These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
133 related articles for article (PubMed ID: 38129492)
1. Stochastic forecasting of variable small data as a basis for analyzing an early stage of a cyber epidemic. Kovtun V; Grochla K; Kharchenko V; Haq MA; Semenov A Sci Rep; 2023 Dec; 13(1):22810. PubMed ID: 38129492 [TBL] [Abstract][Full Text] [Related]
2. Entropy-extreme model for predicting the development of cyber epidemics at early stages. Kovtun V; Grochla K; Al-Maitah M; Aldosary S; Kempa W Comput Struct Biotechnol J; 2024 Dec; 24():593-602. PubMed ID: 39297161 [TBL] [Abstract][Full Text] [Related]
3. Parameterization of the Stochastic Model for Evaluating Variable Small Data in the Shannon Entropy Basis. Bisikalo O; Kharchenko V; Kovtun V; Krak I; Pavlov S Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832553 [TBL] [Abstract][Full Text] [Related]
4. Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks. Kovtun V; Izonin I; Gregus M Sci Rep; 2022 Jul; 12(1):12849. PubMed ID: 35896812 [TBL] [Abstract][Full Text] [Related]
5. Small Stochastic Data Compactification Concept Justified in the Entropy Basis. Kovtun V; Zaitseva E; Levashenko V; Grochla K; Kovtun O Entropy (Basel); 2023 Nov; 25(12):. PubMed ID: 38136447 [TBL] [Abstract][Full Text] [Related]
6. Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks. Oughton EJ; Ralph D; Pant R; Leverett E; Copic J; Thacker S; Dada R; Ruffle S; Tuveson M; Hall JW Risk Anal; 2019 Sep; 39(9):2012-2031. PubMed ID: 30812052 [TBL] [Abstract][Full Text] [Related]
7. Entropy-metric estimation of the small data models with stochastic parameters. Kovtun V; Altameem T; Al-Maitah M; Kempa W Heliyon; 2024 Jan; 10(2):e24708. PubMed ID: 38298719 [TBL] [Abstract][Full Text] [Related]
8. Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks. Li ZM; Xiong J ISA Trans; 2022 Feb; 121():53-62. PubMed ID: 33858663 [TBL] [Abstract][Full Text] [Related]
9. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions. Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180 [TBL] [Abstract][Full Text] [Related]
10. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning. Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959 [TBL] [Abstract][Full Text] [Related]
11. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Achaal B; Adda M; Berger M; Ibrahim H; Awde A Cybersecur (Singap); 2024; 7(1):10. PubMed ID: 38707764 [TBL] [Abstract][Full Text] [Related]
12. A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes. Basan E; Basan A; Nekrasov A; Fidge C; Gamec J; Gamcová M Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33450837 [TBL] [Abstract][Full Text] [Related]
13. A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System. Huda S; Islam MR; Abawajy J; Kottala VNV; Ahmad S Sensors (Basel); 2024 Aug; 24(16):. PubMed ID: 39204976 [TBL] [Abstract][Full Text] [Related]
14. Fitting stochastic epidemic models to gene genealogies using linear noise approximation. Tang M; Dudas G; Bedford T; Minin VN Ann Appl Stat; 2023 Mar; 17(1):1-22. PubMed ID: 37273682 [TBL] [Abstract][Full Text] [Related]
15. SpatialWavePredict: a tutorial-based primer and toolbox for forecasting growth trajectories using the ensemble spatial wave sub-epidemic modeling framework. Chowell G; Tariq A; Dahal S; Bleichrodt A; Luo R; Hyman JM BMC Med Res Methodol; 2024 Jun; 24(1):131. PubMed ID: 38849766 [TBL] [Abstract][Full Text] [Related]
16. Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks. Wu J; Peng C; Zhang J; Yang M; Zhang BL ISA Trans; 2020 Sep; 104():84-92. PubMed ID: 31097192 [TBL] [Abstract][Full Text] [Related]
17. Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs. Manzoor J; Waleed A; Jamali AF; Masood A PLoS One; 2024; 19(3):e0301183. PubMed ID: 38547149 [TBL] [Abstract][Full Text] [Related]
18. An Improved Load Forecasting Method Based on the Transfer Learning Structure under Cyber-Threat Condition. Zhao L; Zhang X; Chen Y; Peng X; Cao Y Comput Intell Neurosci; 2022; 2022():1696663. PubMed ID: 36059426 [TBL] [Abstract][Full Text] [Related]