BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

173 related articles for article (PubMed ID: 34777966)

  • 1. A robust intelligent zero-day cyber-attack detection technique.
    Kumar V; Sinha D
    Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.
    Guo Y
    Comput Commun; 2023 Jan; 198():. PubMed ID: 36741076
    [TBL] [Abstract][Full Text] [Related]  

  • 4. IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.
    Ohtani T; Yamamoto R; Ohzahata S
    Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38794075
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
    Yao W; Hu L; Hou Y; Li X
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112482
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Correlation-Based Anomaly Detection in Industrial Control Systems.
    Jadidi Z; Pal S; Hussain M; Nguyen Thanh K
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772600
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
    Lee JH; Ji IH; Jeon SH; Seo JT
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701
    [TBL] [Abstract][Full Text] [Related]  

  • 13. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
    Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
    Array (N Y); 2020; 5():. PubMed ID: 35531088
    [TBL] [Abstract][Full Text] [Related]  

  • 14. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
    Miller D; Wang Y; Kesidis G
    Neural Comput; 2019 Aug; 31(8):1624-1670. PubMed ID: 31260390
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
    Dutta V; Choraś M; Pawlicki M; Kozik R
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824187
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Utilising Flow Aggregation to Classify Benign Imitating Attacks.
    Hindy H; Atkinson R; Tachtatzis C; Bayne E; Bures M; Bellekens X
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33806363
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Network intrusion detection using oversampling technique and machine learning algorithms.
    Ahmed HA; Hameed A; Bawany NZ
    PeerJ Comput Sci; 2022; 8():e820. PubMed ID: 35111914
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Data-Driven Network Analysis for Anomaly Traffic Detection.
    Alam S; Alam Y; Cui S; Akujuobi C
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37837004
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Detection and Identification of Cyber and Physical Attacks on Distribution Power Grids with PVs: An Online High-Dimensional Data-driven Approach.
    Li F; Xie R; Yang B; Guo L; Ma P; Shi J; Ye J; Song W
    IEEE J Emerg Sel Top Power Electron; 2022 Feb; 10(1):1282-1291. PubMed ID: 36090809
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.
    Ashraf S; Shawon MH; Khalid HM; Muyeen SM
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.