These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 31442278)

  • 21. Evolutionary neural networks for anomaly detection based on the behavior of a program.
    Han SJ; Cho SB
    IEEE Trans Syst Man Cybern B Cybern; 2006 Jun; 36(3):559-70. PubMed ID: 16761810
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP.
    Althar RR; Samanta D; Kaur M; Alnuaim AA; Aljaffan N; Aman Ullah M
    Comput Intell Neurosci; 2021; 2021():8522839. PubMed ID: 34987569
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Vulnerability-oriented directed fuzzing for binary programs.
    Yu L; Lu Y; Shen Y; Li Y; Pan Z
    Sci Rep; 2022 Mar; 12(1):4271. PubMed ID: 35277537
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Research on epileptic EEG recognition based on improved residual networks of 1-D CNN and indRNN.
    Ma M; Cheng Y; Wei X; Chen Z; Zhou Y
    BMC Med Inform Decis Mak; 2021 Jul; 21(Suppl 2):100. PubMed ID: 34330248
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Online detection of class-imbalanced error-related potentials evoked by motor imagery.
    Liu Q; Zheng W; Chen K; Ma L; Ai Q
    J Neural Eng; 2021 Apr; 18(4):. PubMed ID: 33823492
    [No Abstract]   [Full Text] [Related]  

  • 26. On the Vulnerability of CNN Classifiers in EEG-Based BCIs.
    Zhang X; Wu D
    IEEE Trans Neural Syst Rehabil Eng; 2019 May; 27(5):814-825. PubMed ID: 30951472
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things.
    Zhang W; Feng Y; Han G; Zhu H; Tan X
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433343
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction.
    Kalouptsoglou I; Siavvas M; Kehagias D; Chatzigeorgiou A; Ampatzoglou A
    Entropy (Basel); 2022 May; 24(5):. PubMed ID: 35626536
    [TBL] [Abstract][Full Text] [Related]  

  • 29. HN-PPISP: a hybrid network based on MLP-Mixer for protein-protein interaction site prediction.
    Kang Y; Xu Y; Wang X; Pu B; Yang X; Rao Y; Chen J
    Brief Bioinform; 2023 Jan; 24(1):. PubMed ID: 36403092
    [TBL] [Abstract][Full Text] [Related]  

  • 30. CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model.
    Zhang L; Chen W; Wang W; Jin Z; Zhao C; Cai Z; Chen H
    Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591263
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.
    Doroodgar F; Abdur Razzaque M; Isnin IF
    Sensors (Basel); 2014 Mar; 14(3):5004-40. PubMed ID: 24618781
    [TBL] [Abstract][Full Text] [Related]  

  • 32. AVQS: attack route-based vulnerability quantification scheme for smart grid.
    Ko J; Lim H; Lee S; Shon T
    ScientificWorldJournal; 2014; 2014():713012. PubMed ID: 25152923
    [TBL] [Abstract][Full Text] [Related]  

  • 33. A coverage and slicing dependencies analysis for seeking software security defects.
    He H; Zhang D; Liu M; Zhang W; Gao D
    ScientificWorldJournal; 2014; 2014():463912. PubMed ID: 24982957
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Web vulnerability study of online pharmacy sites.
    Kuzma J
    Inform Health Soc Care; 2011 Jan; 36(1):20-34. PubMed ID: 21208091
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Smart Contract Vulnerability Detection Based on Deep Learning and Multimodal Decision Fusion.
    Deng W; Wei H; Huang T; Cao C; Peng Y; Hu X
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631785
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 37. The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures.
    Allodi L; Massacci F; Williams J
    Risk Anal; 2022 Aug; 42(8):1623-1642. PubMed ID: 33960506
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Study of Personal Recognition Method Based on EMG Signal.
    Lu L; Mao J; Wang W; Ding G; Zhang Z
    IEEE Trans Biomed Circuits Syst; 2020 Aug; 14(4):681-691. PubMed ID: 32746348
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method.
    Kholidy HA
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009551
    [TBL] [Abstract][Full Text] [Related]  

  • 40. IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks.
    Wang J; Liu Y; Feng H
    Math Biosci Eng; 2022 Jan; 19(2):1280-1303. PubMed ID: 35135204
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.