BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 31052531)

  • 1. An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP).
    Jan N; Al-Bayatti AH; Alalwan N; Alzahrani AI
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31052531
    [TBL] [Abstract][Full Text] [Related]  

  • 2. SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.
    Wang Q; Zhan J; Ouyang X; Ren Y
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31060215
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks.
    Mutalemwa LC; Shin S
    Sensors (Basel); 2018 Jul; 18(7):. PubMed ID: 30011958
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing.
    Mutalemwa LC; Shin S
    Sensors (Basel); 2019 Feb; 19(5):. PubMed ID: 30823490
    [TBL] [Abstract][Full Text] [Related]  

  • 5. All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks.
    Wang N; Zeng J
    Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28304367
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Preserving Source Location Privacy for Energy Harvesting WSNs.
    Huang C; Ma M; Liu Y; Liu A
    Sensors (Basel); 2017 Mar; 17(4):. PubMed ID: 28358341
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Hiding the Source Based on Limited Flooding for Sensor Networks.
    Chen J; Lin Z; Hu Y; Wang B
    Sensors (Basel); 2015 Nov; 15(11):29129-48. PubMed ID: 26593923
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Achieving network level privacy in Wireless Sensor Networks.
    Shaikh RA; Jameel H; d'Auriol BJ; Lee H; Lee S; Song YJ
    Sensors (Basel); 2010; 10(3):1447-72. PubMed ID: 22294881
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An Untraceable Data Sharing Scheme in Wireless Sensor Networks.
    Chen D; Lu W; Xing W; Wang N
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30602674
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.
    Bushnag A; Abuzneid A; Mahmood A
    Sensors (Basel); 2016 Jun; 16(7):. PubMed ID: 27355948
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.
    Khan A; Ahmedy I; Anisi MH; Javaid N; Ali I; Khan N; Alsaqer M; Mahmood H
    Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29315247
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network.
    Shi L; Li K
    Comput Intell Neurosci; 2022; 2022():1795454. PubMed ID: 35785102
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Traffic Priority Based Channel Assignment Technique for Critical Data Transmission in Wireless Body Area Network.
    Ambigavathi M; Sridharan D
    J Med Syst; 2018 Sep; 42(11):206. PubMed ID: 30238165
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks.
    Mahjoub RK; Elleithy K
    Sensors (Basel); 2017 Apr; 17(4):. PubMed ID: 28420102
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks.
    Tang J; Liu A; Zhang J; Xiong NN; Zeng Z; Wang T
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29494561
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.
    Javaid N; Muhammad ; Sher A; Abdul W; Niaz IA; Almogren A; Alamri A
    Sensors (Basel); 2017 Mar; 17(3):. PubMed ID: 28335494
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario.
    Wang B; Yue X; Hao K; Liu Y; Li Z; Zhao X
    Sensors (Basel); 2024 Apr; 24(9):. PubMed ID: 38732958
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.
    Yu S; Liu X; Liu A; Xiong N; Cai Z; Wang T
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29748525
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.