These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 34777966)

  • 41. Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
    Basan E; Basan A; Nekrasov A; Fidge C; Ishchukova E; Basyuk A; Lesnikov A
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850592
    [TBL] [Abstract][Full Text] [Related]  

  • 42. A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems.
    Leite Junior WC; de Moraes CC; de Albuquerque CEP; Machado RCS; de Sá AO
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34064505
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance.
    Liu Z; Tang J; Zhao Z; Zhang S
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200372. PubMed ID: 34398648
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks.
    Mozo A; González-Prieto Á; Pastor A; Gómez-Canaval S; Talavera E
    Sci Rep; 2022 Feb; 12(1):2091. PubMed ID: 35136144
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures.
    Roldán-Gómez J; Boubeta-Puig J; Pachacama-Castillo G; Ortiz G; Martínez JL
    PeerJ Comput Sci; 2021; 7():e787. PubMed ID: 34901434
    [TBL] [Abstract][Full Text] [Related]  

  • 47. A survey on attack detection, estimation and control of industrial cyber-physical systems.
    Zhang D; Wang QG; Feng G; Shi Y; Vasilakos AV
    ISA Trans; 2021 Oct; 116():1-16. PubMed ID: 33581894
    [TBL] [Abstract][Full Text] [Related]  

  • 48. A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication.
    Obaidat M; Brown J; Obeidat S; Rawashdeh M
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751189
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Multi-attack and multi-classification intrusion detection for vehicle-mounted networks based on mosaic-coded convolutional neural network.
    Hu R; Wu Z; Xu Y; Lai T
    Sci Rep; 2022 Apr; 12(1):6295. PubMed ID: 35428746
    [TBL] [Abstract][Full Text] [Related]  

  • 50. An integral sliding mode observer for CPS cyber security attack detection.
    Lv M; Yu W; Lv Y; Cao J; Huang W
    Chaos; 2019 Apr; 29(4):043120. PubMed ID: 31042956
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Influence of cyber-attacks on longitudinal safety of connected and automated vehicles.
    Li Y; Tu Y; Fan Q; Dong C; Wang W
    Accid Anal Prev; 2018 Dec; 121():148-156. PubMed ID: 30248530
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Digital media zero watermark copyright protection algorithm based on embedded intelligent edge computing detection.
    Xu H
    Math Biosci Eng; 2021 Aug; 18(5):6771-6789. PubMed ID: 34517556
    [TBL] [Abstract][Full Text] [Related]  

  • 53. Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.
    Albasheer H; Md Siraj M; Mubarakali A; Elsier Tayfour O; Salih S; Hamdan M; Khan S; Zainal A; Kamarudeen S
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214394
    [TBL] [Abstract][Full Text] [Related]  

  • 54. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.
    Akshay Kumaar M; Samiayya D; Vincent PMDR; Srinivasan K; Chang CY; Ganesh H
    Front Public Health; 2021; 9():824898. PubMed ID: 35096763
    [TBL] [Abstract][Full Text] [Related]  

  • 55. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.
    Al-Sarem M; Saeed F; Alkhammash EH; Alghamdi NS
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009725
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways.
    Nguyen XH; Nguyen XD; Huynh HH; Le KH
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062393
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Cyber attack evaluation dataset for deep packet inspection and analysis.
    Shandilya SK; Ganguli C; Izonin I; Nagar PAK
    Data Brief; 2023 Feb; 46():108771. PubMed ID: 36478690
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach.
    Angel D
    Wirel Pers Commun; 2022; 126(4):3455-3464. PubMed ID: 35756173
    [TBL] [Abstract][Full Text] [Related]  

  • 59. SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks.
    Patil NV; Krishna CR; Kumar K
    Cluster Comput; 2022; 25(2):1355-1372. PubMed ID: 35068996
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.
    Huang X; Dong J
    IEEE Trans Cybern; 2018 Dec; 48(12):3432-3439. PubMed ID: 29994296
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.