These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 37723267)

  • 1. Malicious traffic detection on sampled network flow data with novelty-detection-based models.
    Campazas-Vega A; Crespo-Martínez IS; Guerrero-Higueras ÁM; Álvarez-Aparicio C; Matellán V; Fernández-Llamas C
    Sci Rep; 2023 Sep; 13(1):15446. PubMed ID: 37723267
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Malicious traffic detection combined deep neural network with hierarchical attention mechanism.
    Liu X; Liu J
    Sci Rep; 2021 Jun; 11(1):12363. PubMed ID: 34117338
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models.
    Campazas-Vega A; Crespo-Martínez IS; Guerrero-Higueras ÁM; Fernández-Llamas C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33353086
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review.
    Ji IH; Lee JH; Kang MJ; Park WJ; Jeon SH; Seo JT
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339615
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Detection of Middlebox-Based Attacks in Healthcare Internet of Things Using Multiple Machine Learning Models.
    Al Abdulwahid A
    Comput Intell Neurosci; 2022; 2022():2037954. PubMed ID: 36479020
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.
    Gao M; Ma L; Liu H; Zhang Z; Ning Z; Xu J
    Sensors (Basel); 2020 Mar; 20(5):. PubMed ID: 32155834
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy.
    Zhao Y; Ma D; Liu W
    Entropy (Basel); 2024 Jul; 26(8):. PubMed ID: 39202118
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
    Li T; Ma J; Shen Y; Pei Q
    Entropy (Basel); 2019 Jul; 21(8):. PubMed ID: 33267448
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
    Zhu Y; Zeng J; Weng F; Han D; Yang Y; Li X; Zhang Y
    Sensors (Basel); 2024 Mar; 24(7):. PubMed ID: 38610364
    [TBL] [Abstract][Full Text] [Related]  

  • 11. High-Speed Network DDoS Attack Detection: A Survey.
    Haseeb-Ur-Rehman RMA; Aman AHM; Hasan MK; Ariffin KAZ; Namoun A; Tufail A; Kim KH
    Sensors (Basel); 2023 Aug; 23(15):. PubMed ID: 37571632
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Malicious Network Behavior Detection Using Fusion of Packet Captures Files and Business Feature Data.
    He M; Wang X; Jin L; Dai B; Kacuila K; Xue X
    Sensors (Basel); 2021 Sep; 21(17):. PubMed ID: 34502833
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Anomaly Detection Module for Network Traffic Monitoring in Public Institutions.
    Wawrowski Ł; Białas A; Kajzer A; Kozłowski A; Kurianowicz R; Sikora M; Szymańska-Kwiecień A; Uchroński M; Białczak M; Olejnik M; Michalak M
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991685
    [TBL] [Abstract][Full Text] [Related]  

  • 14. TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM.
    Shi Z; Luktarhan N; Song Y; Yin H
    Entropy (Basel); 2023 May; 25(5):. PubMed ID: 37238576
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cardio-ML: Detection of malicious clinical programmings aimed at cardiac implantable electronic devices based on machine learning and a missing values resemblance framework.
    Levy-Loboda T; Rav-Acha M; Katz A; Nissim N
    Artif Intell Med; 2021 Dec; 122():102200. PubMed ID: 34823834
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Novel Forward-Propagation Workflow Assessment Method for Malicious Packet Detection.
    Balamurugan NM; Kannadasan R; Alsharif MH; Uthansakul P
    Sensors (Basel); 2022 May; 22(11):. PubMed ID: 35684788
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Evaluation of Machine Learning Techniques for Traffic Flow-Based Intrusion Detection.
    Rodríguez M; Alesanco Á; Mehavilla L; García J
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36502028
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Data-Driven Network Analysis for Anomaly Traffic Detection.
    Alam S; Alam Y; Cui S; Akujuobi C
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37837004
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Datasets of RT spoofing attacks on MIL-STD-1553 communication traffic.
    Yahalom R; Barishev D; Steren A; Nameri Y; Roytman M; Porgador A; Elovici Y
    Data Brief; 2019 Apr; 23():103863. PubMed ID: 31372474
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.