These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
118 related articles for article (PubMed ID: 35795743)
21. A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Khan A; Husain SA ScientificWorldJournal; 2013; 2013():796726. PubMed ID: 23818831 [TBL] [Abstract][Full Text] [Related]
23. Robust image classification against adversarial attacks using elastic similarity measures between edge count sequences. Oregi I; Del Ser J; Pérez A; Lozano JA Neural Netw; 2020 Aug; 128():61-72. PubMed ID: 32442627 [TBL] [Abstract][Full Text] [Related]
24. Search-based multi-vulnerability testing of XML injections in web applications. Jan S; Panichella A; Arcuri A; Briand L Empir Softw Eng; 2019; 24(6):3696-3729. PubMed ID: 32684796 [TBL] [Abstract][Full Text] [Related]
25. A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base. Guo Q; Li M; Wang W; Liu Y Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433613 [TBL] [Abstract][Full Text] [Related]
26. Security Assessment of Cyberphysical Digital Microfluidic Biochips. Ali SS; Ibrahim M; Sinanoglu O; Chakrabarty K; Karri R IEEE/ACM Trans Comput Biol Bioinform; 2016; 13(3):445-58. PubMed ID: 26701892 [TBL] [Abstract][Full Text] [Related]
27. Poisoning Attack Against Estimating From Pairwise Comparisons. Ma K; Xu Q; Zeng J; Cao X; Huang Q IEEE Trans Pattern Anal Mach Intell; 2022 Oct; 44(10):6393-6408. PubMed ID: 34101586 [TBL] [Abstract][Full Text] [Related]
28. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312 [TBL] [Abstract][Full Text] [Related]
29. Method for detecting core malware sites related to biomedical information systems. Kim D; Choi D; Jin J Comput Math Methods Med; 2015; 2015():756842. PubMed ID: 25821511 [TBL] [Abstract][Full Text] [Related]
30. Geometry-Aware Generation of Adversarial Point Clouds. Wen Y; Lin J; Chen K; Chen CLP; Jia K IEEE Trans Pattern Anal Mach Intell; 2022 Jun; 44(6):2984-2999. PubMed ID: 33320808 [TBL] [Abstract][Full Text] [Related]
31. FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners. Zhang Y; Lv X; Chen Y; Ren T; Yang C; Han M Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808527 [TBL] [Abstract][Full Text] [Related]
32. Toward Exposing Timing-Based Probing Attacks in Web Applications. Mao J; Chen Y; Shi F; Jia Y; Liang Z Sensors (Basel); 2017 Feb; 17(3):. PubMed ID: 28245610 [TBL] [Abstract][Full Text] [Related]
34. APuML: An Efficient Approach to Detect Mobile Phishing Webpages using Machine Learning. Jain AK; Debnath N; Jain AK Wirel Pers Commun; 2022; 125(4):3227-3248. PubMed ID: 35529800 [TBL] [Abstract][Full Text] [Related]
35. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468 [TBL] [Abstract][Full Text] [Related]
36. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors. Bortsova G; González-Gonzalo C; Wetstein SC; Dubost F; Katramados I; Hogeweg L; Liefers B; van Ginneken B; Pluim JPW; Veta M; Sánchez CI; de Bruijne M Med Image Anal; 2021 Oct; 73():102141. PubMed ID: 34246850 [TBL] [Abstract][Full Text] [Related]
37. Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks. Al-Ani A; Anbar M; Laghari SA; Al-Ani AK PLoS One; 2020; 15(5):e0232574. PubMed ID: 32392261 [TBL] [Abstract][Full Text] [Related]
38. Malicious URL Detection Based on Associative Classification. Kumi S; Lim C; Lee SG Entropy (Basel); 2021 Jan; 23(2):. PubMed ID: 33572521 [TBL] [Abstract][Full Text] [Related]
39. A hybrid machine learning approach for detecting unprecedented DDoS attacks. Najafimehr M; Zarifzadeh S; Mostafavi S J Supercomput; 2022; 78(6):8106-8136. PubMed ID: 35017789 [TBL] [Abstract][Full Text] [Related]
40. Stealing complex network attack detection method considering security situation awareness. Xi B; Liu H; Hou B; Wang Y; Guo Y PLoS One; 2024; 19(3):e0298555. PubMed ID: 38512902 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]