These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

125 related articles for article (PubMed ID: 35755750)

  • 1. Applications of Game Theory and Advanced Machine Learning Methods for Adaptive Cyberdefense Strategies in the Digital Music Industry.
    Jing J
    Comput Intell Neurosci; 2022; 2022():2266171. PubMed ID: 35755750
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.
    Maqbool Z; Aggarwal P; Pammi VSC; Dutt V
    Front Psychol; 2020; 11():11. PubMed ID: 32063872
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 8. A Semi-Self-Supervised Intrusion Detection System for Multilevel Industrial Cyber Protection.
    Ye F; Zhao W
    Comput Intell Neurosci; 2022; 2022():4043309. PubMed ID: 36188688
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber Risk Recommendation System for Digital Education Management Platforms.
    Yin X; Chen Y
    Comput Intell Neurosci; 2022; 2022():8548534. PubMed ID: 35528338
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Deep Reinforcement Learning for Cyber Security.
    Nguyen TT; Reddi VJ
    IEEE Trans Neural Netw Learn Syst; 2023 Aug; 34(8):3779-3795. PubMed ID: 34723814
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber War Game in Temporal Networks.
    Cho JH; Gao J
    PLoS One; 2016; 11(2):e0148674. PubMed ID: 26859840
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.
    Harrop W; Matteson A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.
    Cranford EA; Gonzalez C; Aggarwal P; Cooney S; Tambe M; Lebiere C
    Top Cogn Sci; 2020 Jul; 12(3):992-1011. PubMed ID: 32725751
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
    Maqbool Z; Makhijani N; Pammi VSC; Dutt V
    Hum Factors; 2017 May; 59(3):420-431. PubMed ID: 28430545
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Introducing cyber.
    Hult F; Sivanesan G
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):97-102. PubMed ID: 24457321
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Online Anomaly Detection of Industrial IoT Based on Hybrid Machine Learning Architecture.
    Guo J; Shen Y
    Comput Intell Neurosci; 2022; 2022():8568917. PubMed ID: 35535183
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.