These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 38543991)

  • 21. Ransomware: Recent advances, analysis, challenges and future research directions.
    Beaman C; Barkworth A; Akande TD; Hakak S; Khan MK
    Comput Secur; 2021 Dec; 111():102490. PubMed ID: 34602684
    [TBL] [Abstract][Full Text] [Related]  

  • 22. On the classification of Microsoft-Windows ransomware using hardware profile.
    Aurangzeb S; Rais RNB; Aleem M; Islam MA; Iqbal MA
    PeerJ Comput Sci; 2021; 7():e361. PubMed ID: 33817011
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Erratum: Eyestalk Ablation to Increase Ovarian Maturation in Mud Crabs.
    J Vis Exp; 2023 May; (195):. PubMed ID: 37235796
    [TBL] [Abstract][Full Text] [Related]  

  • 24. An economic analysis of ransomware and its welfare consequences.
    Hernandez-Castro J; Cartwright A; Cartwright E
    R Soc Open Sci; 2020 Mar; 7(3):190023. PubMed ID: 32269778
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
    McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A new feature selection algorithm based on relevance, redundancy and complementarity.
    Li C; Luo X; Qi Y; Gao Z; Lin X
    Comput Biol Med; 2020 Apr; 119():103667. PubMed ID: 32339114
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Normalized mutual information feature selection.
    Estévez PA; Tesmer M; Perez CA; Zurada JM
    IEEE Trans Neural Netw; 2009 Feb; 20(2):189-201. PubMed ID: 19150792
    [TBL] [Abstract][Full Text] [Related]  

  • 28. What happens to rural hospitals during a ransomware attack? Evidence from Medicare data.
    Neprash HT; McGlave CC; Rydberg K; Henning-Smith C
    J Rural Health; 2024 Sep; 40(4):728-737. PubMed ID: 38494590
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Radiation Oncology Ransomware Attack Response Risk Analysis Using Failure Modes and Effects Analysis.
    Vinogradskiy Y; Schubert L; Taylor A; Rudoler S; Lamb J
    Pract Radiat Oncol; 2024; 14(5):e407-e415. PubMed ID: 38508451
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.
    Sittig DF; Singh H
    Appl Clin Inform; 2016; 7(2):624-32. PubMed ID: 27437066
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Vison transformer adapter-based hyperbolic embeddings for multi-lesion segmentation in diabetic retinopathy.
    Wang Z; Lu H; Yan H; Kan H; Jin L
    Sci Rep; 2023 Jul; 13(1):11178. PubMed ID: 37429966
    [TBL] [Abstract][Full Text] [Related]  

  • 32. The business case for ransomware exercises for business and technology teams.
    Weber JA; Mathews VV
    J Bus Contin Emer Plan; 2023 Jan; 16(4):294-303. PubMed ID: 37170451
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Ransomware Attack Associated With Disruptions at Adjacent Emergency Departments in the US.
    Dameff C; Tully J; Chan TC; Castillo EM; Savage S; Maysent P; Hemmen TM; Clay BJ; Longhurst CA
    JAMA Netw Open; 2023 May; 6(5):e2312270. PubMed ID: 37155166
    [TBL] [Abstract][Full Text] [Related]  

  • 34. An Aggregated Mutual Information Based Feature Selection with Machine Learning Methods for Enhancing IoT Botnet Attack Detection.
    Al-Sarem M; Saeed F; Alkhammash EH; Alghamdi NS
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35009725
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure.
    Kalinin M; Zavadskii E; Busygin A
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960424
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Approach for Detecting Attacks on IoT Networks Based on Ensemble Feature Selection and Deep Learning Models.
    Rihan SDA; Anbar M; Alabsi BA
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687798
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Multi-Label Feature Selection with Conditional Mutual Information.
    Wang X; Zhou Y
    Comput Intell Neurosci; 2022; 2022():9243893. PubMed ID: 36254206
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Phishing URLs Detection Using Sequential and Parallel ML Techniques: Comparative Analysis.
    Nagy N; Aljabri M; Shaahid A; Ahmed AA; Alnasser F; Almakramy L; Alhadab M; Alfaddagh S
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050527
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.