These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

113 related articles for article (PubMed ID: 33286663)

  • 21. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

  • 23. ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques.
    Alhaidari F; Shaib NA; Alsafi M; Alharbi H; Alawami M; Aljindan R; Rahman AU; Zagrouba R
    Comput Intell Neurosci; 2022; 2022():1615528. PubMed ID: 35586085
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Scheduling Strategy Design Framework for Cyber-Physical System with Non-Negligible Propagation Delay.
    An Z; Wu S; Liu T; Jiao J; Zhang Q
    Entropy (Basel); 2021 Jun; 23(6):. PubMed ID: 34199779
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things.
    Liu B; Xu H; Zhou X
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30469434
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Zero-determinant strategy in stochastic Stackelberg asymmetric security game.
    Cheng Z; Chen G; Hong Y
    Sci Rep; 2023 Jul; 13(1):11308. PubMed ID: 37438579
    [TBL] [Abstract][Full Text] [Related]  

  • 29. An Efficient DenseNet-Based Deep Learning Model for Malware Detection.
    Hemalatha J; Roseline SA; Geetha S; Kadry S; Damaševičius R
    Entropy (Basel); 2021 Mar; 23(3):. PubMed ID: 33804035
    [TBL] [Abstract][Full Text] [Related]  

  • 30. An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques.
    Albishry N; AlGhamdi R; Almalawi A; Khan AI; Kshirsagar PR; BaruDebtera
    Comput Intell Neurosci; 2022; 2022():5061059. PubMed ID: 35510059
    [TBL] [Abstract][Full Text] [Related]  

  • 31. An attack-defense game model in infrastructure networks under link hiding.
    Qi G; Li J; Xu X; Chen G; Yang K
    Chaos; 2022 Nov; 32(11):113109. PubMed ID: 36456310
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Stochastic model predictive control framework for resilient cyber-physical systems: review and perspectives.
    Chen J; Shi Y
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200371. PubMed ID: 34398650
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities.
    Zhou B; Sun B; Zang T; Cai Y; Wu J; Luo H
    Entropy (Basel); 2022 Dec; 25(1):. PubMed ID: 36673188
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Evaluation of Machine Learning Algorithms for Malware Detection.
    Akhtar MS; Feng T
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679741
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 37. How to punish cyber criminals: A study to investigate the target and consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan.
    Khadam N; Anjum N; Alam A; Ali Mirza Q; Assam M; Ismail EAA; Abonazel MR
    Heliyon; 2023 Dec; 9(12):e22823. PubMed ID: 38076082
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.
    Babbar H; Rani S; Sah DK; AlQahtani SA; Kashif Bashir A
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631793
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective.
    Zeng C; Ren B; Li M; Liu H; Chen J
    Chaos; 2019 Aug; 29(8):083129. PubMed ID: 31472502
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.