These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 37177558)

  • 1. Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177558
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 3. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.
    Herrera-Silva JA; Hernández-Álvarez M
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Classification of ransomware using different types of neural networks.
    Madani H; Ouerdi N; Boumesaoud A; Azizi A
    Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523
    [TBL] [Abstract][Full Text] [Related]  

  • 7. On the classification of Microsoft-Windows ransomware using hardware profile.
    Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA
    PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
    McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
    Fernández Maimó L; Huertas Celdrán A; Perales Gómez ÁL; García Clemente FJ; Weimer J; Lee I
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30841592
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit.
    Shaik V; K DN
    MethodsX; 2022; 9():101924. PubMed ID: 36438858
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier.
    Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T
    Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Security Enhanced Encryption Scheme and Evaluation of Its Cryptographic Security.
    Mihaljević MJ
    Entropy (Basel); 2019 Jul; 21(7):. PubMed ID: 33267415
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
    Lee K; Lee J; Lee SY; Yim K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730
    [TBL] [Abstract][Full Text] [Related]  

  • 14. An Effective Self-Configurable Ransomware Prevention Technique for IoMT.
    Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Face Image Encryption Based on Feature with Optimization Using Secure Crypto General Adversarial Neural Network and Optical Chaotic Map.
    Alsafyani M; Alhomayani F; Alsuwat H; Alsuwat E
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772454
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
    Lee J; Lee K
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Ransomware: Recent advances, analysis, challenges and future research directions.
    Beaman C; Barkworth A; Akande TD; Hakak S; Khan MK
    Comput Secur; 2021 Dec; 111():102490. PubMed ID: 34602684
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Machine-learning attacks on interference-based optical encryption: experimental demonstration.
    Zhou L; Xiao Y; Chen W
    Opt Express; 2019 Sep; 27(18):26143-26154. PubMed ID: 31510474
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.
    Ghadi YY; Alsuhibany SA; Ahmad J; Kumar H; Boulila W; Alsaedi M; Khan K; Bhatti SA
    J Healthc Eng; 2022; 2022():7745132. PubMed ID: 36397885
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Biserial Miyaguchi-Preneel Blockchain-Based Ruzicka-Indexed Deep Perceptive Learning for Malware Detection in IoMT.
    Alotaibi AS
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770424
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.