These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 37420524)

  • 1. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
    Davies SR; Macfarlane R; Buchanan WJ
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420524
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
    Lee J; Lee K
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
    Lee K; Lee J; Lee SY; Yim K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177558
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
    McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.
    Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P
    Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557
    [TBL] [Abstract][Full Text] [Related]  

  • 8. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Encrypted audio dataset based on the Collatz conjecture.
    Renza D; Mendoza S; Ballesteros L DM
    Data Brief; 2019 Oct; 26():104537. PubMed ID: 31667298
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Effective Self-Configurable Ransomware Prevention Technique for IoMT.
    Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.
    Herrera-Silva JA; Hernández-Álvarez M
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Secure transmission of urologic images and records over the Internet.
    Kuo RL; Aslan P; Dinlenc CZ; Lee BR; Screnci D; Babayan RK; Kavoussi LR; Preminger GM
    J Endourol; 1999 Apr; 13(3):141-6. PubMed ID: 10360490
    [TBL] [Abstract][Full Text] [Related]  

  • 14. On the classification of Microsoft-Windows ransomware using hardware profile.
    Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA
    PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021.
    Neprash HT; McGlave CC; Cross DA; Virnig BA; Puskarich MA; Huling JD; Rozenshtein AZ; Nikpay SS
    JAMA Health Forum; 2022 Dec; 3(12):e224873. PubMed ID: 36580326
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Classification of ransomware using different types of neural networks.
    Madani H; Ouerdi N; Boumesaoud A; Azizi A
    Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit.
    Shaik V; K DN
    MethodsX; 2022; 9():101924. PubMed ID: 36438858
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication.
    Arumugham S; Rajagopalan S; Rayappan JBB; Amirtharajan R
    J Biomed Inform; 2018 Oct; 86():90-105. PubMed ID: 30149142
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Complex entropy based encryption and decryption technique for securing medical images.
    Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK
    Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.