BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

264 related articles for article (PubMed ID: 35271163)

  • 1. A Systematic Review on Machine Learning and Deep Learning Models for Electronic Information Security in Mobile Networks.
    Gupta C; Johri I; Srinivasan K; Hu YC; Qaisar SM; Huang KY
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271163
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
    Yadav A; Kumar A; Singh V
    Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues.
    Ahmad R; Wazirali R; Abu-Ain T
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808227
    [TBL] [Abstract][Full Text] [Related]  

  • 4. In-Vehicle Communication Cyber Security: Challenges and Solutions.
    Rathore RS; Hewage C; Kaiwartya O; Lloret J
    Sensors (Basel); 2022 Sep; 22(17):. PubMed ID: 36081138
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Security risk models against attacks in smart grid using big data and artificial intelligence.
    Yasin Ghadi Y; Mazhar T; Aurangzeb K; Haq I; Shahzad T; Ali Laghari A; Shahid Anwar M
    PeerJ Comput Sci; 2024; 10():e1840. PubMed ID: 38686008
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security.
    Tefera MK; Jin Z; Zhang S
    Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591279
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Security Requirements and Challenges of 6G Technologies and Applications.
    Abdel Hakeem SA; Hussein HH; Kim H
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271113
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols.
    Ghori MR; Wan TC; Sodhy GC
    Sensors (Basel); 2020 Jun; 20(12):. PubMed ID: 32630381
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A systematic review of literature on credit card cyber fraud detection using machine and deep learning.
    Marazqah Btoush EAL; Zhou X; Gururajan R; Chan KC; Genrich R; Sankaran P
    PeerJ Comput Sci; 2023; 9():e1278. PubMed ID: 37346569
    [TBL] [Abstract][Full Text] [Related]  

  • 12. FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks.
    de Melo PHAD; Miani RS; Rosa PF
    Sensors (Basel); 2022 Apr; 22(8):. PubMed ID: 35458880
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.
    Alsaade FW; Al-Adhaileh MH
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112429
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009899
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.
    Nankya M; Chataut R; Akl R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960539
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches.
    Alhoraibi L; Alghazzawi D; Alhebshi R; Rabie OBJ
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850412
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Network Threat Detection Using Machine/Deep Learning in SDN-Based Platforms: A Comprehensive Analysis of State-of-the-Art Solutions, Discussion, Challenges, and Future Research Direction.
    Ahmed N; Ngadi AB; Sharif JM; Hussain S; Uddin M; Rathore MS; Iqbal J; Abdelhaq M; Alsaqour R; Ullah SS; Zuhra FT
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298244
    [TBL] [Abstract][Full Text] [Related]  

  • 18. 5G Security Threat Assessment in Real Networks.
    Park S; Kim D; Park Y; Cho H; Kim D; Kwon S
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450971
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.
    Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective.
    Aldaej A; Ahanger TA; Atiquzzaman M; Ullah I; Yousufudin M
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408244
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.