206 related articles for article (PubMed ID: 36679406)
21. Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.
Naeem MR; Amin R; Alshamrani SS; Alshehri A
Comput Intell Neurosci; 2022; 2022():6294058. PubMed ID: 35498213
[TBL] [Abstract][Full Text] [Related]
22. Feature Subset Selection for Malware Detection in Smart IoT Platforms.
Abawajy J; Darem A; Alhashmi AA
Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33669191
[TBL] [Abstract][Full Text] [Related]
23. Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.
Kose NA; Jinad R; Rasheed A; Shashidhar N; Baza M; Alshahrani H
Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339700
[TBL] [Abstract][Full Text] [Related]
24. Deep Feature Extraction and Classification of Android Malware Images.
Singh J; Thakur D; Ali F; Gera T; Kwak KS
Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33302430
[TBL] [Abstract][Full Text] [Related]
25. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
Kumar R; Subbiah G
Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
[TBL] [Abstract][Full Text] [Related]
26. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
Nahmias D; Cohen A; Nissim N; Elovici Y
Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
[TBL] [Abstract][Full Text] [Related]
27. An intelligent identification and classification system for malicious uniform resource locators (URLs).
Abu Al-Haija Q; Al-Fayoumi M
Neural Comput Appl; 2023 Apr; ():1-17. PubMed ID: 37362563
[TBL] [Abstract][Full Text] [Related]
28. A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
Ullah F; Srivastava G; Ullah S
J Cloud Comput (Heidelb); 2022; 11(1):75. PubMed ID: 36345308
[TBL] [Abstract][Full Text] [Related]
29. Can Predictive Modeling Tools Identify Patients at High Risk of Prolonged Opioid Use After ACL Reconstruction?
Anderson AB; Grazal CF; Balazs GC; Potter BK; Dickens JF; Forsberg JA
Clin Orthop Relat Res; 2020 Jul; 478(7):0-1618. PubMed ID: 32282466
[TBL] [Abstract][Full Text] [Related]
30. Machine learning algorithms for outcome prediction in (chemo)radiotherapy: An empirical comparison of classifiers.
Deist TM; Dankers FJWM; Valdes G; Wijsman R; Hsu IC; Oberije C; Lustberg T; van Soest J; Hoebers F; Jochems A; El Naqa I; Wee L; Morin O; Raleigh DR; Bots W; Kaanders JH; Belderbos J; Kwint M; Solberg T; Monshouwer R; Bussink J; Dekker A; Lambin P
Med Phys; 2018 Jul; 45(7):3449-3459. PubMed ID: 29763967
[TBL] [Abstract][Full Text] [Related]
31. Explainable Malware Detection System Using Transformers-Based Transfer Learning and Multi-Model Visual Representation.
Ullah F; Alsirhani A; Alshahrani MM; Alomari A; Naeem H; Shah SA
Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146112
[TBL] [Abstract][Full Text] [Related]
32. PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection.
Mahindru A; Arora H; Kumar A; Gupta SK; Mahajan S; Kadry S; Kim J
Sci Rep; 2024 May; 14(1):10724. PubMed ID: 38730228
[TBL] [Abstract][Full Text] [Related]
33. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
[TBL] [Abstract][Full Text] [Related]
34. Biserial Miyaguchi-Preneel Blockchain-Based Ruzicka-Indexed Deep Perceptive Learning for Malware Detection in IoMT.
Alotaibi AS
Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770424
[TBL] [Abstract][Full Text] [Related]
35. Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.
Naeem H; Alshammari BM; Ullah F
Comput Intell Neurosci; 2022; 2022():7671967. PubMed ID: 35875737
[TBL] [Abstract][Full Text] [Related]
36. Convolution neural network with batch normalization and inception-residual modules for Android malware classification.
Liu T; Zhang H; Long H; Shi J; Yao Y
Sci Rep; 2022 Aug; 12(1):13996. PubMed ID: 35978023
[TBL] [Abstract][Full Text] [Related]
37. Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Ullah F; Ullah S; Naeem MR; Mostarda L; Rho S; Cheng X
Sensors (Basel); 2022 Aug; 22(15):. PubMed ID: 35957440
[TBL] [Abstract][Full Text] [Related]
38. An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques.
Albishry N; AlGhamdi R; Almalawi A; Khan AI; Kshirsagar PR; BaruDebtera
Comput Intell Neurosci; 2022; 2022():5061059. PubMed ID: 35510059
[TBL] [Abstract][Full Text] [Related]
39. An ensemble classification method based on machine learning models for malicious Uniform Resource Locators (URL).
Sankaranarayanan S; Sivachandran AT; Mohd Khairuddin AS; Hasikin K; Wahab Sait AR
PLoS One; 2024; 19(5):e0302196. PubMed ID: 38820435
[TBL] [Abstract][Full Text] [Related]
40. Artificial intelligence-driven malware detection framework for internet of things environment.
Alsubai S; Dutta AK; Alnajim AM; Wahab Sait AR; Ayub R; AlShehri AM; Ahmad N
PeerJ Comput Sci; 2023; 9():e1366. PubMed ID: 37346520
[TBL] [Abstract][Full Text] [Related]
[Previous] [Next] [New Search]