BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

335 related articles for article (PubMed ID: 33954249)

  • 1. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic.
    Lallie HS; Shepherd LA; Nurse JRC; Erola A; Epiphaniou G; Maple C; Bellekens X
    Comput Secur; 2021 Jun; 105():102248. PubMed ID: 36540648
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808184
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime.
    O'Malley RL; Holt KM
    J Interpers Violence; 2022 Jan; 37(1-2):258-283. PubMed ID: 32146856
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Diverging deep learning cognitive computing techniques into cyber forensics.
    Karie NM; Kebande VR; Venter HS
    Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.
    Alsaade FW; Al-Adhaileh MH
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112429
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
    Lee JH; Ji IH; Jeon SH; Seo JT
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Network intrusion detection using oversampling technique and machine learning algorithms.
    Ahmed HA; Hameed A; Bawany NZ
    PeerJ Comput Sci; 2022; 8():e820. PubMed ID: 35111914
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A robust intelligent zero-day cyber-attack detection technique.
    Kumar V; Sinha D
    Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
    Yadav A; Kumar A; Singh V
    Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 17.