Journal articles on the topic 'Endpoint Detection and Response'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Endpoint Detection and Response.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kaur, Harmionee, and Richa Tiwari. "Endpoint detection and response using machine learning." Journal of Physics: Conference Series 2062, no. 1 (2021): 012013. http://dx.doi.org/10.1088/1742-6596/2062/1/012013.
Full textMohammed, Mujtaba, A. Omair Aseel, A. Zowaid Rawan, and S. Ahmed Zaki. "Enhance Cyber Security with EDR and XDR Solutions." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 128–32. https://doi.org/10.5281/zenodo.8285623.
Full textKodituwakku, Angel, and Jens Gregor. "InMesh: A Zero-Configuration Agentless Endpoint Detection and Response System." Electronics 14, no. 7 (2025): 1292. https://doi.org/10.3390/electronics14071292.
Full textShtonda, Roman, Yuliya Chernish, Irina Maltseva, Yurii Tsykalo, Yevhen Chaika, and Serhiy Polishchuk. "PRACTICAL APPROACHES TO CYBER PROTECTION OF MOBILE DEVICES WITH THE HELP OF A SOLUTION ENDPOINT DETECTION AND RESPONSE." Cybersecurity: Education, Science, Technique 1, no. 21 (2023): 17–31. http://dx.doi.org/10.28925/2663-4023.2023.21.1731.
Full textShtonda, Roman, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii, and Pavlo Kutsaiev. "METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 380–89. https://doi.org/10.28925/2663-4023.2025.27.737.
Full textGundaboina, Anjan Kumar. "Endpoint Detection and Response (EDR) in Healthcare: Mitigating Threats on Critical Devices." Journal of Technology and Systems 7, no. 4 (2025): 50–65. https://doi.org/10.47941/jts.2878.
Full textA.Shaji, George, S.Sagayarajan, T.Baskar, and George A.S.Hovan. "Extending Detection and Response: How MXDR Evolves Cybersecurity." Partners Universal International Innovation Journal (PUIIJ) 01, no. 04 (2023): 268–85. https://doi.org/10.5281/zenodo.8284342.
Full textSabeeruddin, shaik. "Impact of Endpoint Detection and Response (EDR) Tools on SOC Efficiency." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 12, no. 5 (2024): 1–6. https://doi.org/10.5281/zenodo.14762654.
Full textPark, So-Hyun, Sun-Woo Yun, So-Eun Jeon, et al. "Performance Evaluation of Open-Source Endpoint Detection and Response Combining Google Rapid Response and Osquery for Threat Detection." IEEE Access 10 (2022): 20259–69. http://dx.doi.org/10.1109/access.2022.3152574.
Full textSholeh, Muchammad, and Almima Monalisa. "MEMBANGUN AGENT ENDPOINT DETECTION AND RESPONSE (EDR) MENGGUNAKAN WAZUH DAN VIRUSTOTAL SEBAGAI SISTEM DETEKSI SERANGAN RANSOMWARE LOCKBIT 3.0." Infotech: Journal of Technology Information 10, no. 2 (2024): 279–88. https://doi.org/10.37365/jti.v10i2.320.
Full textRohith Aitharaju. "Complete EDR coverage: A framework for scalable deployment across enterprise systems." International Journal of Science and Research Archive 13, no. 2 (2024): 1491–501. https://doi.org/10.30574/ijsra.2024.13.2.1129.
Full textSankaram, Mosa, Ms Roopesh, Sasank Rasetti, and Nourin Nishat. "A COMPREHENSIVE REVIEW OF ARTIFICIAL INTELLIGENCE APPLICATIONS IN ENHANCING CYBERSECURITY THREAT DETECTION AND RESPONSE MECHANISMS." GLOBAL MAINSTREAM JOURNAL 3, no. 5 (2024): 1–14. http://dx.doi.org/10.62304/jbedpm.v3i05.180.
Full text. Vivekananda, G. "Malfoyle - A Robust Implementation of Hash-Based Cryptographic Detection Systems and Yara Rule Integration." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43018.
