These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

228 related articles for article (PubMed ID: 28098846)

  • 1. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.
    Ding C; Yang L; Wu M
    Sensors (Basel); 2017 Jan; 17(1):. PubMed ID: 28098846
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).
    Shaukat HR; Hashim F; Shaukat MA; Ali Alezabi K
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32316487
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks.
    Osanaiye O; Alfa AS; Hancke GP
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29794994
    [TBL] [Abstract][Full Text] [Related]  

  • 6. SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.
    Wang Q; Zhan J; Ouyang X; Ren Y
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31060215
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Patrol detection for replica attacks on wireless sensor networks.
    Wang LM; Shi Y
    Sensors (Basel); 2011; 11(3):2496-504. PubMed ID: 22163752
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.
    Jung J; Kim J; Choi Y; Won D
    Sensors (Basel); 2016 Aug; 16(8):. PubMed ID: 27537890
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Reputation-based secure sensor localization in wireless sensor networks.
    He J; Xu J; Zhu X; Zhang Y; Zhang T; Fu W
    ScientificWorldJournal; 2014; 2014():308341. PubMed ID: 24982940
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
    Lu Y; Li L; Peng H; Yang Y
    Sensors (Basel); 2016 Jun; 16(6):. PubMed ID: 27338382
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.
    Kim IH; Kim BS; Song J
    Sensors (Basel); 2017 Jan; 17(2):. PubMed ID: 28125007
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.
    Yang B; Zhang J
    Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28657588
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secure Scheme for Distributed Consensus Estimation against Data Falsification in Heterogeneous Wireless Sensor Networks.
    Mi S; Han H; Chen C; Yan J; Guan X
    Sensors (Basel); 2016 Feb; 16(2):252. PubMed ID: 26907275
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
    Alajmi N; Elleithy K
    Sensors (Basel); 2015 Nov; 15(11):29332-45. PubMed ID: 26610499
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Improved Mobility-Based Control Protocol for Tolerating Clone Failures in Wireless Sensor Networks.
    Zhou Y; Xiong N; Tan M; Huang R; Kleonbet J
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27886054
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.
    Dhamodharan US; Vayanaperumal R
    ScientificWorldJournal; 2015; 2015():841267. PubMed ID: 26236773
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
    Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
    Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.