These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
129 related articles for article (PubMed ID: 37050549)
21. Graph neural networks and cross-protocol analysis for detecting malicious IP addresses. Huang Y; Negrete J; Wagener J; Fralick C; Rodriguez A; Peterson E; Wosotowsky A Complex Intell Systems; 2022 Sep; ():1-13. PubMed ID: 36120119 [TBL] [Abstract][Full Text] [Related]
22. CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN. Wang J; Yan X; Liu L; Li L; Yu Y Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890921 [TBL] [Abstract][Full Text] [Related]
23. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312 [TBL] [Abstract][Full Text] [Related]
24. DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT Díaz-Sánchez D; Marín-Lopez A; Almenárez Mendoza F; Arias Cabarcos P Sensors (Basel); 2019 Jul; 19(15):. PubMed ID: 31357487 [TBL] [Abstract][Full Text] [Related]
25. Malicious traffic detection combined deep neural network with hierarchical attention mechanism. Liu X; Liu J Sci Rep; 2021 Jun; 11(1):12363. PubMed ID: 34117338 [TBL] [Abstract][Full Text] [Related]
26. Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data. He M; Wang X; Jin L; Dai B; Kacuila K; Xue X Sensors (Basel); 2021 Sep; 21(17):. PubMed ID: 34502833 [TBL] [Abstract][Full Text] [Related]
28. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. Ji IH; Lee JH; Kang MJ; Park WJ; Jeon SH; Seo JT Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339615 [TBL] [Abstract][Full Text] [Related]
29. A review: a new authentication protocol for real-time healthcare monitoring system. Dewangan K; Mishra M; Dewangan NK Ir J Med Sci; 2021 Aug; 190(3):927-932. PubMed ID: 33145637 [TBL] [Abstract][Full Text] [Related]
30. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol. Gao SY; Li XH; Ma MD Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31766778 [TBL] [Abstract][Full Text] [Related]
33. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection. Al-Sarem M; Saeed F; Alkhammash EH; Alghamdi NS Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009725 [TBL] [Abstract][Full Text] [Related]
34. A Malicious Domain Detection Model Based on Improved Deep Learning. Huang X; Li H; Liu J; Liu F; Wang J; Xie B; Chen B; Zhang Q; Xue T Comput Intell Neurosci; 2022; 2022():9241670. PubMed ID: 35795747 [TBL] [Abstract][Full Text] [Related]
35. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas. Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557 [TBL] [Abstract][Full Text] [Related]
36. Provably Secure Mutual Authentication and Key Agreement Scheme Using PUF in Internet of Drones Deployments. Park Y; Ryu D; Kwon D; Park Y Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850634 [TBL] [Abstract][Full Text] [Related]
37. Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic. Yousefnezhad N; Malhi A; Främling K Sensors (Basel); 2021 Apr; 21(8):. PubMed ID: 33920110 [TBL] [Abstract][Full Text] [Related]
38. Malicious traffic detection on sampled network flow data with novelty-detection-based models. Campazas-Vega A; Crespo-Martínez IS; Guerrero-Higueras ÁM; Álvarez-Aparicio C; Matellán V; Fernández-Llamas C Sci Rep; 2023 Sep; 13(1):15446. PubMed ID: 37723267 [TBL] [Abstract][Full Text] [Related]
39. Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance. An Z; Wang W; Li W; Li S; Zhang D Micromachines (Basel); 2023 Jul; 14(8):. PubMed ID: 37630061 [TBL] [Abstract][Full Text] [Related]
40. Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection. Rodríguez M; Alesanco Á; Mehavilla L; García J Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36502028 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]