Full textVilas Shewale. "Beyond EDR: Exploring the rise of XDR for unified threat detection and response." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 380–86. https://doi.org/10.30574/wjaets.2025.15.2.0551.
Full textKarantzas, George, and Constantinos Patsakis. "An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors." Journal of Cybersecurity and Privacy 1, no. 3 (2021): 387–421. http://dx.doi.org/10.3390/jcp1030021.
Full textRhode, Matilda, Pete Burnap, and Adam Wedgbury. "Real-Time Malware Process Detection and Automated Process Killing." Security and Communication Networks 2021 (December 6, 2021): 1–23. http://dx.doi.org/10.1155/2021/8933681.
Full textKaur, Harpreet, Dharani Sanjaiy SL, Tirtharaj Paul, et al. "Evolution of Endpoint Detection and Response (EDR) in Cyber Security: A Comprehensive Review." E3S Web of Conferences 556 (2024): 01006. http://dx.doi.org/10.1051/e3sconf/202455601006.
Full textCheng, Shin-Ming, Yi-Ching Lui, Nien-Jen Tsai, and Bing-Kai Hong. "Toward Intelligent IoT Endpoint Detection and Response Using Digital Twins via Firmware Emulation." IEEE Internet of Things Magazine 7, no. 6 (2024): 20–26. http://dx.doi.org/10.1109/iotm.001.2400070.
Full textZhuravchak, Danyil, Valerii Dudykevych, and Anastasiia Tolkachova. "STUDY OF THE STRUCTURE OF THE SYSTEM FOR DETECTING AND PREVENTING RANSOMWARE ATTACKS BASED ON ENDPOINT DETECTION AND RESPONSE." Cybersecurity: Education, Science, Technique 3, no. 19 (2023): 69–82. http://dx.doi.org/10.28925/2663-4023.2023.19.6982.
Full textXia, Shuang, and Guohui Zhou. "Endpoint Effect Suppression Based on Multipoint Extension in Bearing Fault Diagnosis." International Journal of Pattern Recognition and Artificial Intelligence 33, no. 09 (2019): 1950015. http://dx.doi.org/10.1142/s0218001419500150.
Full textShulika, K. M., D. S. Balagura, and Z. M. Sydorenko. "Analysis of methods for bypassing modern EDR endpoint protection systems." Radiotekhnika, no. 217 (June 14, 2024): 64–68. http://dx.doi.org/10.30837/rt.2024.2.217.05.
Full textShulika, Kateryna, Dmytro Balagura, Anton Smirnov, Dmytro Nepokrytov, and Andrii Lytvyn. "A method of using modern endpoint detection and response (EDR) systems to protect against complex attacks." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 2(28) (June 30, 2024): 182–95. http://dx.doi.org/10.30837/2522-9818.2024.2.182.
Full textThomas, S. "Minimized response time of optical emission and mass spectrometric signals for optimized endpoint detection." Journal of Vacuum Science & Technology B: Microelectronics and Nanometer Structures 14, no. 4 (1996): 2531. http://dx.doi.org/10.1116/1.588764.
Full textDr., A.SHAJI GEORGE, GEORGE A.S.HOVAN, T.BASKAR, and Pandey Digvijay. "XDR: The Evolution of Endpoint Security Solutions -Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future." International Journal of Advanced Research in Science, Communication and Technology (IJARSCT) 8, no. 1 (2021): 493–501. https://doi.org/10.5281/zenodo.7028219.
Full textCitterio, Chiara, Claudia Biasini, Camilla Di Nunzio, Giuliana Lo Cascio, and Luigi Cavanna. "Humoral Response and Safety after a Fourth Dose of the SARS-CoV-2 BNT162b2 Vaccine in Cancer Patients Undergoing Active Treatment—Results of a Prospective Observational Study." Vaccines 12, no. 1 (2024): 76. http://dx.doi.org/10.3390/vaccines12010076.
