These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

126 related articles for article (PubMed ID: 32024201)

  • 1. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
    Chen L; Wang Z; Li F; Guo Y; Geng K
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32024201
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework.
    Xiao K; Zhu C; Xie J; Zhou Y; Zhu X; Zhang W
    Entropy (Basel); 2020 Aug; 22(8):. PubMed ID: 33286663
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing.
    Yousif A; Alqhtani SM; Bashir MB; Ali A; Hamza R; Hassan A; Tawfeeg TM
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161596
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.
    RodrĂ­guez E; Valls P; Otero B; Costa JJ; VerdĂș J; Pajuelo MA; Canal R
    Sensors (Basel); 2022 Jul; 22(15):. PubMed ID: 35957178
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.
    Veeraiah D; Mohanty R; Kundu S; Dhabliya D; Tiwari M; Jamal SS; Halifa A
    Comput Intell Neurosci; 2022; 2022():4003403. PubMed ID: 36105640
    [TBL] [Abstract][Full Text] [Related]  

  • 9. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.
    Mahalingam A; Perumal G; Subburayalu G; Albathan M; Altameem A; Almakki RS; Hussain A; Abbas Q
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836874
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Resource Allocation in Wireless Powered IoT System: A Mean Field Stackelberg Game-Based Approach.
    Su J; Xu H; Xin N; Cao G; Zhou X
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30241311
    [TBL] [Abstract][Full Text] [Related]  

  • 12. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.
    Alkadi S; Al-Ahmadi S; Ben Ismail MM
    Sensors (Basel); 2024 Apr; 24(8):. PubMed ID: 38676241
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Dec; 23(1):. PubMed ID: 36616920
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.
    Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA
    Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Optimal Placement of Social Digital Twins in Edge IoT Networks.
    Chukhno O; Chukhno N; Araniti G; Campolo C; Iera A; Molinaro A
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33143038
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 19. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.
    Li S; Wang J; Wang Y; Zhou G; Zhao Y
    Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain.
    Samadi M; Ruj S; Schriemer H; Erol-Kantarci M
    Sensors (Basel); 2023 Oct; 23(20):. PubMed ID: 37896447
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.