These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

133 related articles for article (PubMed ID: 31370171)

  • 1. Automated Vulnerability Discovery and Exploitation in the Internet of Things.
    Wang Z; Zhang Y; Tian Z; Ruan Q; Liu T; Wang H; Liu Z; Lin J; Fang B; Shi W
    Sensors (Basel); 2019 Jul; 19(15):. PubMed ID: 31370171
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection.
    Kim J; Park J
    Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067778
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.
    Al-Boghdady A; Wassif K; El-Ramly M
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33810605
    [TBL] [Abstract][Full Text] [Related]  

  • 4. An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
    Hoque MS; Jamil N; Amin N; Lam KY
    Sensors (Basel); 2021 Jun; 21(12):. PubMed ID: 34202977
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm.
    Han Y; Wang P; Kang C; Lin J; Fan W
    Heliyon; 2024 Jun; 10(12):e31846. PubMed ID: 38952363
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Vulnerability extraction and prediction method based on improved information gain algorithm.
    Yang P; Wang X
    PLoS One; 2024; 19(9):e0309809. PubMed ID: 39255289
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.
    Rytel M; Felkner A; Janiszewski M
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33105564
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.
    Georgescu TM; Iancu B; Zurini M
    Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31374902
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.
    Costa Gondim JJ; de Oliveira Albuquerque R; Clayton Alves Nascimento A; García Villalba LJ; Kim TH
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27827931
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things.
    Yan J; Xiao K; Zhu C; Wu J; Yang G; Zhang W
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33096671
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation.
    Shin DH; Kim GY; Euom IC
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36081035
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Efficient Computation Offloading Strategy with Mobile Edge Computing for IoT.
    Fang J; Shi J; Lu S; Zhang M; Ye Z
    Micromachines (Basel); 2021 Feb; 12(2):. PubMed ID: 33671142
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Cross-Chain Solution to Integrating Multiple Blockchains for IoT Data Management.
    Jiang Y; Wang C; Wang Y; Gao L
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31052380
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things.
    Janiszewski M; Felkner A; Lewandowski P; Rytel M; Romanowski H
    Sensors (Basel); 2021 Jun; 21(13):. PubMed ID: 34202248
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Microservice Security Framework for IoT by Mimic Defense Mechanism.
    Ying F; Zhao S; Deng H
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336588
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
    Ali B; Awad AI
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
    [TBL] [Abstract][Full Text] [Related]  

  • 18. FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm.
    Fang Y; Liu Y; Huang C; Liu L
    PLoS One; 2020; 15(2):e0228439. PubMed ID: 32027693
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Implementing a high-efficiency similarity analysis approach for firmware code.
    Wang Y; Wang R; Jing J; Wang H
    PLoS One; 2021; 16(1):e0245098. PubMed ID: 33434199
    [TBL] [Abstract][Full Text] [Related]  

  • 20. IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations.
    Luo Z; Wang P; Xie W; Zhou X; Wang B
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765846
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.