These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 36899528)

  • 1. A survey of methods for encrypted network traffic fingerprinting.
    Yu S; Won Y
    Math Biosci Eng; 2023 Jan; 20(2):2183-2202. PubMed ID: 36899528
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
    Ji IH; Lee JH; Kang MJ; Park WJ; Jeon SH; Seo JT
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339615
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning.
    Alwhbi IA; Zou CC; Alharbi RN
    Sensors (Basel); 2024 May; 24(11):. PubMed ID: 38894300
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware.
    Papadogiannaki E; Ioannidis S
    Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33562000
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Deep Encrypted Traffic Detection: An Anomaly Detection Framework for Encryption Traffic Based on Parallel Automatic Feature Extraction.
    Long G; Zhang Z
    Comput Intell Neurosci; 2023; 2023():3316642. PubMed ID: 36936668
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Robot Communication: Network Traffic Classification Based on Deep Neural Network.
    Ge M; Yu X; Liu L
    Front Neurorobot; 2021; 15():648374. PubMed ID: 33815085
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy protection for 3D point cloud classification based on an optical chaotic encryption scheme.
    Liu B; Liu Y; Xie Y; Jiang X; Ye Y; Song T; Chai J; Liu M; Feng M; Yuan H
    Opt Express; 2023 Feb; 31(5):8820-8843. PubMed ID: 36859989
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A novel dataset for encrypted virtual private network traffic analysis.
    Naas M; Fesl J
    Data Brief; 2023 Apr; 47():108945. PubMed ID: 36798601
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Multiuser communication scheme based on binary phase-shift keying and chaos for telemedicine.
    Michel-Macarty JA; Murillo-Escobar MA; López-Gutiérrez RM; Cruz-Hernández C; Cardoza-Avendaño L
    Comput Methods Programs Biomed; 2018 Aug; 162():165-175. PubMed ID: 29903483
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Encrypted Web traffic dataset: Event logs and packet traces.
    Špaček S; Velan P; Čeleda P; Tovarňák D
    Data Brief; 2022 Jun; 42():108188. PubMed ID: 35516003
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure.
    Dawood M; Xiao C; Tu S; Alotaibi FA; Alnfiai MM; Farhan M
    PeerJ Comput Sci; 2024; 10():e2027. PubMed ID: 38855228
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
    Zheng Y; Lu R; Shao J
    J Med Syst; 2019 Mar; 43(5):123. PubMed ID: 30915578
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing.
    Kim YK; Kim HJ; Lee H; Chang JW
    PLoS One; 2022; 17(5):e0267908. PubMed ID: 35511912
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses.
    Huang CJ; Chi CJ; Hung WT
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850754
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Complex entropy based encryption and decryption technique for securing medical images.
    Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK
    Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems.
    Gui R; Yang L; Gui X
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298301
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems.
    Kumari KA; Sharma A; Chakraborty C; Ananyaa M
    Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Private predictive analysis on encrypted medical data.
    Bos JW; Lauter K; Naehrig M
    J Biomed Inform; 2014 Aug; 50():234-43. PubMed ID: 24835616
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Image feature extraction in encrypted domain with privacy-preserving SIFT.
    Hsu CY; Lu CS; Pei SC
    IEEE Trans Image Process; 2012 Nov; 21(11):4593-607. PubMed ID: 22711774
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis.
    Wang G; Gu Y
    Sensors (Basel); 2024 May; 24(10):. PubMed ID: 38793930
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.