These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Lee J; Lee K Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533 [TBL] [Abstract][Full Text] [Related]
3. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Lee K; Lee J; Lee SY; Yim K Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730 [TBL] [Abstract][Full Text] [Related]
5. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452 [TBL] [Abstract][Full Text] [Related]
6. Ransomware: Analysing the Impact on Windows Active Directory Domain Services. McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699 [TBL] [Abstract][Full Text] [Related]
7. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas. Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557 [TBL] [Abstract][Full Text] [Related]
8. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671 [TBL] [Abstract][Full Text] [Related]
9. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook. Alqahtani A; Sheldon FT Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983 [TBL] [Abstract][Full Text] [Related]
10. Encrypted audio dataset based on the Collatz conjecture. Renza D; Mendoza S; Ballesteros L DM Data Brief; 2019 Oct; 26():104537. PubMed ID: 31667298 [TBL] [Abstract][Full Text] [Related]
11. An Effective Self-Configurable Ransomware Prevention Technique for IoMT. Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214 [TBL] [Abstract][Full Text] [Related]
12. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms. Herrera-Silva JA; Hernández-Álvarez M Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092 [TBL] [Abstract][Full Text] [Related]
13. Secure transmission of urologic images and records over the Internet. Kuo RL; Aslan P; Dinlenc CZ; Lee BR; Screnci D; Babayan RK; Kavoussi LR; Preminger GM J Endourol; 1999 Apr; 13(3):141-6. PubMed ID: 10360490 [TBL] [Abstract][Full Text] [Related]
14. On the classification of Microsoft-Windows ransomware using hardware profile. Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011 [TBL] [Abstract][Full Text] [Related]
15. Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021. Neprash HT; McGlave CC; Cross DA; Virnig BA; Puskarich MA; Huling JD; Rozenshtein AZ; Nikpay SS JAMA Health Forum; 2022 Dec; 3(12):e224873. PubMed ID: 36580326 [TBL] [Abstract][Full Text] [Related]
16. Classification of ransomware using different types of neural networks. Madani H; Ouerdi N; Boumesaoud A; Azizi A Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523 [TBL] [Abstract][Full Text] [Related]
17. Flexible and cost-effective cryptographic encryption algorithm for securing unencrypted database files at rest and in transit. Shaik V; K DN MethodsX; 2022; 9():101924. PubMed ID: 36438858 [TBL] [Abstract][Full Text] [Related]
18. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication. Arumugham S; Rajagopalan S; Rayappan JBB; Amirtharajan R J Biomed Inform; 2018 Oct; 86():90-105. PubMed ID: 30149142 [TBL] [Abstract][Full Text] [Related]
19. Complex entropy based encryption and decryption technique for securing medical images. Kumar V; Pathak V; Badal N; Pandey PS; Mishra R; Gupta SK Multimed Tools Appl; 2022; 81(26):37441-37459. PubMed ID: 35912061 [TBL] [Abstract][Full Text] [Related]