These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

127 related articles for article (PubMed ID: 35576222)

  • 1. TagSeq: Malicious behavior discovery using dynamic analysis.
    Huang YT; Sun YS; Chen MC
    PLoS One; 2022; 17(5):e0263644. PubMed ID: 35576222
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Convolution neural network with batch normalization and inception-residual modules for Android malware classification.
    Liu T; Zhang H; Long H; Shi J; Yao Y
    Sci Rep; 2022 Aug; 12(1):13996. PubMed ID: 35978023
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Channel Features and API Frequency-Based Transformer Model for Malware Identification.
    Qian L; Cong L
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257673
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Deep learning based Sequential model for malware analysis using Windows exe API Calls.
    Catak FO; Yazı AF; Elezaj O; Ahmed J
    PeerJ Comput Sci; 2020; 6():e285. PubMed ID: 33816936
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An intelligent identification and classification system for malicious uniform resource locators (URLs).
    Abu Al-Haija Q; Al-Fayoumi M
    Neural Comput Appl; 2023 Apr; ():1-17. PubMed ID: 37362563
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Attention-Based Automated Feature Extraction for Malware Analysis.
    Choi S; Bae J; Lee C; Kim Y; Kim J
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32443750
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
    Ullah F; Srivastava G; Ullah S
    J Cloud Comput (Heidelb); 2022; 11(1):75. PubMed ID: 36345308
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Disrupting drive-by download networks on Twitter.
    Javed A; Ikwu R; Burnap P; Giommoni L; Williams ML
    Soc Netw Anal Min; 2022; 12(1):117. PubMed ID: 36035378
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Z2F: Heterogeneous graph-based Android malware detection.
    Ma Z; Luktarhan N
    PLoS One; 2024; 19(3):e0300975. PubMed ID: 38547074
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Malicious URL Detection Based on Associative Classification.
    Kumi S; Lim C; Lee SG
    Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33572521
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs.
    Wu H; Luktarhan N; Tian G; Song Y
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430643
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The effects of different representations on static structure analysis of computer malware signatures.
    Narayanan A; Chen Y; Pang S; Tao B
    ScientificWorldJournal; 2013; 2013():671096. PubMed ID: 23983644
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Modified ResNeXt for Android Malware Identification and Classification.
    Albahar MA; ElSayed MS; Jurcut A
    Comput Intell Neurosci; 2022; 2022():8634784. PubMed ID: 35634062
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices.
    Alkahtani H; Aldhyani THH
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336437
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Kullback-Liebler divergence-based representation algorithm for malware detection.
    Aboaoja FA; Zainal A; Ghaleb FA; Alghamdi NS; Saeed F; Alhuwayji H
    PeerJ Comput Sci; 2023; 9():e1492. PubMed ID: 37810364
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Malware analysis using visualized image matrices.
    Han K; Kang B; Im EG
    ScientificWorldJournal; 2014; 2014():132713. PubMed ID: 25133202
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.