These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

271 related articles for article (PubMed ID: 25521382)

  • 1. A malicious pattern detection engine for embedded security systems in the Internet of Things.
    Oh D; Kim D; Ro WW
    Sensors (Basel); 2014 Dec; 14(12):24188-211. PubMed ID: 25521382
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
    Yeh KH; Su C; Choo KR; Chiu W
    Sensors (Basel); 2017 May; 17(5):. PubMed ID: 28468313
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Lightweight Cipher Based on Salsa20 for Resource-Constrained IoT Devices.
    Lara E; Aguilar L; García JA; Sanchez MA
    Sensors (Basel); 2018 Oct; 18(10):. PubMed ID: 30287774
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.
    Veeraiah D; Mohanty R; Kundu S; Dhabliya D; Tiwari M; Jamal SS; Halifa A
    Comput Intell Neurosci; 2022; 2022():4003403. PubMed ID: 36105640
    [TBL] [Abstract][Full Text] [Related]  

  • 5. False Data Detection for Fog and Internet of Things Networks.
    Fantacci R; Nizzi F; Pecorella T; Pierucci L; Roveri M
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31569552
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
    Kim KW; Han YH; Min SG
    Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Lightweight Continuous Authentication Protocol for the Internet of Things.
    Chuang YH; Lo NW; Yang CY; Tang SW
    Sensors (Basel); 2018 Apr; 18(4):. PubMed ID: 29621168
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Communications for Resource-Constrained IoT Devices.
    Taha AM; Rashwan AM; Hassanein HS
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610438
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure lightweight cryptosystem for IoT and pervasive computing.
    Abutaha M; Atawneh B; Hammouri L; Kaddoum G
    Sci Rep; 2022 Nov; 12(1):19649. PubMed ID: 36385267
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities.
    Li S; Song H; Iqbal M
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31027162
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Device-Based Security to Improve User Privacy in the Internet of Things
    Belem Pacheco LA; Pelinson Alchieri EA; Mendez Barreto PAS
    Sensors (Basel); 2018 Aug; 18(8):. PubMed ID: 30110880
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things.
    Lara E; Aguilar L; Sanchez MA; García JA
    Sensors (Basel); 2020 Jan; 20(2):. PubMed ID: 31963181
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Ontology-Based Cybersecurity Framework for the Internet of Things.
    Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Embracing the Future Internet of Things.
    Cirillo F; Wu FJ; Solmaz G; Kovacs E
    Sensors (Basel); 2019 Jan; 19(2):. PubMed ID: 30654571
    [TBL] [Abstract][Full Text] [Related]  

  • 18. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks.
    Sobral J; Rodrigues J; Rabelo R; Saleem K; Furtado V
    Sensors (Basel); 2019 Jan; 19(1):. PubMed ID: 30609865
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.
    Alromih A; Al-Rodhaan M; Tian Y
    Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30544877
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Use of Thermistor Temperature Sensors for Cyber-Physical System Security.
    Labrado C; Thapliyal H; Prowell S; Kuruganti T
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31510093
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.