Full textSiji, Fagbohunmi Grifin, and Okafor Patrick Uche. "An improved model for comparing different endpoint detection and response tools for mitigating insider threat." Indian Journal of Engineering 20, no. 53 (2023): 1–13. http://dx.doi.org/10.54905/disssi/v20i53/e22ije1651.
Full textLi, Jinbo, Yuanyuan Li, Min Zhu, Shilin Song, and Zhanfen Qin. "A Multiwell-Based Assay for Screening Thyroid Hormone Signaling Disruptors Using thibz Expression as a Sensitive Endpoint in Xenopus laevis." Molecules 27, no. 3 (2022): 798. http://dx.doi.org/10.3390/molecules27030798.
Full textVaishampayan, Ulka N., Jeremy MG Taylor, Ajjai Shivaram Alva, et al. "Evaluating the clinical utility of circulating tumor cells (CTC) profiling to predict selection of preferred therapeutic regimens in newly diagnosed or pretreated refractory renal cell carcinomas (RCC)." Journal of Clinical Oncology 41, no. 6_suppl (2023): 717. http://dx.doi.org/10.1200/jco.2023.41.6_suppl.717.
Full textNaresh, Kumar Rapolu. "Leveraging Advanced Security Monitoring Tools and Techniques to Detect Vulnerabilities & Potential Security Breaches." Journal of Advances in Developmental Research 13, no. 1 (2022): 1–6. https://doi.org/10.5281/zenodo.14979958.
Full textSavona, Michael R., Ian W. Flinn, Stuart Goldberg, et al. "A single-arm, open-label, multicenter study of complete molecular response (CMR) in patients with newly diagnosed Philadelphia chromosome–positive (Ph+) chronic myeloid leukemia in chronic phase (CML-CP) treated with nilotinib." Journal of Clinical Oncology 30, no. 15_suppl (2012): TPS6636. http://dx.doi.org/10.1200/jco.2012.30.15_suppl.tps6636.
Full textMatheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva, and Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES." International Journal of Advanced Research 10, no. 11 (2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.
Full textMina, Roberto, Stefania Oliva, and Mario Boccadoro. "Minimal Residual Disease in Multiple Myeloma: State of the Art and Future Perspectives." Journal of Clinical Medicine 9, no. 7 (2020): 2142. http://dx.doi.org/10.3390/jcm9072142.
Full textLehominova, Svitlana, and Halyna Haidur. "ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 54–67. http://dx.doi.org/10.28925/2663-4023.2023.22.5467.
Full textTeeguarden, Justin G., Yvonne P. Dragan, and Henry C. Pitot. "Implications of hormesis on the bioassay and hazard assessment of chemical carcinogens." Human & Experimental Toxicology 17, no. 5 (1998): 254–58. http://dx.doi.org/10.1177/096032719801700507.
Full textDr. Vivekananth.P. "Cybersecurity Risks in Remote Working Environment and Strategies to Mitigate Them." International Journal of Engineering and Management Research 12, no. 1 (2022): 108–11. http://dx.doi.org/10.31033/ijemr.12.1.13.
Full textMavire, Sarah, Kumbirai Bernard Muhwati, Naga Kota, and Joy Adesina Awoleye. "Mitigating Ransomware in the Energy and Healthcare Sectors through Layered Defense Strategies." International Journal of Scientific and Management Research 08, no. 04 (2025): 143–66. https://doi.org/10.37502/ijsmr.2025.8609.
Full textHolzer, Anna-Katharina, Ilinca Suciu, Christiaan Karreman, Thomas Goj, and Marcel Leist. "Specific Attenuation of Purinergic Signaling during Bortezomib-Induced Peripheral Neuropathy In Vitro." International Journal of Molecular Sciences 23, no. 7 (2022): 3734. http://dx.doi.org/10.3390/ijms23073734.
Full textAgostinetto, Elisa, David Venet, Paulus Krisanto, et al. "First-line durvalumab plus chemotherapy with or without oleclumab for locally advanced or metastatic triple-negative breast cancer: SYNERGY overall survival and circulating tumor DNA analysis." Journal of Clinical Oncology 43, no. 16_suppl (2025): 1097. https://doi.org/10.1200/jco.2025.43.16_suppl.1097.
