391 related articles for article (PubMed ID: 27920270)
1. Think Like a Hacker.
Khera M
J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270
[TBL] [Abstract][Full Text] [Related]
2. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
Fernández-Caramés TM; Fraga-Lamas P
Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
[TBL] [Abstract][Full Text] [Related]
3. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
Deng YY; Chen CL; Tsaur WJ; Tang YW; Chen JH
Sensors (Basel); 2017 Dec; 17(12):. PubMed ID: 29244776
[TBL] [Abstract][Full Text] [Related]
4. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT.
Dwivedi AD; Srivastava G; Dhar S; Singh R
Sensors (Basel); 2019 Jan; 19(2):. PubMed ID: 30650612
[TBL] [Abstract][Full Text] [Related]
5. Assessing the Security of Connected Diabetes Devices.
Out DJ; Tettero O
J Diabetes Sci Technol; 2017 Mar; 11(2):203-206. PubMed ID: 28264190
[TBL] [Abstract][Full Text] [Related]
6. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective.
Park M; Oh H; Lee K
Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31075883
[TBL] [Abstract][Full Text] [Related]
7. Cyberattacks on Devices Threaten Data and Patients: Cybersecurity Risks Come with the Territory. Three Experts Explain What You Need to Know.
Mertz L
IEEE Pulse; 2018; 9(3):25-28. PubMed ID: 29757749
[TBL] [Abstract][Full Text] [Related]
8. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
[TBL] [Abstract][Full Text] [Related]
9. Ethical Design in the Internet of Things.
Baldini G; Botterman M; Neisse R; Tallacchini M
Sci Eng Ethics; 2018 Jun; 24(3):905-925. PubMed ID: 26797878
[TBL] [Abstract][Full Text] [Related]
10. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
Ali B; Awad AI
Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
[TBL] [Abstract][Full Text] [Related]
11. IoT Solution for Smart Cities' Pollution Monitoring and the Security Challenges.
Toma C; Alexandru A; Popa M; Zamfiroiu A
Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31382512
[TBL] [Abstract][Full Text] [Related]
12. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence.
Mazhar T; Talpur DB; Shloul TA; Ghadi YY; Haq I; Ullah I; Ouahada K; Hamam H
Brain Sci; 2023 Apr; 13(4):. PubMed ID: 37190648
[TBL] [Abstract][Full Text] [Related]
13. The elephant in the room: cybersecurity in healthcare.
Cartwright AJ
J Clin Monit Comput; 2023 Oct; 37(5):1123-1132. PubMed ID: 37088852
[TBL] [Abstract][Full Text] [Related]
14. A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang YH; Lo NW; Yang CY; Tang SW
Sensors (Basel); 2018 Apr; 18(4):. PubMed ID: 29621168
[TBL] [Abstract][Full Text] [Related]
15. Patient Monitoring System Using Cognitive Internet of Things.
Lakshmi Dhevi B; Vishvaksenan KS; Senthamil Selvan K; Rajalakshmi A
J Med Syst; 2018 Oct; 42(11):229. PubMed ID: 30311064
[TBL] [Abstract][Full Text] [Related]
16. Internet of things issues related to psychiatry.
Monteith S; Glenn T; Geddes J; Severus E; Whybrow PC; Bauer M
Int J Bipolar Disord; 2021 Apr; 9(1):11. PubMed ID: 33797634
[TBL] [Abstract][Full Text] [Related]
17. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.
Tariq U; Ahmed I; Bashir AK; Shaukat K
Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112457
[TBL] [Abstract][Full Text] [Related]
18. Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.
Rytel M; Felkner A; Janiszewski M
Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33105564
[TBL] [Abstract][Full Text] [Related]
19. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.
Georgescu TM; Iancu B; Zurini M
Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31374902
[TBL] [Abstract][Full Text] [Related]
20. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
Hwang SY; Kim JN
Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]