These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

123 related articles for article (PubMed ID: 38339557)

  • 1. UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0.
    Choi S; Chang T; Park Y
    Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339557
    [TBL] [Abstract][Full Text] [Related]  

  • 2. On the evaluation of android malware detectors against code-obfuscation techniques.
    Nawaz U; Aleem M; Lin JC
    PeerJ Comput Sci; 2022; 8():e1002. PubMed ID: 35875645
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Bypassing Heaven's Gate Technique Using Black-Box Testing.
    Hwang SJ; Utaliyeva A; Kim JS; Choi YH
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067790
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The rise of obfuscated Android malware and impacts on detection methods.
    Elsersy WF; Feizollah A; Anuar NB
    PeerJ Comput Sci; 2022; 8():e907. PubMed ID: 35494876
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Memory snapshot dataset of a compromised host with malware using obfuscation evasion techniques.
    Sadek I; Chong P; Rehman SU; Elovici Y; Binder A
    Data Brief; 2019 Oct; 26():104437. PubMed ID: 31528674
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Evaluation and classification of obfuscated Android malware through deep learning using ensemble voting mechanism.
    Aurangzeb S; Aleem M
    Sci Rep; 2023 Feb; 13(1):3093. PubMed ID: 36813846
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An ensemble approach for imbalanced multiclass malware classification using 1D-CNN.
    Panda B; Bisoyi SS; Panigrahy S
    PeerJ Comput Sci; 2023; 9():e1677. PubMed ID: 38077555
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Deep learning based Sequential model for malware analysis using Windows exe API Calls.
    Catak FO; Yazı AF; Elezaj O; Ahmed J
    PeerJ Comput Sci; 2020; 6():e285. PubMed ID: 33816936
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Malware analysis using visualized image matrices.
    Han K; Kang B; Im EG
    ScientificWorldJournal; 2014; 2014():132713. PubMed ID: 25133202
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing.
    Park Y; Choi S; Choi UY; Jin H; Nor NHM; Park Y
    Sci Rep; 2024 Jun; 14(1):14728. PubMed ID: 38926446
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART.
    Na G; Lim J; Lee S; Yi JH
    Sensors (Basel); 2019 Jun; 19(11):. PubMed ID: 31185579
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Forensic analysis of anti-forensic file-wiping tools on Windows.
    AlHarbi R; AlZahrani A; Bhat WA
    J Forensic Sci; 2022 Mar; 67(2):562-587. PubMed ID: 34617280
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

  • 14. NM-Win: a personal computer-based Microsoft Windows front-end to NONMEM IV.
    Vielhaber JP; Barrett JS
    Pharm Res; 1994 May; 11(5):709-14. PubMed ID: 8058641
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Digital Forensics for Malware Classification: An Approach for Binary Code to Pixel Vector Transition.
    Naeem MR; Amin R; Alshamrani SS; Alshehri A
    Comput Intell Neurosci; 2022; 2022():6294058. PubMed ID: 35498213
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model.
    Naeem H; Alshammari BM; Ullah F
    Comput Intell Neurosci; 2022; 2022():7671967. PubMed ID: 35875737
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Malware homology determination using visualized images and feature fusion.
    Zhu X; Huang J; Wang B; Qi C
    PeerJ Comput Sci; 2021; 7():e494. PubMed ID: 33977134
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Windows malware detection based on static analysis with multiple features.
    Yousuf MI; Anwer I; Riasat A; Zia KT; Kim S
    PeerJ Comput Sci; 2023; 9():e1319. PubMed ID: 37346681
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Channel Features and API Frequency-Based Transformer Model for Malware Identification.
    Qian L; Cong L
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257673
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments.
    Nahmias D; Cohen A; Nissim N; Elovici Y
    Neural Netw; 2020 Apr; 124():243-257. PubMed ID: 32028053
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.