Full textSastre, Javier, Jose María Vieitez, Maria Auxilidora Gomez-España, et al. "Randomized phase III study comparing FOLFOX + bevacizumab versus folfoxiri + bevacizumab (BEV) as 1st line treatment in patients with metastatic colorectal cancer (mCRC) with ≥3 baseline circulating tumor cells (bCTCs)." Journal of Clinical Oncology 37, no. 15_suppl (2019): 3507. http://dx.doi.org/10.1200/jco.2019.37.15_suppl.3507.
Full textChatzoglou, Efstratios, and Georgios Kambourakis. "C3: Leveraging the Native Messaging Application Programming Interface for Covert Command and Control." Future Internet 17, no. 4 (2025): 172. https://doi.org/10.3390/fi17040172.
Full textNaidoo, Jarushka, Karisa Schreck, Wei Fu, et al. "788 Pembrolizumab for patients with leptomeningeal metastasis from solid tumors: efficacy, safety and cerebrospinal fluid biomarkers." Journal for ImmunoTherapy of Cancer 8, Suppl 3 (2020): A837. http://dx.doi.org/10.1136/jitc-2020-sitc2020.0788.
Full textOgungbemi, Olumide Samuel, Favour Amarachi Ezeugwa, Oluwaseun Oladeji Olaniyi, Oluwaseun Ibrahim Akinola, and Oluseun Babatunde Oladoyinbo. "Overcoming Remote Workforce Cyber Threats: A Comprehensive Ransomware and Bot Net Defense Strategy Utilizing VPN Networks." Journal of Engineering Research and Reports 26, no. 8 (2024): 161–84. http://dx.doi.org/10.9734/jerr/2024/v26i81237.
Full textLiu, Pengfei, Yukun Li, Ye Tian, et al. "Research on simulation technology of flow and deformation response in gas pipeline." Journal of Physics: Conference Series 3006, no. 1 (2025): 012010. https://doi.org/10.1088/1742-6596/3006/1/012010.
Full textGopalakrishnan, Arjunan. "AI-Powered Cybersecurity: Detecting and Preventing Modern Threat." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 11 (2024): 1949–55. https://doi.org/10.5281/zenodo.14287585.
Full textGolikov, Yuriy, and Yelyzaveta Ostrianska. "RESEARCH ON THE CURRENT STATE AND PROSPECTS OF THE APPLICATION OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY." Computer Science and Cybersecurity, no. 2 (December 30, 2024): 51–65. https://doi.org/10.26565/2519-2310-2024-2-05.
Full textGolikov, Yu L. "Study of the current state and prospects of artificial intelligence in cybersecurity." Radiotekhnika, no. 220 (April 10, 2025): 40–49. https://doi.org/10.30837/rt.2025.1.220.03.
Full textNath, Peuli, Kazi Ridita Mahtaba, and Aniruddha Ray. "Fluorescence-Based Portable Assays for Detection of Biological and Chemical Analytes." Sensors 23, no. 11 (2023): 5053. http://dx.doi.org/10.3390/s23115053.
Full textSepe, Pierangela, Giuseppe Procopio, Umberto Basso, et al. "A phase II study evaluating the efficacy of enzalutamide and the role of ARv7 in metastatic castration-resistant prostate cancer (mCRPC) patients (pts) with visceral disease." Journal of Clinical Oncology 39, no. 15_suppl (2021): 5052. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.5052.
Full textYang, Weidong. "A Bearing Fault Diagnosis Strategy Based on Complete Ensemble Empirical Mode Decomposition with Adaptive Noise and Correlation Coefficient Method." Journal of Engineering System 1, no. 4 (2023): 24–28. http://dx.doi.org/10.62517/jes.202302405.
Full textNeisinger, Sophia. "Chronische induzierbare Urtikaria: Mastzell-Depletion als neuer Therapieansatz." Kompass Dermatologie 13, no. 2 (2025): 74–75. https://doi.org/10.1159/000545441.
Full text