BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

264 related articles for article (PubMed ID: 32411955)

  • 1. Diverging deep learning cognitive computing techniques into cyber forensics.
    Karie NM; Kebande VR; Venter HS
    Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
    Yadav A; Kumar A; Singh V
    Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
    [TBL] [Abstract][Full Text] [Related]  

  • 3. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
    Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
    Array (N Y); 2020; 5():. PubMed ID: 35531088
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.
    Kim K; Alshenaifi IM; Ramachandran S; Kim J; Zia T; Almorjan A
    Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050740
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
    Djenna A; Barka E; Benchikh A; Khadir K
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Advancing Coordinated Cyber-investigations and Tool Interoperability using a Community Developed Specification Language.
    Casey E; Barnum S; Griffith R; Snyder J; van Beek H; Nelson A
    Digit Investig; 2017; 22():. PubMed ID: 31579279
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.
    Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527
    [TBL] [Abstract][Full Text] [Related]  

  • 10. In-Vehicle Communication Cyber Security: Challenges and Solutions.
    Rathore RS; Hewage C; Kaiwartya O; Lloret J
    Sensors (Basel); 2022 Sep; 22(17):. PubMed ID: 36081138
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security risk models against attacks in smart grid using big data and artificial intelligence.
    Yasin Ghadi Y; Mazhar T; Aurangzeb K; Haq I; Shahzad T; Ali Laghari A; Shahid Anwar M
    PeerJ Comput Sci; 2024; 10():e1840. PubMed ID: 38686008
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.
    Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A systematic review of literature on credit card cyber fraud detection using machine and deep learning.
    Marazqah Btoush EAL; Zhou X; Gururajan R; Chan KC; Genrich R; Sankaran P
    PeerJ Comput Sci; 2023; 9():e1278. PubMed ID: 37346569
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks.
    Gupta C; Johri I; Srinivasan K; Hu YC; Qaisar SM; Huang KY
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271163
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Deep Reinforcement Learning for Cyber Security.
    Nguyen TT; Reddi VJ
    IEEE Trans Neural Netw Learn Syst; 2023 Aug; 34(8):3779-3795. PubMed ID: 34723814
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
    Oh SH; Jeong MK; Kim HC; Park J
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991711
    [TBL] [Abstract][Full Text] [Related]  

  • 18. COVID-19 malicious domain names classification.
    Mvula PK; Branco P; Jourdan GV; Viktor HL
    Expert Syst Appl; 2022 Oct; 204():117553. PubMed ID: 35611122
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An overview of cybercrime law in South Africa.
    Snail Ka Mtuze S; Musoni M
    Int Cybersecur Law Rev; 2023 Jun; ():1-25. PubMed ID: 37361908
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 14.