These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

172 related articles for article (PubMed ID: 34777966)

  • 21. Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks.
    Amma NGB; Selvakumar S
    Neural Comput Appl; 2022; 34(4):2869-2882. PubMed ID: 34629759
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems.
    Chen J; Liu B; Li T; Hu Y
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850552
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption.
    Li T; Chen B; Liu S; Wang Z; Zhang WA; Yu L
    IEEE Trans Cybern; 2024 May; 54(5):3251-3264. PubMed ID: 38055362
    [TBL] [Abstract][Full Text] [Related]  

  • 25. An intelligent zero trust secure framework for software defined networking.
    Guo X; Xian H; Feng T; Jiang Y; Zhang D; Fang J
    PeerJ Comput Sci; 2023; 9():e1674. PubMed ID: 38077550
    [TBL] [Abstract][Full Text] [Related]  

  • 26. ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.
    Chen YR; Wang Y; Huang GR; Li JE
    ISA Trans; 2023 May; 136():1-15. PubMed ID: 36357220
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Controller Cyber-Attack Detection and Isolation.
    Sztyber-Betley A; Syfert M; Kościelny JM; Górecka Z
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904980
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Error-Robust Distributed Denial of Service Attack Detection Based on an Average Common Feature Extraction Technique.
    Abreu Maranhão JP; Carvalho Lustosa da Costa JP; Pignaton de Freitas E; Javidi E; Timóteo de Sousa Júnior R
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33081079
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions.
    Aljabri M; Aljameel SS; Mohammad RMA; Almotiri SH; Mirza S; Anis FM; Aboulnour M; Alomari DM; Alhamed DH; Altamimi HS
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770375
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Generator of Slow Denial-of-Service Cyber Attacks.
    Sikora M; Fujdiak R; Kuchar K; Holasova E; Misurec J
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450915
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.
    Housh M; Kadosh N; Haddad J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015800
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Deep Anomaly Detection Framework Utilizing Federated Learning for Electricity Theft Zero-Day Cyberattacks.
    Alshehri A; Badr MM; Baza M; Alshahrani H
    Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38794091
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 35. An Intelligent Agent-Based Detection System for DDoS Attacks Using Automatic Feature Extraction and Selection.
    Abu Bakar R; Huang X; Javed MS; Hussain S; Majeed MF
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36992049
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System.
    Ramadhan UF; Lee J; Yoon M
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850561
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
    Morales-Molina CD; Hernandez-Suarez A; Sanchez-Perez G; Toscano-Medina LK; Perez-Meana H; Olivares-Mercado J; Portillo-Portillo J; Sanchez V; Garcia-Villalba LJ
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34063577
    [TBL] [Abstract][Full Text] [Related]  

  • 38. The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers.
    Peppes N; Alexakis T; Adamopoulou E; Demestichas K
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679705
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.
    Liu Z; Thapa N; Shaver A; Roy K; Siddula M; Yuan X; Yu A
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300574
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Emerging framework for attack detection in cyber-physical systems using heuristic-based optimization algorithm.
    Alohali MA; Elsadig M; Hilal AM; Mutwakel A
    PeerJ Comput Sci; 2023; 9():e1596. PubMed ID: 38192469
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.