These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 37449192)

  • 1. A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model.
    Salim DT; Singh MM; Keikhosrokiani P
    Heliyon; 2023 Jul; 9(7):e17156. PubMed ID: 37449192
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework.
    Jabar T; Mahinderjit Singh M
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808159
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation.
    Cheng X; Zhang J; Chen B
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31546845
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.
    Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA
    Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Realguard: A Lightweight Network Intrusion Detection System for IoT Gateways.
    Nguyen XH; Nguyen XD; Huynh HH; Le KH
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062393
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 7. Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.
    Al Abdulwahid A
    Comput Intell Neurosci; 2022; 2022():2037954. PubMed ID: 36479020
    [TBL] [Abstract][Full Text] [Related]  

  • 8. End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.
    Rosenberg I; Sicard G; David EO
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265480
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 10. APT Attack Detection Scheme Based on CK Sketch and DNS Traffic.
    Xue D; Chi Y; Wu B; Zhao L
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850815
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks.
    Abu Al-Haija Q
    Front Big Data; 2021; 4():782902. PubMed ID: 35098112
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.
    Veeraiah D; Mohanty R; Kundu S; Dhabliya D; Tiwari M; Jamal SS; Halifa A
    Comput Intell Neurosci; 2022; 2022():4003403. PubMed ID: 36105640
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024.
    Karim SS; Afzal M; Iqbal W; Abri DA
    Data Brief; 2024 Jun; 54():110290. PubMed ID: 38962199
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A novel approach for APT attack detection based on an advanced computing.
    Xuan CD; Nguyen TT
    Sci Rep; 2024 Sep; 14(1):22223. PubMed ID: 39333649
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.
    Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P
    Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques.
    Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S
    Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.
    Al-Sarem M; Saeed F; Alkhammash EH; Alghamdi NS
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009725
    [TBL] [Abstract][Full Text] [Related]  

  • 18. AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
    Yan G; Li Q; Guo D; Li B
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31330986
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.