BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

290 related articles for article (PubMed ID: 33672108)

  • 1. Generating Datasets for Anomaly-Based Intrusion Detection Systems in IoT and Industrial IoT Networks.
    Essop I; Ribeiro JC; Papaioannou M; Zachos G; Mantas G; Rodriguez J
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33672108
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Dec; 23(1):. PubMed ID: 36616920
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.
    Abosata N; Al-Rubaye S; Inalhan G; Emmanouilidis C
    Sensors (Basel); 2021 May; 21(11):. PubMed ID: 34073975
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Efficient Anomaly Detection for Smart Hospital IoT Systems.
    Said AM; Yahyaoui A; Abdellatif T
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546169
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Attentive transformer deep learning algorithm for intrusion detection on IoT systems using automatic Xplainable feature selection.
    Zegarra Rodríguez D; Daniel Okey O; Maidin SS; Umoren Udo E; Kleinschmidt JH
    PLoS One; 2023; 18(10):e0286652. PubMed ID: 37844095
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.
    Choudhary V; Tanwar S; Choudhury T; Kotecha K
    MethodsX; 2024 Jun; 12():102747. PubMed ID: 38774685
    [TBL] [Abstract][Full Text] [Related]  

  • 7. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.
    Mahalingam A; Perumal G; Subburayalu G; Albathan M; Altameem A; Almakki RS; Hussain A; Abbas Q
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836874
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks.
    Benaddi H; Jouhari M; Ibrahimi K; Ben Othman J; Amhoud EM
    Sensors (Basel); 2022 Oct; 22(21):. PubMed ID: 36365782
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Framework for Malicious Traffic Detection in IoT Healthcare Environment.
    Hussain F; Abbas SG; Shah GA; Pires IM; Fayyaz UU; Shahzad F; Garcia NM; Zdravevski E
    Sensors (Basel); 2021 Apr; 21(9):. PubMed ID: 33925813
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Lightweight Hybrid Deep Learning Privacy Preserving Model for FC-Based Industrial Internet of Medical Things.
    Almaiah MA; Ali A; Hajjej F; Pasha MF; Alohali MA
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336282
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey.
    Tan SF; Samsudin A
    Sensors (Basel); 2021 Oct; 21(19):. PubMed ID: 34640967
    [TBL] [Abstract][Full Text] [Related]  

  • 12. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses.
    Albulayhi K; Smadi AA; Sheldon FT; Abercrombie RK
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640752
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Panorama of Cloud Platforms for IoT Applications Across Industries.
    Yangui S
    Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32397423
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection-Current Research Trends.
    Rafique SH; Abdallah A; Musa NS; Murugan T
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38544231
    [TBL] [Abstract][Full Text] [Related]  

  • 15. SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks.
    Baz M
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080962
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Modified graph-based algorithm to analyze security threats in IoT.
    Arat F; Akleylek S
    PeerJ Comput Sci; 2023; 9():e1743. PubMed ID: 38192462
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models.
    Rabie OBJ; Selvarajan S; Hasanin T; Alshareef AM; Yogesh CK; Uddin M
    Sci Rep; 2024 Jan; 14(1):386. PubMed ID: 38172185
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry.
    Farooq MS; Abdullah M; Riaz S; Alvi A; Rustam F; Flores MAL; Galán JC; Samad MA; Ashraf I
    Sensors (Basel); 2023 Nov; 23(21):. PubMed ID: 37960657
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection.
    Ellappan V; Mahendran A; Subramanian M; Jotheeswaran J; Khadidos AO; Khadidos AO; Selvarajan S
    Sci Rep; 2023 Nov; 13(1):20843. PubMed ID: 38012161
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 15.