These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 32024201)

  • 41. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 42. Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things.
    Yan J; Xiao K; Zhu C; Wu J; Yang G; Zhang W
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33096671
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment.
    Pundir S; Wazid M; Singh DP; Das AK; Rodrigues JJPC; Park Y
    Sensors (Basel); 2020 Feb; 20(5):. PubMed ID: 32121017
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 45. The proposed hybrid deep learning intrusion prediction IoT (HDLIP-IoT) framework.
    Fadel MM; El-Ghamrawy SM; Ali-Eldin AMT; Hassan MK; El-Desoky AI
    PLoS One; 2022; 17(7):e0271436. PubMed ID: 35905101
    [TBL] [Abstract][Full Text] [Related]  

  • 46. A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering.
    Ullah S; Ahmad J; Khan MA; Alkhammash EH; Hadjouni M; Ghadi YY; Saeed F; Pitropakis N
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632016
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks.
    Ji J; Wu G; Shuai J; Zhang Z; Wang Z; Ren Y
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31505866
    [TBL] [Abstract][Full Text] [Related]  

  • 49. SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks.
    Baz M
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080962
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Optimization of Mixed Energy Supply of IoT Network Based on Matching Game and Convex Optimization.
    Han D; Liu T; Qi Y
    Sensors (Basel); 2020 Sep; 20(19):. PubMed ID: 32977565
    [TBL] [Abstract][Full Text] [Related]  

  • 51. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.
    Al-Sarem M; Saeed F; Alkhammash EH; Alghamdi NS
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009725
    [TBL] [Abstract][Full Text] [Related]  

  • 52. IoT Resource Allocation and Optimization Based on Heuristic Algorithm.
    Sangaiah AK; Hosseinabadi AAR; Shareh MB; Bozorgi Rad SY; Zolfagharian A; Chilamkurti N
    Sensors (Basel); 2020 Jan; 20(2):. PubMed ID: 31963762
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 54. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning.
    Okey OD; Maidin SS; Adasme P; Lopes Rosa R; Saadi M; Carrillo Melgarejo D; Zegarra Rodríguez D
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236506
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways.
    Nguyen XH; Nguyen XD; Huynh HH; Le KH
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062393
    [TBL] [Abstract][Full Text] [Related]  

  • 56. IFACNN: efficient DDoS attack detection based on improved firefly algorithm to optimize convolutional neural networks.
    Wang J; Liu Y; Feng H
    Math Biosci Eng; 2022 Jan; 19(2):1280-1303. PubMed ID: 35135204
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Lightweight Internet of Things Botnet Detection Using One-Class Classification.
    Malik K; Rehman F; Maqsood T; Mustafa S; Khalid O; Akhunzada A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632055
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Anomaly Detection Based Latency-Aware Energy Consumption Optimization For IoT Data-Flow Services.
    Luo Y; Li W; Qiu S
    Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31878140
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Research on the Security of IPv6 Communication Based on Petri Net under IoT.
    Han Y; Zhang L; Wang Y; Deng X; Gu Z; Zhang X
    Sensors (Basel); 2023 May; 23(11):. PubMed ID: 37299919
    [TBL] [Abstract][Full Text] [Related]  

  • 60. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
    Albulayhi K; Smadi AA; Sheldon FT; Abercrombie RK
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640752
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.