These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

130 related articles for article (PubMed ID: 33286663)

  • 1. Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework.
    Xiao K; Zhu C; Xie J; Zhou Y; Zhu X; Zhang W
    Entropy (Basel); 2020 Aug; 22(8):. PubMed ID: 33286663
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things.
    Chen L; Wang Z; Li F; Guo Y; Geng K
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32024201
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things.
    Yan J; Xiao K; Zhu C; Wu J; Yang G; Zhang W
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33096671
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Randomized Prediction Games for Adversarial Machine Learning.
    Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F
    IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.
    Zhu X; Huang J
    PeerJ Comput Sci; 2021; 7():e728. PubMed ID: 34616898
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Spatial-temporal modeling of malware propagation in networks.
    Chen Z; Ji C
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1291-303. PubMed ID: 16252834
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.
    Ilca LF; Lucian OP; Balan TC
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571540
    [TBL] [Abstract][Full Text] [Related]  

  • 10. GSB: GNGS and SAG-BiGRU network for malware dynamic detection.
    Hu Z; Liu G; Xiang X; Li Y; Zhuang S
    PLoS One; 2024; 19(4):e0298809. PubMed ID: 38635682
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.
    Kroshl WM; Sarkani S; Mazzuchi TA
    Risk Anal; 2015 Sep; 35(9):1690-705. PubMed ID: 25683347
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma.
    Qi G; Li J; Xu C; Chen G; Yang K
    Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673201
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Epidemic Analysis of Wireless Rechargeable Sensor Networks Based on an Attack-Defense Game Model.
    Liu G; Peng B; Zhong X
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33467692
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Statistical modeling of computer malware propagation dynamics in cyberspace.
    Fang Z; Zhao P; Xu M; Xu S; Hu T; Fang X
    J Appl Stat; 2022; 49(4):858-883. PubMed ID: 35707816
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Defender-Attacker Decision Tree Analysis to Combat Terrorism.
    Garcia RJ; von Winterfeldt D
    Risk Anal; 2016 Dec; 36(12):2258-2271. PubMed ID: 27037744
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.