These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 35494876)

  • 61. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
    Kumar R; Subbiah G
    Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
    [TBL] [Abstract][Full Text] [Related]  

  • 62. A Study on the Application of Distributed System Technology-Guided Machine Learning in Malware Detection.
    Jin S; Guo Z; Liu D; Yang Y
    Comput Intell Neurosci; 2022; 2022():4977898. PubMed ID: 35251151
    [TBL] [Abstract][Full Text] [Related]  

  • 63. MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model.
    Liu Y; Yang P; Jia P; He Z; Luo H
    PLoS One; 2022; 17(9):e0273804. PubMed ID: 36107957
    [TBL] [Abstract][Full Text] [Related]  

  • 64. ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques.
    Alhaidari F; Shaib NA; Alsafi M; Alharbi H; Alawami M; Aljindan R; Rahman AU; Zagrouba R
    Comput Intell Neurosci; 2022; 2022():1615528. PubMed ID: 35586085
    [TBL] [Abstract][Full Text] [Related]  

  • 65. Malware homology determination using visualized images and feature fusion.
    Zhu X; Huang J; Wang B; Qi C
    PeerJ Comput Sci; 2021; 7():e494. PubMed ID: 33977134
    [TBL] [Abstract][Full Text] [Related]  

  • 66. Intelligent malware detection based on graph convolutional network.
    Li S; Zhou Q; Zhou R; Lv Q
    J Supercomput; 2022; 78(3):4182-4198. PubMed ID: 34456504
    [TBL] [Abstract][Full Text] [Related]  

  • 67. SmartMal: a service-oriented behavioral malware detection framework for mobile devices.
    Wang C; Wu Z; Li X; Zhou X; Wang A; Hung PC
    ScientificWorldJournal; 2014; 2014():101986. PubMed ID: 25165729
    [TBL] [Abstract][Full Text] [Related]  

  • 68. Memory Visualization-Based Malware Detection Technique.
    Shah SSH; Jamil N; Khan AUR
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236711
    [TBL] [Abstract][Full Text] [Related]  

  • 69. An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques.
    Albishry N; AlGhamdi R; Almalawi A; Khan AI; Kshirsagar PR; BaruDebtera
    Comput Intell Neurosci; 2022; 2022():5061059. PubMed ID: 35510059
    [TBL] [Abstract][Full Text] [Related]  

  • 70. Hfinger: Malware HTTP Request Fingerprinting.
    Białczak P; Mazurczyk W
    Entropy (Basel); 2021 Apr; 23(5):. PubMed ID: 33922568
    [TBL] [Abstract][Full Text] [Related]  

  • 71. Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol.
    Zheng R; Liu J; Liu L; Liao S; Li K; Wei J; Li L; Tian Z
    PLoS One; 2020; 15(5):e0232696. PubMed ID: 32374775
    [TBL] [Abstract][Full Text] [Related]  

  • 72. Attention-Based Automated Feature Extraction for Malware Analysis.
    Choi S; Bae J; Lee C; Kim Y; Kim J
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32443750
    [TBL] [Abstract][Full Text] [Related]  

  • 73. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

  • 74. Adversarial Feature Selection Against Evasion Attacks.
    Zhang F; Chan PP; Biggio B; Yeung DS; Roli F
    IEEE Trans Cybern; 2016 Mar; 46(3):766-77. PubMed ID: 25910268
    [TBL] [Abstract][Full Text] [Related]  

  • 75. The effects of different representations on static structure analysis of computer malware signatures.
    Narayanan A; Chen Y; Pang S; Tao B
    ScientificWorldJournal; 2013; 2013():671096. PubMed ID: 23983644
    [TBL] [Abstract][Full Text] [Related]  

  • 76. DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware.
    Afifi F; Anuar NB; Shamshirband S; Choo KK
    PLoS One; 2016; 11(9):e0162627. PubMed ID: 27611312
    [TBL] [Abstract][Full Text] [Related]  

  • 77. On the classification of Microsoft-Windows ransomware using hardware profile.
    Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA
    PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011
    [TBL] [Abstract][Full Text] [Related]  

  • 78. Classification of ransomware using different types of neural networks.
    Madani H; Ouerdi N; Boumesaoud A; Azizi A
    Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523
    [TBL] [Abstract][Full Text] [Related]  

  • 79. Conservative Novelty Synthesizing Network for Malware Recognition in an Open-Set Scenario.
    Guo J; Guo S; Ma S; Sun Y; Xu Y
    IEEE Trans Neural Netw Learn Syst; 2023 Feb; 34(2):662-676. PubMed ID: 34339376
    [TBL] [Abstract][Full Text] [Related]  

  • 80. Efficient Windows malware identification and classification scheme for plant protection information systems.
    Chen Z; Xing S; Ren X
    Front Plant Sci; 2023; 14():1123696. PubMed ID: 37152181
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.