These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

171 related articles for article (PubMed ID: 36090809)

  • 21. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Data-driven load frequency cooperative control for multi-area power system integrated with VSCs and EV aggregators under cyber-attacks.
    Zhang G; Li J; Xing Y; Bamisile O; Huang Q
    ISA Trans; 2023 Dec; 143():440-457. PubMed ID: 37867022
    [TBL] [Abstract][Full Text] [Related]  

  • 25. A survey on attack detection, estimation and control of industrial cyber-physical systems.
    Zhang D; Wang QG; Feng G; Shi Y; Vasilakos AV
    ISA Trans; 2021 Oct; 116():1-16. PubMed ID: 33581894
    [TBL] [Abstract][Full Text] [Related]  

  • 26. ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.
    Chen YR; Wang Y; Huang GR; Li JE
    ISA Trans; 2023 May; 136():1-15. PubMed ID: 36357220
    [TBL] [Abstract][Full Text] [Related]  

  • 27. GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
    Le TD; Ge M; Anwar A; Loke SW; Beuran R; Doss R; Tan Y
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808292
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.
    Housh M; Kadosh N; Haddad J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015800
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Utilising Flow Aggregation to Classify Benign Imitating Attacks.
    Hindy H; Atkinson R; Tachtatzis C; Bayne E; Bures M; Bellekens X
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33806363
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Correlation-Based Anomaly Detection in Industrial Control Systems.
    Jadidi Z; Pal S; Hussain M; Nguyen Thanh K
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772600
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cyber-physical defense in the quantum Era.
    Barbeau M; Garcia-Alfaro J
    Sci Rep; 2022 Feb; 12(1):1905. PubMed ID: 35115576
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
    Ashok A; Hahn A; Govindarasu M
    J Adv Res; 2014 Jul; 5(4):481-9. PubMed ID: 25685516
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Controller Cyber-Attack Detection and Isolation.
    Sztyber-Betley A; Syfert M; Kościelny JM; Górecka Z
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904980
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Operational planning steps in smart electric power delivery system.
    Jayachandran M; Reddy CR; Padmanaban S; Milyani AH
    Sci Rep; 2021 Aug; 11(1):17250. PubMed ID: 34446798
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Sparse Actuator Attack Detection and Identification: A Data-Driven Approach.
    Zhao Z; Xu Y; Li Y; Zhao Y; Wang B; Wen G
    IEEE Trans Cybern; 2023 Jun; 53(6):4054-4064. PubMed ID: 37028391
    [TBL] [Abstract][Full Text] [Related]  

  • 36. CONGO²: Scalable Online Anomaly Detection and Localization in Power Electronics Networks.
    Yu J; Cheng H; Zhang J; Li Q; Wu S; Zhong W; Ye J; Song W; Ma P
    IEEE Internet Things J; 2022 Aug; 9(15):13862-13875. PubMed ID: 36712176
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.
    Al Abdulwahid A
    Comput Intell Neurosci; 2022; 2022():2037954. PubMed ID: 36479020
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
    Dutta V; Choraś M; Pawlicki M; Kozik R
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824187
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.