BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

289 related articles for article (PubMed ID: 33217936)

  • 1. MQTTset, a New Dataset for Machine Learning Techniques on MQTT.
    Vaccari I; Chiola G; Aiello M; Mongelli M; Cambiaso E
    Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33217936
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.
    Khan MA; Khan MA; Jan SU; Ahmad J; Jamal SS; Shah AA; Pitropakis N; Buchanan WJ
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770322
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks.
    Abu Al-Haija Q
    Front Big Data; 2021; 4():782902. PubMed ID: 35098112
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Preventing MQTT Vulnerabilities Using IoT-Enabled Intrusion Detection System.
    Husnain M; Hayat K; Cambiaso E; Fayyaz UU; Mongelli M; Akram H; Ghazanfar Abbas S; Shah GA
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062536
    [TBL] [Abstract][Full Text] [Related]  

  • 5. SlowITe, a Novel Denial of Service Attack Affecting MQTT.
    Vaccari I; Aiello M; Cambiaso E
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32455752
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Enhancement for MQTT Protocol Using Distributed Machine Learning Framework.
    Alotaibi NS; Sayed Ahmed HI; Kamel SOM; ElKabbany GF
    Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475174
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments.
    Al Hanif A; Ilyas M
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544044
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.
    Soe YN; Feng Y; Santosa PI; Hartanto R; Sakurai K
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32764394
    [TBL] [Abstract][Full Text] [Related]  

  • 9. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.
    Mahalingam A; Perumal G; Subburayalu G; Albathan M; Altameem A; Almakki RS; Hussain A; Abbas Q
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836874
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
    Morales-Molina CD; Hernandez-Suarez A; Sanchez-Perez G; Toscano-Medina LK; Perez-Meana H; Olivares-Mercado J; Portillo-Portillo J; Sanchez V; Garcia-Villalba LJ
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34063577
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms.
    Altulaihan E; Almaiah MA; Aljughaiman A
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276404
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.
    Liu Z; Thapa N; Shaver A; Roy K; Siddula M; Yuan X; Yu A
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300574
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.
    Churcher A; Ullah R; Ahmad J; Ur Rehman S; Masood F; Gogate M; Alqahtani F; Nour B; Buchanan WJ
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33435202
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.
    Al Abdulwahid A
    Comput Intell Neurosci; 2022; 2022():2037954. PubMed ID: 36479020
    [TBL] [Abstract][Full Text] [Related]  

  • 17. MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.
    Sahlmann K; Clemens V; Nowak M; Schnor B
    Sensors (Basel); 2020 Dec; 21(1):. PubMed ID: 33374965
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
    Johnson AP; Al-Aqrabi H; Hill R
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32033269
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Anomaly detection in IoT-based healthcare: machine learning for enhanced security.
    Khan MM; Alkhathami M
    Sci Rep; 2024 Mar; 14(1):5872. PubMed ID: 38467709
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures.
    Gentile AF; Macrì D; Carnì DL; Greco E; Lamonaca F
    Sensors (Basel); 2024 Apr; 24(9):. PubMed ID: 38732887
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 15.