These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 38543991)

  • 41. How to Respond to a Ransomware Attack? One Radiation Oncology Department's Response to a Cyber-Attack on Their Record and Verify System.
    Harrison AS; Sullivan P; Kubli A; Wilson KM; Taylor A; DeGregorio N; Riggs J; Werner-Wasik M; Dicker A; Vinogradskiy Y
    Pract Radiat Oncol; 2022; 12(2):170-174. PubMed ID: 34644601
    [TBL] [Abstract][Full Text] [Related]  

  • 42. IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection.
    Alqahtani M; Mathkour H; Ben Ismail MM
    Sensors (Basel); 2020 Nov; 20(21):. PubMed ID: 33172023
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs.
    Talaei Khoei T; Ismail S; Kaabouch N
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062623
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security.
    Krishnasamy S; Alotaibi MB; Alehaideb LI; Abbas Q
    Sensors (Basel); 2023 Nov; 23(22):. PubMed ID: 38005679
    [TBL] [Abstract][Full Text] [Related]  

  • 45. A variable selection method based on mutual information and variance inflation factor.
    Cheng J; Sun J; Yao K; Xu M; Cao Y
    Spectrochim Acta A Mol Biomol Spectrosc; 2022 Mar; 268():120652. PubMed ID: 34896682
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Input feature selection for classification problems.
    Kwak N; Choi CH
    IEEE Trans Neural Netw; 2002; 13(1):143-59. PubMed ID: 18244416
    [TBL] [Abstract][Full Text] [Related]  

  • 47. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model.
    Sharma RK; Issac B; Xin Q; Gadekallu TR; Nath K
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420729
    [TBL] [Abstract][Full Text] [Related]  

  • 48. Classification of ransomware using different types of neural networks.
    Madani H; Ouerdi N; Boumesaoud A; Azizi A
    Sci Rep; 2022 Mar; 12(1):4770. PubMed ID: 35306523
    [TBL] [Abstract][Full Text] [Related]  

  • 49. An ontology-driven framework for knowledge representation of digital extortion attacks.
    Keshavarzi M; Ghaffary HR
    Comput Human Behav; 2023 Feb; 139():107520. PubMed ID: 36268220
    [TBL] [Abstract][Full Text] [Related]  

  • 50. A Novel Feature-Selection Algorithm in IoT Networks for Intrusion Detection.
    Nazir A; Memon Z; Sadiq T; Rahman H; Khan IU
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836983
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals.
    van Boven LS; Kusters RWJ; Tin D; van Osch FHM; De Cauwer H; Ketelings L; Rao M; Dameff C; Barten DG
    Ann Emerg Med; 2024 Jan; 83(1):46-56. PubMed ID: 37318433
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Normalized effect size (NES): a novel feature selection model for Urdu fake news classification.
    Wasim M; Cheema SM; Pires IM
    PeerJ Comput Sci; 2023; 9():e1612. PubMed ID: 38077597
    [TBL] [Abstract][Full Text] [Related]  

  • 53. A detection method for android application security based on TF-IDF and machine learning.
    Yuan H; Tang Y; Sun W; Liu L
    PLoS One; 2020; 15(9):e0238694. PubMed ID: 32915836
    [TBL] [Abstract][Full Text] [Related]  

  • 54. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 55. Full Intelligent Cancer Classification of Thermal Breast Images to Assist Physician in Clinical Diagnostic Applications.
    Lashkari A; Pak F; Firouzmand M
    J Med Signals Sens; 2016; 6(1):12-24. PubMed ID: 27014608
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Dynamic Data Infrastructure Security for Interoperable e-Healthcare Systems: A Semantic Feature-Driven NoSQL Intrusion Attack Detection Model.
    Sreejith R; Senthil S
    Biomed Res Int; 2022; 2022():4080199. PubMed ID: 35722459
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Ransomware Recovery and Imaging Operations: Lessons Learned and Planning Considerations.
    Chen PH; Bodak R; Gandhi NS
    J Digit Imaging; 2021 Jun; 34(3):731-740. PubMed ID: 34159418
    [TBL] [Abstract][Full Text] [Related]  

  • 58. An effective detection approach for phishing websites using URL and HTML features.
    Aljofey A; Jiang Q; Rasool A; Chen H; Liu W; Qu Q; Wang Y
    Sci Rep; 2022 May; 12(1):8842. PubMed ID: 35614133
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Robust adaptive filtering algorithms based on (inverse)hyperbolic sine function.
    Guan S; Cheng Q; Zhao Y; Biswal B
    PLoS One; 2021; 16(10):e0258155. PubMed ID: 34634059
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.
    Ilca LF; Lucian OP; Balan TC
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571540
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.