4.6 Article

Intelligent and Dynamic Ransomware Spread Detection and Mitigation in Integrated Clinical Environments

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Dynamic management of a deep learning-based anomaly detection system for 5G networks

Lorenzo Fernandez Maimo et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2019)

Article Engineering, Biomedical

OpenICE medical device interoperability platform overview and requirement analysis

David Arney et al.

BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK (2018)

Article Computer Science, Hardware & Architecture

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics

Krzysztof Cabaj et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Artificial Intelligence

Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory

Aviad Cohen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

Rodrigo Roman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Review Geriatrics & Gerontology

Cybersecurity in healthcare: A narrative review of trends, threats and ways forward

Lynne Coventry et al.

MATURITAS (2018)

Article Engineering, Biomedical

OpenICE medical device interoperability platform overview and requirement analysis

David Arney et al.

BIOMEDICAL ENGINEERING-BIOMEDIZINISCHE TECHNIK (2018)

Proceedings Paper Computer Science, Software Engineering

Machine Learning-Based Detection of Ransomware Using SDN

Greg Cusack et al.

PROCEEDINGS OF THE 2018 ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFVSEC'18) (2018)

Review Computer Science, Theory & Methods

Obstacles in Data Distribution Service Middleware: A Systematic Review

Omer Koksal et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Automated Behavioral Analysis of Malware A Case Study of WannaCry Ransomware

Qian Chen et al.

2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA) (2017)

Article Computer Science, Interdisciplinary Applications

Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare

John A. Stankovic

ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS (2017)

Proceedings Paper Computer Science, Cybernetics

On Threat Modeling and Mitigation of Medical Cyber-Physical Systems

Hussain Almohri et al.

2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE) (2017)

Proceedings Paper Computer Science, Information Systems

Comprehensive Survey on Petya Ransomware Attack

Jagmeet Singh Aidan et al.

2017 INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING AND INFORMATION SYSTEMS (ICNGCIS) (2017)

Article Computer Science, Hardware & Architecture

Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

Krzysztof Cabaj et al.

IEEE NETWORK (2016)

Article Computer Science, Artificial Intelligence

Evaluation of machine learning classifiers for mobile malware detection

Fairuz Amalina Narudin et al.

SOFT COMPUTING (2016)

Proceedings Paper Engineering, Biomedical

Cloud-based Secure Logger For Medical Devices

Hung Nguyen et al.

2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE) (2016)

Review Medical Informatics

Medical Internet of Things and Big Data in Healthcare

Dimiter V. Dimitrov

HEALTHCARE INFORMATICS RESEARCH (2016)

Article Engineering, Electrical & Electronic

Toward an SDN-Enabled NFV Architecture

Jon Matias et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Review Engineering, Biomedical

Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem

Patricia A. H. Williams et al.

MEDICAL DEVICES-EVIDENCE AND RESEARCH (2015)

Article Automation & Control Systems

Model-Driven Safety Analysis of Closed-Loop Medical Systems

Miroslav Pajic et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

Isolation-Based Anomaly Detection

Fei Tony Liu et al.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2012)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)

Article Computer Science, Artificial Intelligence

Estimating the support of a high-dimensional distribution

B Schölkopf et al.

NEURAL COMPUTATION (2001)

Article Computer Science, Information Systems

LOF: Identifying density-based local outliers

MM Breunig et al.

SIGMOD RECORD (2000)