These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

106 related articles for article (PubMed ID: 35401030)

  • 1. Dynamic cyber risk estimation with competitive quantile autoregression.
    Dzhamtyrova R; Maple C
    Data Min Knowl Discov; 2022; 36(2):513-536. PubMed ID: 35401030
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Modeling population dynamics: A quantile approach.
    Chavas JP
    Math Biosci; 2015 Apr; 262():138-46. PubMed ID: 25661501
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Modeling multivariate cyber risks: deep learning dating extreme value theory.
    Zhang Wu M; Luo J; Fang X; Xu M; Zhao P
    J Appl Stat; 2023; 50(3):610-630. PubMed ID: 36819078
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.
    Veksler VD; Buchler N; Hoffman BE; Cassenti DN; Sample C; Sugrim S
    Front Psychol; 2018; 9():691. PubMed ID: 29867661
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use.
    Tubis AA; Werbińska-Wojciechowska S; Góralczyk M; Wróblewski A; Ziętek B
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33339301
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Perceptive Interface for Intelligent Cyber Enterprises.
    Dumitrache I; Caramihai SI; Moisescu MA; Sacala IS; Vladareanu L; Repta D
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31614821
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 10. QMLE: fast, robust, and efficient estimation of distribution functions based on quantiles.
    Brown S; Heathcote A
    Behav Res Methods Instrum Comput; 2003 Nov; 35(4):485-92. PubMed ID: 14748492
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.
    Oughton EJ; Ralph D; Pant R; Leverett E; Copic J; Thacker S; Dada R; Ruffle S; Tuveson M; Hall JW
    Risk Anal; 2019 Sep; 39(9):2012-2031. PubMed ID: 30812052
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Pricing of cyber insurance premiums using a Markov-based dynamic model with clustering structure.
    Antonio Y; Indratno SW; Saputro SW
    PLoS One; 2021; 16(10):e0258867. PubMed ID: 34699537
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge.
    Radanliev P; De Roure D; Van Kleek M; Ani U; Burnap P; Anthi E; Nurse JRC; Santos O; Montalvo RM; Maddox L
    Environ Syst Decis; 2021; 41(2):236-247. PubMed ID: 33251087
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The psychological effects of cyber terrorism.
    Gross ML; Canetti D; Vashdi DR
    Bull At Sci; 2016; 72(5):284-291. PubMed ID: 28366962
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
    Albahar M
    Sci Eng Ethics; 2019 Aug; 25(4):993-1006. PubMed ID: 28058619
    [TBL] [Abstract][Full Text] [Related]  

  • 16. [Maximum density-size line for Larix olgensis plantations based on quantile regression.].
    Gao HL; Dong LH; Li FR
    Ying Yong Sheng Tai Xue Bao; 2016 Nov; 27(11):3420-3426. PubMed ID: 29696837
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Modelling maximum cyber incident losses of German organisations: an empirical study and modified extreme value distribution approach.
    von Skarczinski B; Raschke M; Teuteberg F
    Geneva Pap Risk Insur Issues Pract; 2023; 48(2):463-501. PubMed ID: 37207019
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyber loss model risk translates to premium mispricing and risk sensitivity.
    Peters GW; Malavasi M; Sofronov G; Shevchenko PV; Trück S; Jang J
    Geneva Pap Risk Insur Issues Pract; 2023; 48(2):372-433. PubMed ID: 37207021
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 20. The Role of User Behaviour in Improving Cyber Security Management.
    Moustafa AA; Bello A; Maurushat A
    Front Psychol; 2021; 12():561011. PubMed ID: 34220596
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.