These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

179 related articles for article (PubMed ID: 36741076)

  • 1. A Survey of Machine Learning-Based Zero-Day Attack Detection: Challenges and Future Directions.
    Guo Y
    Comput Commun; 2023 Jan; 198():. PubMed ID: 36741076
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A robust intelligent zero-day cyber-attack detection technique.
    Kumar V; Sinha D
    Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
    [TBL] [Abstract][Full Text] [Related]  

  • 3. IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT.
    Ohtani T; Yamamoto R; Ohzahata S
    Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38794075
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers.
    Peppes N; Alexakis T; Adamopoulou E; Demestichas K
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679705
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Intelligent Techniques for Detecting Network Attacks: Review and Research Directions.
    Aljabri M; Aljameel SS; Mohammad RMA; Almotiri SH; Mirza S; Anis FM; Aboulnour M; Alomari DM; Alhamed DH; Altamimi HS
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770375
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Survey on the Security of Low Power Wide Area Networks: Threats, Challenges, and Potential Solutions.
    Adefemi Alimi KO; Ouahada K; Abu-Mahfouz AM; Rimer S
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33066336
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Generator of Slow Denial-of-Service Cyber Attacks.
    Sikora M; Fujdiak R; Kuchar K; Holasova E; Misurec J
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450915
    [TBL] [Abstract][Full Text] [Related]  

  • 10. AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
    Yan G; Li Q; Guo D; Li B
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31330986
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.
    Rodríguez E; Valls P; Otero B; Costa JJ; Verdú J; Pajuelo MA; Canal R
    Sensors (Basel); 2022 Jul; 22(15):. PubMed ID: 35957178
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Network intrusion detection using oversampling technique and machine learning algorithms.
    Ahmed HA; Hameed A; Bawany NZ
    PeerJ Comput Sci; 2022; 8():e820. PubMed ID: 35111914
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Adversarial attacks against supervised machine learning based network intrusion detection systems.
    Alshahrani E; Alghazzawi D; Alotaibi R; Rabie O
    PLoS One; 2022; 17(10):e0275971. PubMed ID: 36240162
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 18. Cardio-ML: Detection of malicious clinical programmings aimed at cardiac implantable electronic devices based on machine learning and a missing values resemblance framework.
    Levy-Loboda T; Rav-Acha M; Katz A; Nissim N
    Artif Intell Med; 2021 Dec; 122():102200. PubMed ID: 34823834
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
    Yao W; Hu L; Hou Y; Li X
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112482
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Data-Driven Network Analysis for Anomaly Traffic Detection.
    Alam S; Alam Y; Cui S; Akujuobi C
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37837004
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.