These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
119 related articles for article (PubMed ID: 39123906)
1. Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience. Basheer N; Islam S; Alwaheidi MKS; Papastergiou S Sensors (Basel); 2024 Jul; 24(15):. PubMed ID: 39123906 [TBL] [Abstract][Full Text] [Related]
2. Channel Features and API Frequency-Based Transformer Model for Malware Identification. Qian L; Cong L Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257673 [TBL] [Abstract][Full Text] [Related]
3. Deep learning based Sequential model for malware analysis using Windows exe API Calls. Catak FO; Yazı AF; Elezaj O; Ahmed J PeerJ Comput Sci; 2020; 6():e285. PubMed ID: 33816936 [TBL] [Abstract][Full Text] [Related]
4. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Silvestri S; Islam S; Papastergiou S; Tzagkarakis C; Ciampi M Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679446 [TBL] [Abstract][Full Text] [Related]
5. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. Kumar R; Subbiah G Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413 [TBL] [Abstract][Full Text] [Related]
6. A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm. Hashmi A; Barukab OM; Hamza Osman A PLoS One; 2024; 19(5):e0302294. PubMed ID: 38781186 [TBL] [Abstract][Full Text] [Related]
7. AMDDLmodel: Android smartphones malware detection using deep learning model. Aamir M; Iqbal MW; Nosheen M; Ashraf MU; Shaf A; Almarhabi KA; Alghamdi AM; Bahaddad AA PLoS One; 2024; 19(1):e0296722. PubMed ID: 38241330 [TBL] [Abstract][Full Text] [Related]
8. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response. Ilca LF; Lucian OP; Balan TC Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571540 [TBL] [Abstract][Full Text] [Related]
9. Modeling Threats to AI-ML Systems Using STRIDE. Mauri L; Damiani E Sensors (Basel); 2022 Sep; 22(17):. PubMed ID: 36081121 [TBL] [Abstract][Full Text] [Related]
10. Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study. Chatterjee A; Prinz A Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270850 [TBL] [Abstract][Full Text] [Related]
11. Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach. Dobrojevic M; Zivkovic M; Chhabra A; Sani NS; Bacanin N; Mohd Amin M PeerJ Comput Sci; 2023; 9():e1405. PubMed ID: 37409075 [TBL] [Abstract][Full Text] [Related]
12. MiniDeep: A Standalone AI-Edge Platform with a Deep Learning-Based MINI-PC and AI-QSR System. Chen YS; Cheng KH; Hsu CS; Zhang HL Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015736 [TBL] [Abstract][Full Text] [Related]
13. Evaluation of Malware Classification Models for Heterogeneous Data. Bae H Sensors (Basel); 2024 Jan; 24(1):. PubMed ID: 38203154 [TBL] [Abstract][Full Text] [Related]
14. Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges. Chen Y; Esmaeilzadeh P J Med Internet Res; 2024 Mar; 26():e53008. PubMed ID: 38457208 [TBL] [Abstract][Full Text] [Related]
15. Vulnerabilities of Connectionist AI Applications: Evaluation and Defense. Berghoff C; Neu M; von Twickel A Front Big Data; 2020; 3():23. PubMed ID: 33693396 [TBL] [Abstract][Full Text] [Related]
16. An ensemble approach for imbalanced multiclass malware classification using 1D-CNN. Panda B; Bisoyi SS; Panigrahy S PeerJ Comput Sci; 2023; 9():e1677. PubMed ID: 38077555 [TBL] [Abstract][Full Text] [Related]
17. Open source software security vulnerability detection based on dynamic behavior features. Li Y; Ma L; Shen L; Lv J; Zhang P PLoS One; 2019; 14(8):e0221530. PubMed ID: 31442278 [TBL] [Abstract][Full Text] [Related]
18. A systematic literature review on the impact of AI models on the security of code generation. Negri-Ribalta C; Geraud-Stewart R; Sergeeva A; Lenzini G Front Big Data; 2024; 7():1386720. PubMed ID: 38803522 [TBL] [Abstract][Full Text] [Related]
19. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. Sahu SK; Mazumdar K Front Artif Intell; 2024; 7():1397480. PubMed ID: 38845684 [TBL] [Abstract][Full Text] [Related]
20. Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity. Aldhyani THH; Alkahtani H Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009899 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]