These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

116 related articles for article (PubMed ID: 38962199)

  • 1. Advanced Persistent Threat (APT) and intrusion detection evaluation dataset for linux systems 2024.
    Karim SS; Afzal M; Iqbal W; Abri DA
    Data Brief; 2024 Jun; 54():110290. PubMed ID: 38962199
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework.
    Mohamed N
    F1000Res; 2022; 11():422. PubMed ID: 36226041
    [No Abstract]   [Full Text] [Related]  

  • 3. Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework.
    Bagui S; Mink D; Bagui S; Ghosh T; McElroy T; Paredes E; Khasnavis N; Plenkers R
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298351
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation.
    Cheng X; Zhang J; Chen B
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31546845
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework.
    Georgiadou A; Mouzakitis S; Askounis D
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34065086
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model.
    Salim DT; Singh MM; Keikhosrokiani P
    Heliyon; 2023 Jul; 9(7):e17156. PubMed ID: 37449192
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator.
    Kim K; Shin Y; Lee J; Lee K
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640841
    [TBL] [Abstract][Full Text] [Related]  

  • 8. APT Attack Detection Scheme Based on CK Sketch and DNS Traffic.
    Xue D; Chi Y; Wu B; Zhao L
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850815
    [TBL] [Abstract][Full Text] [Related]  

  • 9. ROSPaCe: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System and IoT Networks.
    Puccetti T; Nardi S; Cinquilli C; Zoppi T; Ceccarelli A
    Sci Data; 2024 May; 11(1):481. PubMed ID: 38729994
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Defending Against Advanced Persistent Threats Using Game-Theory.
    Rass S; König S; Schauer S
    PLoS One; 2017; 12(1):e0168675. PubMed ID: 28045922
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.
    Landman T; Nissim N
    Neural Netw; 2021 Dec; 144():648-685. PubMed ID: 34656885
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A review of threat modelling approaches for APT-style attacks.
    Tatam M; Shanmugam B; Azam S; Kannoorpatti K
    Heliyon; 2021 Jan; 7(1):e05969. PubMed ID: 33506133
    [TBL] [Abstract][Full Text] [Related]  

  • 13. AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats.
    Yan G; Li Q; Guo D; Li B
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31330986
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework.
    Jabar T; Mahinderjit Singh M
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808159
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Flow-Data Gathering Using NetFlow Sensors for Fitting Malicious-Traffic Detection Models.
    Campazas-Vega A; Crespo-Martínez IS; Guerrero-Higueras ÁM; Fernández-Llamas C
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33353086
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework.
    Oruc A; Amro A; Gkioulos V
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433344
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A prospective approach to detect advanced persistent threats: Utilizing hybrid optimization technique.
    Kumari I; Lee M
    Heliyon; 2023 Nov; 9(11):e21377. PubMed ID: 38027863
    [TBL] [Abstract][Full Text] [Related]  

  • 18. End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware.
    Rosenberg I; Sicard G; David EO
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265480
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A novel approach for APT attack detection based on an advanced computing.
    Xuan CD; Nguyen TT
    Sci Rep; 2024 Sep; 14(1):22223. PubMed ID: 39333649
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.