These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 38474982)

  • 1. Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
    Bang J; Kim JN; Lee S
    Sensors (Basel); 2024 Feb; 24(5):. PubMed ID: 38474982
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
    Lee J; Lee SY; Yim K; Lee K
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430642
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
    Lee J; Lee K
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
    Davies SR; Macfarlane R; Buchanan WJ
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420524
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177558
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
    Lee K; Lee J; Lee SY; Yim K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730
    [TBL] [Abstract][Full Text] [Related]  

  • 7. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier.
    Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T
    Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.
    Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051
    [TBL] [Abstract][Full Text] [Related]  

  • 12. On the classification of Microsoft-Windows ransomware using hardware profile.
    Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA
    PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
    Fernández Maimó L; Huertas Celdrán A; Perales Gómez ÁL; García Clemente FJ; Weimer J; Lee I
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30841592
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.
    Herrera-Silva JA; Hernández-Álvarez M
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092
    [TBL] [Abstract][Full Text] [Related]  

  • 15. RBEF: Ransomware Efficient Public Blockchain Framework for Digital Healthcare Application.
    Lakhan A; Thinnukool O; Groenli TM; Khuwuthyakorn P
    Sensors (Basel); 2023 Jun; 23(11):. PubMed ID: 37299983
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Effective Self-Configurable Ransomware Prevention Technique for IoMT.
    Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Ransomware Recovery and Imaging Operations: Lessons Learned and Planning Considerations.
    Chen PH; Bodak R; Gandhi NS
    J Digit Imaging; 2021 Jun; 34(3):731-740. PubMed ID: 34159418
    [TBL] [Abstract][Full Text] [Related]  

  • 18. On the Application of Entropy Measures with Sliding Window for Intrusion Detection in Automotive In-Vehicle Networks.
    Baldini G
    Entropy (Basel); 2020 Sep; 22(9):. PubMed ID: 33286812
    [TBL] [Abstract][Full Text] [Related]  

  • 19. How to Respond to a Ransomware Attack? One Radiation Oncology Department's Response to a Cyber-Attack on Their Record and Verify System.
    Harrison AS; Sullivan P; Kubli A; Wilson KM; Taylor A; DeGregorio N; Riggs J; Werner-Wasik M; Dicker A; Vinogradskiy Y
    Pract Radiat Oncol; 2022; 12(2):170-174. PubMed ID: 34644601
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.
    Sittig DF; Singh H
    Appl Clin Inform; 2016; 7(2):624-32. PubMed ID: 27437066
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.