These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
125 related articles for article (PubMed ID: 34518744)
1. A threat intelligence framework for protecting smart satellite-based healthcare networks. Al-Hawawreh M; Moustafa N; Slay J Neural Comput Appl; 2021 Sep; ():1-21. PubMed ID: 34518744 [TBL] [Abstract][Full Text] [Related]
2. DDoS attack detection in smart grid network using reconstructive machine learning models. Naqvi SSA; Li Y; Uzair M PeerJ Comput Sci; 2024; 10():e1784. PubMed ID: 38259891 [TBL] [Abstract][Full Text] [Related]
3. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312 [TBL] [Abstract][Full Text] [Related]
4. Security Concerns in MMO Games-Analysis of a Potent Application Layer DDoS Threat. Gavrić N; Bojović Ž Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298141 [TBL] [Abstract][Full Text] [Related]
5. A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security. Shitharth S; Alshareef AM; Khadidos AO; Alyoubi KH; Khadidos AO; Uddin M Sci Rep; 2023 Sep; 13(1):15681. PubMed ID: 37735185 [TBL] [Abstract][Full Text] [Related]
6. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning. Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959 [TBL] [Abstract][Full Text] [Related]
7. Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things. Lara E; Aguilar L; Sanchez MA; García JA Sensors (Basel); 2020 Jan; 20(2):. PubMed ID: 31963181 [TBL] [Abstract][Full Text] [Related]
8. DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology. Ibrahim RF; Abu Al-Haija Q; Ahmad A Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146163 [TBL] [Abstract][Full Text] [Related]
10. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556 [TBL] [Abstract][Full Text] [Related]
11. Transport and Application Layer DDoS Attacks Detection to IoT Devices by Using Machine Learning and Deep Learning Models. Almaraz-Rivera JG; Perez-Diaz JA; Cantoral-Ceballos JA Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591056 [TBL] [Abstract][Full Text] [Related]
12. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT. Li S; Wang J; Wang Y; Zhou G; Zhao Y Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700 [TBL] [Abstract][Full Text] [Related]
13. Lightweight CoAP-Based Bootstrapping Service for the Internet of Things. Garcia-Carrillo D; Marin-Lopez R Sensors (Basel); 2016 Mar; 16(3):. PubMed ID: 26978362 [TBL] [Abstract][Full Text] [Related]
14. Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree-Based Classification for Detection of DDoS Pandemic Attacks in SDN-Based SCADA Systems. Polat O; Türkoğlu M; Polat H; Oyucu S; Üzen H; Yardımcı F; Aksöz A Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339756 [TBL] [Abstract][Full Text] [Related]
15. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Alotaibi B Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687926 [TBL] [Abstract][Full Text] [Related]
16. Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning. de Caldas Filho FL; Soares SCM; Oroski E; de Oliveira Albuquerque R; da Mata RZA; de Mendonça FLL; de Sousa Júnior RT Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514600 [TBL] [Abstract][Full Text] [Related]
17. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning. Zahra F; Jhanjhi NZ; Brohi SN; Khan NA; Masud M; AlZain MA Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146111 [TBL] [Abstract][Full Text] [Related]
18. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques. Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975 [TBL] [Abstract][Full Text] [Related]