These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

127 related articles for article (PubMed ID: 38543991)

  • 1.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38543991
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177558
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Improved Mutual Information Feature Selection Technique for Intrusion Detection Systems in the Internet of Medical Things.
    Alalhareth M; Hong SC
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430886
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 5. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.
    Davies SR; Macfarlane R; Buchanan WJ
    Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420524
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Effective Self-Configurable Ransomware Prevention Technique for IoMT.
    Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ
    Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis.
    Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D
    Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier.
    Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T
    Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
    Almomani I; Alkhayer A; El-Shafai W
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms.
    Herrera-Silva JA; Hernández-Álvarez M
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption.
    Lee J; Lee SY; Yim K; Lee K
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430642
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
    Bang J; Kim JN; Lee S
    Sensors (Basel); 2024 Feb; 24(5):. PubMed ID: 38474982
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services.
    Lee K; Lee J; Lee SY; Yim K
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Combatting ransomware in ZephyrOS-activated industrial IoT environments.
    Tariq U
    Heliyon; 2024 May; 10(9):e29917. PubMed ID: 38694103
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments.
    Fernández Maimó L; Huertas Celdrán A; Perales Gómez ÁL; García Clemente FJ; Weimer J; Lee I
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30841592
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms.
    Lee J; Lee K
    Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Ransomware and the Robin Hood effect?: Experimental evidence on Americans' willingness to support cyber-extortion.
    Haner M; Sloan MM; Graham A; Pickett JT; Cullen FT
    J Exp Criminol; 2022 Jun; ():1-28. PubMed ID: 35729977
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Kullback-Liebler divergence-based representation algorithm for malware detection.
    Aboaoja FA; Zainal A; Ghaleb FA; Alghamdi NS; Saeed F; Alhuwayji H
    PeerJ Comput Sci; 2023; 9():e1492. PubMed ID: 37810364
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021.
    Neprash HT; McGlave CC; Cross DA; Virnig BA; Puskarich MA; Huling JD; Rozenshtein AZ; Nikpay SS
    JAMA Health Forum; 2022 Dec; 3(12):e224873. PubMed ID: 36580326
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.