These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
116 related articles for article (PubMed ID: 39255289)
1. Vulnerability extraction and prediction method based on improved information gain algorithm. Yang P; Wang X PLoS One; 2024; 19(9):e0309809. PubMed ID: 39255289 [TBL] [Abstract][Full Text] [Related]
2. An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding. Hoque MS; Jamil N; Amin N; Lam KY Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34202977 [TBL] [Abstract][Full Text] [Related]
3. FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm. Fang Y; Liu Y; Huang C; Liu L PLoS One; 2020; 15(2):e0228439. PubMed ID: 32027693 [TBL] [Abstract][Full Text] [Related]
4. Open source software security vulnerability detection based on dynamic behavior features. Li Y; Ma L; Shen L; Lv J; Zhang P PLoS One; 2019; 14(8):e0221530. PubMed ID: 31442278 [TBL] [Abstract][Full Text] [Related]
5. Optimization of a Deep Learning Algorithm for Security Protection of Big Data from Video Images. Geng Q; Yan H; Lu X Comput Intell Neurosci; 2022; 2022():3394475. PubMed ID: 35300398 [TBL] [Abstract][Full Text] [Related]
6. A hybrid feature weighted attention based deep learning approach for an intrusion detection system using the random forest algorithm. Hashmi A; Barukab OM; Hamza Osman A PLoS One; 2024; 19(5):e0302294. PubMed ID: 38781186 [TBL] [Abstract][Full Text] [Related]
7. Network Security Situation Prediction Model Based on EMD and ELPSO Optimized BiGRU Neural Network. Zhang B; Jia M; Xu J; Zhao W; Deng L Comput Intell Neurosci; 2022; 2022():6031129. PubMed ID: 35774431 [TBL] [Abstract][Full Text] [Related]
8. Smart Contract Vulnerability Detection Model Based on Multi-Task Learning. Huang J; Zhou K; Xiong A; Li D Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270976 [TBL] [Abstract][Full Text] [Related]
9. Improved SSD network for fast concealed object detection and recognition in passive terahertz security images. Cheng L; Ji Y; Li C; Liu X; Fang G Sci Rep; 2022 Jul; 12(1):12082. PubMed ID: 35840636 [TBL] [Abstract][Full Text] [Related]
10. A detection method for android application security based on TF-IDF and machine learning. Yuan H; Tang Y; Sun W; Liu L PLoS One; 2020; 15(9):e0238694. PubMed ID: 32915836 [TBL] [Abstract][Full Text] [Related]
11. A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm. Han Y; Wang P; Kang C; Lin J; Fan W Heliyon; 2024 Jun; 10(12):e31846. PubMed ID: 38952363 [TBL] [Abstract][Full Text] [Related]
12. Development of Network Security Based on the Neural Network PSD Algorithm. Li J; Ji S; Jiang Y Comput Intell Neurosci; 2022; 2022():9460985. PubMed ID: 36211000 [TBL] [Abstract][Full Text] [Related]
13. A Novel Smart Contract Vulnerability Detection Method Based on Information Graph and Ensemble Learning. Zhang L; Wang J; Wang W; Jin Z; Zhao C; Cai Z; Chen H Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591270 [TBL] [Abstract][Full Text] [Related]
14. Security Analysis of Social Network Topic Mining Using Big Data and Optimized Deep Convolutional Neural Network. Tang K; Zeng C; Fu Y; Zhu G Comput Intell Neurosci; 2022; 2022():8045968. PubMed ID: 36188706 [TBL] [Abstract][Full Text] [Related]
16. Information System Security Evaluation Algorithm Based on PSO-BP Neural Network. Zheng Q Comput Intell Neurosci; 2021; 2021():6046757. PubMed ID: 34456994 [TBL] [Abstract][Full Text] [Related]
17. Multimedia Security Situation Prediction Based on Optimization of Radial Basis Function Neural Network Algorithm. Chen G Comput Intell Neurosci; 2022; 2022():6314262. PubMed ID: 35432511 [TBL] [Abstract][Full Text] [Related]
18. Public Security Video Image Detection System Construction Platform in Cloud Computing Environment. Yin H Comput Intell Neurosci; 2022; 2022():4113803. PubMed ID: 35186061 [TBL] [Abstract][Full Text] [Related]
19. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach. Kumar R; Subbiah G Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413 [TBL] [Abstract][Full Text] [Related]
20. A new method of software vulnerability detection based on a quantum neural network. Zhou X; Pang J; Yue F; Liu F; Guo J; Liu W; Song Z; Shu G; Xia B; Shan Z Sci Rep; 2022 May; 12(1):8053. PubMed ID: 35577855 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]