These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

119 related articles for article (PubMed ID: 38926446)

  • 1. A practical approach for finding anti-debugging routines in the Arm-Linux using hardware tracing.
    Park Y; Choi S; Choi UY; Jin H; Nor NHM; Park Y
    Sci Rep; 2024 Jun; 14(1):14728. PubMed ID: 38926446
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning.
    Kose NA; Jinad R; Rasheed A; Shashidhar N; Baza M; Alshahrani H
    Sensors (Basel); 2024 Feb; 24(3):. PubMed ID: 38339700
    [TBL] [Abstract][Full Text] [Related]  

  • 5. MDABP: A Novel Approach to Detect Cross-Architecture IoT Malware Based on PaaS.
    Zhao Y; Kuerban A
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991771
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Malware Detection in Internet of Things (IoT) Devices Using Deep Learning.
    Riaz S; Latif S; Usman SM; Ullah SS; Algarni AD; Yasin A; Anwar A; Elmannai H; Hussain S
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36502007
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Distributed Architecture for an Integrated Development Environment, Large Trace Analysis, and Visualization.
    Chen Kuang Piao Y; Ezzati-Jivan N; Dagenais MR
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34451000
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Obfuscated Memory Malware Detection in Resource-Constrained IoT Devices for Smart City Applications.
    Shafin SS; Karmakar G; Mareels I
    Sensors (Basel); 2023 Jun; 23(11):. PubMed ID: 37300073
    [TBL] [Abstract][Full Text] [Related]  

  • 9. On the evaluation of android malware detectors against code-obfuscation techniques.
    Nawaz U; Aleem M; Lin JC
    PeerJ Comput Sci; 2022; 8():e1002. PubMed ID: 35875645
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Kullback-Liebler divergence-based representation algorithm for malware detection.
    Aboaoja FA; Zainal A; Ghaleb FA; Alghamdi NS; Saeed F; Alhuwayji H
    PeerJ Comput Sci; 2023; 9():e1492. PubMed ID: 37810364
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Transfer Learning for Image-Based Malware Detection for IoT.
    Panda P; C U OK; Marappan S; Ma S; S M; Veesani Nandi D
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991965
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Malicious Code Detection Method Based on Stacked Depthwise Separable Convolutions and Attention Mechanism.
    Huang H; Du R; Wang Z; Li X; Yuan G
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631621
    [TBL] [Abstract][Full Text] [Related]  

  • 13. OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
    Niu W; Cao R; Zhang X; Ding K; Zhang K; Li T
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610606
    [TBL] [Abstract][Full Text] [Related]  

  • 14. IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
    Victor P; Lashkari AH; Lu R; Sasi T; Xiong P; Iqbal S
    Peer Peer Netw Appl; 2023 May; ():1-52. PubMed ID: 37362097
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Detection of Android Malware in the Internet of Things through the K-Nearest Neighbor Algorithm.
    Babbar H; Rani S; Sah DK; AlQahtani SA; Kashif Bashir A
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631793
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Malicious Code Variant Identification Based on Multiscale Feature Fusion CNNs.
    Wang S; Wang J; Song Y; Li S
    Comput Intell Neurosci; 2021; 2021():1070586. PubMed ID: 34950195
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Improving IoT Botnet Investigation Using an Adaptive Network Layer.
    Ceron JM; Steding-Jessen K; Hoepers C; Granville LZ; Margi CB
    Sensors (Basel); 2019 Feb; 19(3):. PubMed ID: 30754667
    [TBL] [Abstract][Full Text] [Related]  

  • 18. IoT malware detection architecture using a novel channel boosted and squeezed CNN.
    Asam M; Khan SH; Akbar A; Bibi S; Jamal T; Khan A; Ghafoor U; Bhutta MR
    Sci Rep; 2022 Sep; 12(1):15498. PubMed ID: 36109570
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance.
    An Z; Wang W; Li W; Li S; Zhang D
    Micromachines (Basel); 2023 Jul; 14(8):. PubMed ID: 37630061
    [TBL] [Abstract][Full Text] [Related]  

  • 20. White-Hat Worm to Fight Malware and Its Evaluation by Agent-Oriented Petri Nets
    Yamaguchi S
    Sensors (Basel); 2020 Jan; 20(2):. PubMed ID: 31963954
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.