These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

155 related articles for article (PubMed ID: 22454568)

  • 1. Intrusion-aware alert validation algorithm for cooperative distributed intrusion detection schemes of wireless sensor networks.
    Shaikh RA; Jameel H; d'Auriol BJ; Lee H; Lee S; Song YJ
    Sensors (Basel); 2009; 9(8):5989-6007. PubMed ID: 22454568
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm.
    Tan X; Su S; Huang Z; Guo X; Zuo Z; Sun X; Li L
    Sensors (Basel); 2019 Jan; 19(1):. PubMed ID: 30626020
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A distributed signature detection method for detecting intrusions in sensor systems.
    Kim I; Oh D; Yoon MK; Yi K; Ro WW
    Sensors (Basel); 2013 Mar; 13(4):3998-4016. PubMed ID: 23529146
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions in Wireless Sensor Networks.
    Alqahtani M; Gumaei A; Mathkour H; Maher Ben Ismail M
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31658774
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.
    Sun X; Yan B; Zhang X; Rong C
    PLoS One; 2015; 10(10):e0139513. PubMed ID: 26447696
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
    Shi L; Li K
    Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Artificial Intelligence-Driven Intrusion Detection in Software-Defined Wireless Sensor Networks: Towards Secure IoT-Enabled Healthcare Systems.
    Masengo Wa Umba S; Abu-Mahfouz AM; Ramotsoela D
    Int J Environ Res Public Health; 2022 Apr; 19(9):. PubMed ID: 35564763
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks.
    Yan J; Li X; Luo X; Guan X
    Sensors (Basel); 2017 May; 17(5):. PubMed ID: 28531127
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
    Chen CL; Lin IH
    Sensors (Basel); 2010; 10(8):7347-70. PubMed ID: 22163606
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks.
    Wang J; Jiang S; Fapojuwo AO
    Sensors (Basel); 2017 May; 17(6):. PubMed ID: 28555023
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Reliability-Aware Cooperative Node Sleeping and Clustering in Duty-Cycled Sensors Networks.
    Song J; Miao Y; Song E; Hossain MS; Alhamid MF
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29300329
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks.
    Derhab A; Bouras A; Belaoued M; Maglaras L; Khan FA
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33121033
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).
    Shaukat HR; Hashim F; Shaukat MA; Ali Alezabi K
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32316487
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs.
    Liu G; Zhao H; Fan F; Liu G; Xu Q; Nazir S
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214308
    [TBL] [Abstract][Full Text] [Related]  

  • 16. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
    He D; Chen C; Chan S; Bu J; Vasilakos AV
    IEEE Trans Inf Technol Biomed; 2012 Jul; 16(4):623-32. PubMed ID: 22531816
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Intrusion Detection and Prevention in CoAP Wireless Sensor Networks Using Anomaly Detection.
    Granjal J; Silva JM; Lourenço N
    Sensors (Basel); 2018 Jul; 18(8):. PubMed ID: 30060498
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
    Liu C; Li X
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32178445
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Intrusion Detection System CAN-Bus In-Vehicle Networks Based on the Statistical Characteristics of Attacks.
    Khan J; Lim DW; Kim YS
    Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050613
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.