These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

111 related articles for article (PubMed ID: 38307898)

  • 21. False Data Injection Detection for Phasor Measurement Units.
    Almasabi S; Alsuwian T; Awais M; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590835
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
    Tahoun AH; Arafa M
    ISA Trans; 2022 Sep; 128(Pt B):294-308. PubMed ID: 34953583
    [TBL] [Abstract][Full Text] [Related]  

  • 23. The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.
    Yu B; Wang Z; Liu S; Liu X; Gou R
    PLoS One; 2020; 15(10):e0237994. PubMed ID: 33027298
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Artificial Intelligence Algorithm-Based Economic Denial of Sustainability Attack Detection Systems: Cloud Computing Environments.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808184
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Detection and defense of active attacks for generating secret key from wireless channels in static environment.
    Huang Y; Jin L; Zhong Z; Lou Y; Zhang S
    ISA Trans; 2020 Apr; 99():231-239. PubMed ID: 31733891
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 29. False Data-Injection Attack Detection in Cyber-Physical Systems With Unknown Parameters: A Deep Reinforcement Learning Approach.
    Liu K; Zhang H; Zhang Y; Sun C
    IEEE Trans Cybern; 2023 Nov; 53(11):7115-7125. PubMed ID: 37015355
    [TBL] [Abstract][Full Text] [Related]  

  • 30. ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.
    Chen YR; Wang Y; Huang GR; Li JE
    ISA Trans; 2023 May; 136():1-15. PubMed ID: 36357220
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
    Kang W; Hu G; Zhu P; Liu Q; Hang Z; Liu X
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29795032
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Combining multi-scale composite windows with hierarchical smoothing strategy for fingerprint orientation field computation.
    Li H; Wang T; Tang Y; Wu J; Yu P; Guo L; Chen J; Zhang Y
    Biomed Eng Online; 2018 Oct; 17(1):136. PubMed ID: 30285765
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance.
    Liu Z; Tang J; Zhao Z; Zhang S
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200372. PubMed ID: 34398648
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Secure Finite-Horizon Consensus Control of Multiagent Systems Against Cyber Attacks.
    Li XM; Yao D; Li P; Meng W; Li H; Lu R
    IEEE Trans Cybern; 2022 Sep; 52(9):9230-9239. PubMed ID: 33729965
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Distributed H
    Sun Y; Ju Y; Ding D; Liu H
    ISA Trans; 2023 Oct; 141():113-120. PubMed ID: 37156690
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Adaptive control of a class of strict feedback nonlinear systems under replay attacks.
    Huang J; Zhao L; Wang QG
    ISA Trans; 2020 Dec; 107():134-142. PubMed ID: 32873375
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks.
    Khan J; Lim DW; Kim YS
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050613
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Detection and Identification of Cyber and Physical Attacks on Distribution Power Grids with PVs: An Online High-Dimensional Data-driven Approach.
    Li F; Xie R; Yang B; Guo L; Ma P; Shi J; Ye J; Song W
    IEEE J Emerg Sel Top Power Electron; 2022 Feb; 10(1):1282-1291. PubMed ID: 36090809
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A robust intelligent zero-day cyber-attack detection technique.
    Kumar V; Sinha D
    Complex Intell Systems; 2021; 7(5):2211-2234. PubMed ID: 34777966
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Multi-attack and multi-classification intrusion detection for vehicle-mounted networks based on mosaic-coded convolutional neural network.
    Hu R; Wu Z; Xu Y; Lai T
    Sci Rep; 2022 Apr; 12(1):6295. PubMed ID: 35428746
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.