These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 38339557)

  • 21. A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization.
    Ullah F; Srivastava G; Ullah S
    J Cloud Comput (Heidelb); 2022; 11(1):75. PubMed ID: 36345308
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Computer-assisted instruction of arrhythmia for MS-windows.
    Takeuchi A; Nara Y; Ikeda N; Miyahara H; Mitobe H
    Medinfo; 1995; 8 Pt 2():1230. PubMed ID: 8591414
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Efficient Windows malware identification and classification scheme for plant protection information systems.
    Chen Z; Xing S; Ren X
    Front Plant Sci; 2023; 14():1123696. PubMed ID: 37152181
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Obfuscation of Embedded Codes in Additive Manufactured Components for Product Authentication.
    Chen F; Yu JH; Gupta N
    Adv Eng Mater; 2019 Aug; 21(8):. PubMed ID: 31178660
    [TBL] [Abstract][Full Text] [Related]  

  • 25. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671
    [TBL] [Abstract][Full Text] [Related]  

  • 26. TagSeq: Malicious behavior discovery using dynamic analysis.
    Huang YT; Sun YS; Chen MC
    PLoS One; 2022; 17(5):e0263644. PubMed ID: 35576222
    [TBL] [Abstract][Full Text] [Related]  

  • 27. MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS.
    Zhao Y; Kuerban A
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991771
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Malware Detection of Hangul Word Processor Files Using Spatial Pyramid Average Pooling.
    Jeong YS; Woo J; Lee S; Kang AR
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32942607
    [TBL] [Abstract][Full Text] [Related]  

  • 29. An Efficient DenseNet-Based Deep Learning Model for Malware Detection.
    Hemalatha J; Roseline SA; Geetha S; Kadry S; Damaševičius R
    Entropy (Basel); 2021 Mar; 23(3):. PubMed ID: 33804035
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Cyber Code Intelligence for Android Malware Detection.
    Qiu J; Han QL; Luo W; Pan L; Nepal S; Zhang J; Xiang Y
    IEEE Trans Cybern; 2023 Jan; 53(1):617-627. PubMed ID: 35476561
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Homology analysis of malware based on ensemble learning and multifeatures.
    Xue D; Li J; Wu W; Tian Q; Wang J
    PLoS One; 2019; 14(8):e0211373. PubMed ID: 31449533
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A reference database of Windows artifacts for file-wiping tool execution analysis.
    Joo D; Lee J; Jeong D
    J Forensic Sci; 2023 May; 68(3):856-870. PubMed ID: 37017258
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Attention-Based Automated Feature Extraction for Malware Analysis.
    Choi S; Bae J; Lee C; Kim Y; Kim J
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32443750
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Study on an efficient hyper-chaos-based image encryption scheme using global bit permutation.
    Zhang J; Lu Z; Li M
    Technol Health Care; 2020; 28(S1):303-309. PubMed ID: 32364162
    [TBL] [Abstract][Full Text] [Related]  

  • 35. In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes.
    McDown RJ; Varol C; Carvajal L; Chen L
    J Forensic Sci; 2016 Jan; 61 Suppl 1():S110-6. PubMed ID: 27405017
    [TBL] [Abstract][Full Text] [Related]  

  • 36. File-level malware detection using byte streams.
    Jeong YS; Mswahili ME; Kang AR
    Sci Rep; 2023 Jun; 13(1):8925. PubMed ID: 37264210
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A malware detection scheme based on mining format information.
    Bai J; Wang J; Zou G
    ScientificWorldJournal; 2014; 2014():260905. PubMed ID: 24991639
    [TBL] [Abstract][Full Text] [Related]  

  • 39. MAD: a suite of tools for microarray data management and processing.
    Liao B; Hale W; Epstein CB; Butow RA; Garner HR
    Bioinformatics; 2000 Oct; 16(10):946-7. PubMed ID: 11120686
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.