynamic behavior features.
    Li Y; Ma L; Shen L; Lv J; Zhang P
    PLoS One; 2019; 14(8):e0221530. PubMed ID: 31442278
    [TBL] [Abstract][Full Text] [Related]  

  • 2. SFN: A Novel Scalable Feature Network for Vulnerability Representation of Open-Source Codes.
    Guo J; Wang Z; Zhang L; Xue Y; Long K; Jing X; Cheng J; Li G
    Comput Intell Neurosci; 2022; 2022():2998448. PubMed ID: 35990141
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Vulnerability extraction and prediction method based on improved information gain algorithm.
    Yang P; Wang X
    PLoS One; 2024; 19(9):e0309809. PubMed ID: 39255289
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features.
    Zhang Y; Hu Y; Chen X
    Sensors (Basel); 2024 Feb; 24(5):. PubMed ID: 38474887
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
    Kumar R; Subbiah G
    Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
    Hoque MS; Jamil N; Amin N; Lam KY
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34202977
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience.
    Basheer N; Islam S; Alwaheidi MKS; Papastergiou S
    Sensors (Basel); 2024 Jul; 24(15):. PubMed ID: 39123906
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A new method of software vulnerability detection based on a quantum neural network.
    Zhou X; Pang J; Yue F; Liu F; Guo J; Liu W; Song Z; Shu G; Xia B; Shan Z
    Sci Rep; 2022 May; 12(1):8053. PubMed ID: 35577855
    [TBL] [Abstract][Full Text] [Related]  

  • 9. iDetect for vulnerability detection in internet of things operating systems using machine learning.
    Al-Boghdady A; El-Ramly M; Wassif K
    Sci Rep; 2022 Oct; 12(1):17086. PubMed ID: 36224208
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
    Shi L; Li K
    Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors.
    Liu L; Li Z; Wen Y; Chen P
    PeerJ Comput Sci; 2022; 8():e975. PubMed ID: 35634116
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.
    Deng X; Zhang L; Wang Y; Jiang F
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214301
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security vulnerabilities in healthcare: an analysis of medical devices and software.
    Mejía-Granda CM; Fernández-Alemán JL; Carrillo-de-Gea JM; García-Berná JA
    Med Biol Eng Comput; 2024 Jan; 62(1):257-273. PubMed ID: 37789249
    [TBL] [Abstract][Full Text] [Related]  

  • 14. SPCBIG-EC: A Robust Serial Hybrid Model for Smart Contract Vulnerability Detection.
    Zhang L; Li Y; Jin T; Wang W; Jin Z; Zhao C; Cai Z; Chen H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746403
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Enhancing the security of patients' portals and websites by detecting malicious web crawlers using machine learning techniques.
    Hosseini N; Fakhar F; Kiani B; Eslami S
    Int J Med Inform; 2019 Dec; 132():103976. PubMed ID: 31606554
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.
    Hussain S; Nadeem M; Baber J; Hamdi M; Rajab A; Al Reshan MS; Shaikh A
    Sci Rep; 2024 Mar; 14(1):7406. PubMed ID: 38548726
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning.
    Zhang L; Wang J; Wang W; Jin Z; Zhao C; Cai Z; Chen H
    Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591270
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Efficient Feature Selection for Static Analysis Vulnerability Prediction.
    Filus K; Boryszko P; Domańska J; Siavvas M; Gelenbe E
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33561957
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Smart Contract Vulnerability Detection Model Based on Multi-Task Learning.
    Huang J; Zhou K; Xiong A; Li D
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270976
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Vulnerable JavaScript functions detection using stacking of convolutional neural networks.
    Sheneamer A
    PeerJ Comput Sci; 2024; 10():e1838. PubMed ID: 38435587
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.