These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

156 related articles for article (PubMed ID: 30312478)

  • 1. Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes.
    Levitin G; Xing L; Huang HZ
    Risk Anal; 2019 Apr; 39(4):846-858. PubMed ID: 30312478
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
    Wang S; Ye J; Zhang Y
    PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment.
    Muthurajan V; Narayanasamy B
    ScientificWorldJournal; 2016; 2016():4913015. PubMed ID: 26981584
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security.
    Qayyum A; Ijaz A; Usama M; Iqbal W; Qadir J; Elkhatib Y; Al-Fuqaha A
    Front Big Data; 2020; 3():587139. PubMed ID: 33693420
    [TBL] [Abstract][Full Text] [Related]  

  • 5. On the Security and Privacy Challenges of Virtual Assistants.
    Bolton T; Dargahi T; Belguith S; Al-Rakhami MS; Sodhro AH
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33810212
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.
    Latif R; Abbas H; Latif S; Masood A
    J Med Syst; 2016 Jul; 40(7):161. PubMed ID: 27189623
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Randomized routing of virtual machines in IaaS data centers.
    Khani H; Khanmirza H
    PeerJ Comput Sci; 2019; 5():e211. PubMed ID: 33816864
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Virtualization and cloud computing in dentistry.
    Chow F; Muftu A; Shorter R
    J Mass Dent Soc; 2014; 63(1):14-7. PubMed ID: 24941546
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic.
    Mandal S; Khan DA; Jain S
    New Gener Comput; 2021; 39(3-4):599-622. PubMed ID: 34219861
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.
    Zhang L; Zhu S
    J Med Syst; 2015 May; 39(5):49. PubMed ID: 25732081
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
    Choi Y; Lee Y; Moon J; Won D
    PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Malicious Behavior Awareness and Defense Countermeasure Based on LoRaWAN Protocol.
    Gao SY; Li XH; Ma MD
    Sensors (Basel); 2019 Nov; 19(23):. PubMed ID: 31766778
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Resource distribution in multiple attacks with imperfect detection of the attack outcome.
    Levitin G; Hausken K
    Risk Anal; 2012 Feb; 32(2):304-18. PubMed ID: 21801189
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hardware assisted hypervisor introspection.
    Shi J; Yang Y; Tang C
    Springerplus; 2016; 5():647. PubMed ID: 27330913
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Remote access protocols for Desktop-as-a-Service solutions.
    Magaña E; Sesma I; Morató D; Izal M
    PLoS One; 2019; 14(1):e0207512. PubMed ID: 30608928
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Randomized Prediction Games for Adversarial Machine Learning.
    Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F
    IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Experimental Detection of Distributed Denial of Service Attack in CDX 3 Platform Based on Snort.
    Chen CL; Lai JL
    Sensors (Basel); 2023 Jul; 23(13):. PubMed ID: 37447987
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Challenges of the digital age for privacy and personal data protection.
    Romansky RP; Noninska IS
    Math Biosci Eng; 2020 Aug; 17(5):5288-5303. PubMed ID: 33120553
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure.
    Dawood M; Xiao C; Tu S; Alotaibi FA; Alnfiai MM; Farhan M
    PeerJ Comput Sci; 2024; 10():e2027. PubMed ID: 38855228
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.