These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

180 related articles for article (PubMed ID: 35494876)

  • 41. Z2F: Heterogeneous graph-based Android malware detection.
    Ma Z; Luktarhan N
    PLoS One; 2024; 19(3):e0300975. PubMed ID: 38547074
    [TBL] [Abstract][Full Text] [Related]  

  • 42. Android malware detection with MH-100K: An innovative dataset for advanced research.
    Bragança H; Rocha V; Barcellos L; Souto E; Kreutz D; Feitosa E
    Data Brief; 2023 Dec; 51():109750. PubMed ID: 38020437
    [TBL] [Abstract][Full Text] [Related]  

  • 43. AndroAnalyzer: android malicious software detection based on deep learning.
    Arslan RS
    PeerJ Comput Sci; 2021; 7():e533. PubMed ID: 34084934
    [TBL] [Abstract][Full Text] [Related]  

  • 44. An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs.
    Wu H; Luktarhan N; Tian G; Song Y
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430643
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.
    Ilca LF; Lucian OP; Balan TC
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571540
    [TBL] [Abstract][Full Text] [Related]  

  • 46. An ensemble approach for imbalanced multiclass malware classification using 1D-CNN.
    Panda B; Bisoyi SS; Panigrahy S
    PeerJ Comput Sci; 2023; 9():e1677. PubMed ID: 38077555
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Convolution neural network with batch normalization and inception-residual modules for Android malware classification.
    Liu T; Zhang H; Long H; Shi J; Yao Y
    Sci Rep; 2022 Aug; 12(1):13996. PubMed ID: 35978023
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer.
    Elkabbash ET; Mostafa RR; Barakat SI
    PLoS One; 2021; 16(11):e0260232. PubMed ID: 34797851
    [TBL] [Abstract][Full Text] [Related]  

  • 49. FG-Droid: Grouping based feature size reduction for Android malware detection.
    Arslan RS
    PeerJ Comput Sci; 2022; 8():e1043. PubMed ID: 35875648
    [TBL] [Abstract][Full Text] [Related]  

  • 50. Biserial Miyaguchi-Preneel Blockchain-Based Ruzicka-Indexed Deep Perceptive Learning for Malware Detection in IoMT.
    Alotaibi AS
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770424
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Automated Android Malware Detection Using User Feedback.
    Duque J; Mendes G; Nunes L; de Almeida A; Serrão C
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36081021
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Data on Vulnerability Detection in Android.
    Garg S; Baliyan N
    Data Brief; 2019 Feb; 22():1081-1087. PubMed ID: 30815521
    [TBL] [Abstract][Full Text] [Related]  

  • 53. MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty.
    Yuan H; Tang Y
    Entropy (Basel); 2020 Jul; 22(7):. PubMed ID: 33286563
    [TBL] [Abstract][Full Text] [Related]  

  • 54. MVDroid: an android malicious VPN detector using neural networks.
    Seraj S; Khodambashi S; Pavlidis M; Polatidis N
    Neural Comput Appl; 2023 Apr; ():1-11. PubMed ID: 37362571
    [TBL] [Abstract][Full Text] [Related]  

  • 55. FILM: Filtering and Machine Learning for Malware Detection in Edge Computing.
    Kim YJ; Park CH; Yoon M
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336322
    [TBL] [Abstract][Full Text] [Related]  

  • 56. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 57. CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing.
    Wu W; Peng H; Zhu H; Zhang D
    Sensors (Basel); 2024 Jun; 24(13):. PubMed ID: 39001035
    [TBL] [Abstract][Full Text] [Related]  

  • 58. Towards a systematic description of the field using bibliometric analysis: malware evolution.
    Mat SRT; Ab Razak MF; Kahar MNM; Arif JM; Mohamad S; Firdaus A
    Scientometrics; 2021; 126(3):2013-2055. PubMed ID: 33583978
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 60. IoT malware detection architecture using a novel channel boosted and squeezed CNN.
    Asam M; Khan SH; Akbar A; Bibi S; Jamal T; Khan A; Ghafoor U; Bhutta MR
    Sci Rep; 2022 Sep; 12(1):15498. PubMed ID: 36109570
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.