These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 27893803)

  • 1. Performance Evaluation Model for Application Layer Firewalls.
    Xuan S; Yang W; Dong H; Zhang J
    PLoS One; 2016; 11(11):e0167280. PubMed ID: 27893803
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Exploiting geo-distributed clouds for a e-health monitoring system with minimum service delay and privacy preservation.
    Shen Q; Liang X; Shen X; Lin X; Luo HY
    IEEE J Biomed Health Inform; 2014 Mar; 18(2):430-9. PubMed ID: 24608048
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Cryptanalysis and improvement of an elliptic curve based signcryption scheme for firewalls.
    Zia M; Ali R
    PLoS One; 2018; 13(12):e0208857. PubMed ID: 30543691
    [TBL] [Abstract][Full Text] [Related]  

  • 4. The futility of common firewall policies: an experimental demonstration.
    Ries JE; Asaro PV; Guillen A; Ivanova J
    Proc AMIA Symp; 2000; ():699-703. PubMed ID: 11079974
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Mechanism to prevent the abuse of IPv6 fragmentation in OpenFlow networks.
    Al-Ani A; Anbar M; Laghari SA; Al-Ani AK
    PLoS One; 2020; 15(5):e0232574. PubMed ID: 32392261
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Quality of Service Class Identifier (QCI) radio resource allocation algorithm for LTE downlink.
    Mamman M; Hanapi ZM; Abdullah A; Muhammed A
    PLoS One; 2019; 14(1):e0210310. PubMed ID: 30682038
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
    Caruso RD
    Radiographics; 2003; 23(5):1329-37. PubMed ID: 12975519
    [TBL] [Abstract][Full Text] [Related]  

  • 8. QoS-oriented high dynamic resource allocation in vehicular communication networks.
    Bejaoui T
    ScientificWorldJournal; 2014; 2014():718698. PubMed ID: 24616639
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Characterizing contract-based multiagent resource allocation in networks.
    An B; Lesser V
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):575-86. PubMed ID: 19955040
    [TBL] [Abstract][Full Text] [Related]  

  • 10. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.
    N Ahmed M; Abdullah AH; Kaiwartya O
    PLoS One; 2016; 11(6):e0156885. PubMed ID: 27285146
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.
    Huang JW; Hou TW
    Med Inform Internet Med; 2007 Jun; 32(2):103-16. PubMed ID: 17541860
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Resource Allocation Strategy of the Educational Resource Base for MEC Multiserver Heuristic Joint Task.
    Luo N
    Comput Intell Neurosci; 2022; 2022():4818767. PubMed ID: 35607471
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Optimization of Markov Queuing Model in Hospital Bed Resource Allocation.
    Wu J; Chen B; Wu D; Wang J; Peng X; Xu X
    J Healthc Eng; 2020; 2020():6630885. PubMed ID: 33489058
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Resource allocation for downlink multiuser video transmission over wireless lossy networks.
    Maani E; Pahalawatta PV; Berry R; Pappas TN; Katsaggelos AK
    IEEE Trans Image Process; 2008 Sep; 17(9):1663-71. PubMed ID: 18713672
    [TBL] [Abstract][Full Text] [Related]  

  • 15. TCP throughput adaptation in WiMax networks using replicator dynamics.
    Anastasopoulos MP; Petraki DK; Kannan R; Vasilakos AV
    IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):647-55. PubMed ID: 20083460
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Dynamic resource allocation in hybrid access femtocell network.
    Ahmed AU; Islam MT; Ismail M; Ghanbarisabagh M
    ScientificWorldJournal; 2014; 2014():539720. PubMed ID: 24782662
    [TBL] [Abstract][Full Text] [Related]  

  • 17. CPACK: An Intelligent Cyber-Physical Access Control Kit for Protecting Network.
    Yu H; Liu Z; Zou S; Wang W
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298378
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.
    Nam J; Choo KK; Han S; Kim M; Paik J; Won D
    PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359
    [TBL] [Abstract][Full Text] [Related]  

  • 19. LAN attack detection using Discrete Event Systems.
    Hubballi N; Biswas S; Roopa S; Ratti R; Nandi S
    ISA Trans; 2011 Jan; 50(1):119-30. PubMed ID: 20804980
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A filter that prevents the spread of mail-attachment-type Trojan horse computer worms.
    Kobayashi S; Goudge M; Makie T; Hanada E; Harada M; Nose Y
    J Med Syst; 2002 Jun; 26(3):221-5. PubMed ID: 12018608
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.