These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. An Improved Mutual Information Feature Selection Technique for Intrusion Detection Systems in the Internet of Medical Things. Alalhareth M; Hong SC Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430886 [TBL] [Abstract][Full Text] [Related]
4. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook. Alqahtani A; Sheldon FT Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983 [TBL] [Abstract][Full Text] [Related]
5. E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177671 [TBL] [Abstract][Full Text] [Related]
7. An Effective Self-Configurable Ransomware Prevention Technique for IoMT. Tariq U; Ullah I; Yousuf Uddin M; Kwon SJ Sensors (Basel); 2022 Nov; 22(21):. PubMed ID: 36366214 [TBL] [Abstract][Full Text] [Related]
8. Android Ransomware Detection Using Supervised Machine Learning Techniques Based on Traffic Analysis. Albin Ahmed A; Shaahid A; Alnasser F; Alfaddagh S; Binagag S; Alqahtani D Sensors (Basel); 2023 Dec; 24(1):. PubMed ID: 38203051 [TBL] [Abstract][Full Text] [Related]
9. Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier. Zahoora U; Khan A; Rajarajan M; Khan SH; Asam M; Jamal T Sci Rep; 2022 Sep; 12(1):15647. PubMed ID: 36123364 [TBL] [Abstract][Full Text] [Related]
10. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Almomani I; Alkhayer A; El-Shafai W Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452 [TBL] [Abstract][Full Text] [Related]
11. Dynamic Feature Dataset for Ransomware Detection Using Machine Learning Algorithms. Herrera-Silva JA; Hernández-Álvarez M Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772092 [TBL] [Abstract][Full Text] [Related]
12. Neutralization Method of Ransomware Detection Technology Using Format Preserving Encryption. Lee J; Lee SY; Yim K; Lee K Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430642 [TBL] [Abstract][Full Text] [Related]
13. Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations. Bang J; Kim JN; Lee S Sensors (Basel); 2024 Feb; 24(5):. PubMed ID: 38474982 [TBL] [Abstract][Full Text] [Related]
14. Effective Ransomware Detection Using Entropy Estimation of Files for Cloud Services. Lee K; Lee J; Lee SY; Yim K Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991730 [TBL] [Abstract][Full Text] [Related]
16. Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments. Fernández Maimó L; Huertas Celdrán A; Perales Gómez ÁL; García Clemente FJ; Weimer J; Lee I Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30841592 [TBL] [Abstract][Full Text] [Related]
17. A Method for Neutralizing Entropy Measurement-Based Ransomware Detection Technologies Using Encoding Algorithms. Lee J; Lee K Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205533 [TBL] [Abstract][Full Text] [Related]
18. Ransomware and the Robin Hood effect?: Experimental evidence on Americans' willingness to support cyber-extortion. Haner M; Sloan MM; Graham A; Pickett JT; Cullen FT J Exp Criminol; 2022 Jun; ():1-28. PubMed ID: 35729977 [TBL] [Abstract][Full Text] [Related]
20. Trends in Ransomware Attacks on US Hospitals, Clinics, and Other Health Care Delivery Organizations, 2016-2021. Neprash HT; McGlave CC; Cross DA; Virnig BA; Puskarich MA; Huling JD; Rozenshtein AZ; Nikpay SS JAMA Health Forum; 2022 Dec; 3(12):e224873. PubMed ID: 36580326 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]