These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

110 related articles for article (PubMed ID: 36741076)

  • 21. A two-stage intrusion detection method based on light gradient boosting machine and autoencoder.
    Zhang H; Ge L; Zhang G; Fan J; Li D; Xu C
    Math Biosci Eng; 2023 Feb; 20(4):6966-6992. PubMed ID: 37161137
    [TBL] [Abstract][Full Text] [Related]  

  • 22. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.
    Aldhaheri S; Alhuzali A
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765852
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier.
    Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T
    Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.
    Negera WG; Schwenker F; Debelee TG; Melaku HM; Ayano YM
    Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560204
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.
    Zahra F; Jhanjhi NZ; Brohi SN; Khan NA; Masud M; AlZain MA
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146111
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808184
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection.
    Rodríguez M; Alesanco Á; Mehavilla L; García J
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36502028
    [TBL] [Abstract][Full Text] [Related]  

  • 28. The Impact of Adversarial Attacks on Federated Learning: A Survey.
    Kumar KN; Mohan CK; Cenkeramaddi LR
    IEEE Trans Pattern Anal Mach Intell; 2024 May; 46(5):2672-2691. PubMed ID: 37812561
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.
    Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Review of Attacks, Vulnerabilities, and Defenses in Industry 4.0 with New Challenges on Data Sovereignty Ahead.
    Pedreira V; Barros D; Pinto P
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372425
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.
    Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S
    Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A Few-Shot Learning-Based Siamese Capsule Network for Intrusion Detection with Imbalanced Training Data.
    Wang ZM; Tian JY; Qin J; Fang H; Chen LM
    Comput Intell Neurosci; 2021; 2021():7126913. PubMed ID: 34557226
    [TBL] [Abstract][Full Text] [Related]  

  • 33. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.
    Li S; Wang J; Wang Y; Zhou G; Zhao Y
    Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009899
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.
    Ramzan M; Shoaib M; Altaf A; Arshad S; Iqbal F; Castilla ÁK; Ashraf I
    Sensors (Basel); 2023 Oct; 23(20):. PubMed ID: 37896735
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A survey on face presentation attack detection mechanisms: hitherto and future perspectives.
    Sharma D; Selwal A
    Multimed Syst; 2023; 29(3):1527-1577. PubMed ID: 37261261
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 38. High-Speed Network DDoS Attack Detection: A Survey.
    Haseeb-Ur-Rehman RMA; Aman AHM; Hasan MK; Ariffin KAZ; Namoun A; Tufail A; Kim KH
    Sensors (Basel); 2023 Aug; 23(15):. PubMed ID: 37571632
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Improving the phishing website detection using empirical analysis of Function Tree and its variants.
    Balogun AO; Adewole KS; Raheem MO; Akande ON; Usman-Hamza FE; Mabayoje MA; Akintola AG; Asaju-Gbolagade AW; Jimoh MK; Jimoh RG; Adeyemo VE
    Heliyon; 2021 Jul; 7(7):e07437. PubMed ID: 34278030
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.