These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

187 related articles for article (PubMed ID: 25602616)

  • 1. Geographic wormhole detection in wireless sensor networks.
    Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
    PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2011; 11(12):11122-40. PubMed ID: 22247657
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A systematic review of routing attacks detection in wireless sensor networks.
    Alansari Z; Anuar NB; Kamsin A; Belgaum MR
    PeerJ Comput Sci; 2022; 8():e1135. PubMed ID: 36426265
    [TBL] [Abstract][Full Text] [Related]  

  • 4. On securing wireless sensor network--novel authentication scheme against DOS attacks.
    Raja KN; Beno MM
    J Med Syst; 2014 Oct; 38(10):84. PubMed ID: 25106827
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 6. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.
    N Ahmed M; Abdullah AH; Kaiwartya O
    PLoS One; 2016; 11(6):e0156885. PubMed ID: 27285146
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Patrol detection for replica attacks on wireless sensor networks.
    Wang LM; Shi Y
    Sensors (Basel); 2011; 11(3):2496-504. PubMed ID: 22163752
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
    Yeh HL; Chen TH; Liu PC; Kim TH; Wei HW
    Sensors (Basel); 2011; 11(5):4767-79. PubMed ID: 22163874
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
    Adnan AI; Hanapi ZM; Othman M; Zukarnain ZA
    PLoS One; 2017; 12(1):e0170273. PubMed ID: 28121992
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions.
    Bhatti DS; Saleem S; Imran A; Kim HJ; Kim KI; Lee KC
    Sci Rep; 2024 Feb; 14(1):3428. PubMed ID: 38341499
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
    Chen CL; Lin IH
    Sensors (Basel); 2010; 10(8):7347-70. PubMed ID: 22163606
    [TBL] [Abstract][Full Text] [Related]  

  • 14. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.
    Tajeddine A; Kayssi A; Chehab A; Elhajj I; Itani W
    Sensors (Basel); 2015 Feb; 15(2):3299-333. PubMed ID: 25648712
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks.
    Khan MA; Nasralla MM; Umar MM; Ghani-Ur-Rehman ; Khan S; Choudhury N
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062372
    [TBL] [Abstract][Full Text] [Related]  

  • 16. DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output.
    Pramitarini Y; Perdana RHY; Shim K; An B
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37766016
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A game-theoretic response strategy for coordinator attack in wireless sensor networks.
    Liu J; Yue G; Shen S; Shang H; Li H
    ScientificWorldJournal; 2014; 2014():950618. PubMed ID: 25105171
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Distributed clone detection in static wireless sensor networks: random walk with network division.
    Khan WZ; Aalsalem MY; Saad NM
    PLoS One; 2015; 10(5):e0123069. PubMed ID: 25992913
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks.
    Khan S; Khan MA; Alnazzawi N
    Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475178
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.