These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

242 related articles for article (PubMed ID: 23112632)

  • 1. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.
    Banković Z; Fraga D; Moya JM; Vallejo JC
    Sensors (Basel); 2012; 12(8):10834-50. PubMed ID: 23112632
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
    Chen CL; Lin IH
    Sensors (Basel); 2010; 10(8):7347-70. PubMed ID: 22163606
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Patrol detection for replica attacks on wireless sensor networks.
    Wang LM; Shi Y
    Sensors (Basel); 2011; 11(3):2496-504. PubMed ID: 22163752
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues.
    Ahmad R; Wazirali R; Abu-Ain T
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808227
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
    Gamec J; Basan E; Basan A; Nekrasov A; Fidge C; Sushkin N
    Sensors (Basel); 2021 Sep; 21(18):. PubMed ID: 34577329
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Double cluster heads model for secure and accurate data fusion in wireless sensor networks.
    Fu JS; Liu Y
    Sensors (Basel); 2015 Jan; 15(1):2021-40. PubMed ID: 25608211
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Review on Security Issues and Applications of Trust Mechanism in Wireless Sensor Networks.
    Xia Z; Wei Z; Zhang H
    Comput Intell Neurosci; 2022; 2022():3449428. PubMed ID: 36203716
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Distributed clone detection in static wireless sensor networks: random walk with network division.
    Khan WZ; Aalsalem MY; Saad NM
    PLoS One; 2015; 10(5):e0123069. PubMed ID: 25992913
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks.
    Khan MA; Nasralla MM; Umar MM; Ghani-Ur-Rehman ; Khan S; Choudhury N
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062372
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Energy and Environment-Aware Path Planning in Wireless Sensor Networks with Mobile Sink.
    El-Fouly FH; Altamimi AB; Ramadan RA
    Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560153
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Integrated Intrusion Detection Model of Cluster-Based Wireless Sensor Network.
    Sun X; Yan B; Zhang X; Rong C
    PLoS One; 2015; 10(10):e0139513. PubMed ID: 26447696
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Multi-hop routing-based optimization of the number of cluster-heads in wireless sensor networks.
    Nam CS; Han YS; Shin DR
    Sensors (Basel); 2011; 11(3):2875-84. PubMed ID: 22163771
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Trust-Aware Routing Mechanism through an Edge Node for IoT-Enabled Sensor Networks.
    Saleh A; Joshi P; Rathore RS; Sengar SS
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298173
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A feedback-based secure path approach for wireless sensor network data collection.
    Mao Y; Wei G
    Sensors (Basel); 2010; 10(10):9529-40. PubMed ID: 22163424
    [TBL] [Abstract][Full Text] [Related]  

  • 16. FRCA: a fuzzy relevance-based cluster head selection algorithm for wireless mobile ad-hoc sensor networks.
    Lee C; Jeong T
    Sensors (Basel); 2011; 11(5):5383-401. PubMed ID: 22163905
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
    Adnan AI; Hanapi ZM; Othman M; Zukarnain ZA
    PLoS One; 2017; 12(1):e0170273. PubMed ID: 28121992
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Reputation-based secure sensor localization in wireless sensor networks.
    He J; Xu J; Zhu X; Zhang Y; Zhang T; Fu W
    ScientificWorldJournal; 2014; 2014():308341. PubMed ID: 24982940
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A secure-enhanced data aggregation based on ECC in wireless sensor networks.
    Zhou Q; Yang G; He L
    Sensors (Basel); 2014 Apr; 14(4):6701-21. PubMed ID: 24732099
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A secure cluster-based multipath routing protocol for WMSNs.
    Almalkawi IT; Zapata MG; Al-Karaki JN
    Sensors (Basel); 2011; 11(4):4401-24. PubMed ID: 22163854
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.