These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

225 related articles for article (PubMed ID: 31505866)

  • 1. Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks.
    Ji J; Wu G; Shuai J; Zhang Z; Wang Z; Ren Y
    Sensors (Basel); 2019 Sep; 19(18):. PubMed ID: 31505866
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Joint Placement and Device Association of UAV Base Stations in IoT Networks.
    Ahmed A; Awais M; Akram T; Kulac S; Alhussein M; Aurangzeb K
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31075952
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.
    Sung Y; Lee S; Lee M
    Sensors (Basel); 2018 Mar; 18(4):. PubMed ID: 29570691
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SDN Controller Placement in IoT Networks: An Optimized Submodularity-Based Approach.
    Tran AK; Piran MJ; Pham C
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31842268
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain.
    Shahzad A; Zhang K; Gherbi A
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32635589
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing.
    Yousif A; Alqhtani SM; Bashir MB; Ali A; Hamza R; Hassan A; Tawfeeg TM
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161596
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks.
    Xu Z; Gu R; Huang T; Xiang H; Zhang X; Qi L; Xu X
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30201933
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Device-Based Security to Improve User Privacy in the Internet of Things
    Belem Pacheco LA; Pelinson Alchieri EA; Mendez Barreto PAS
    Sensors (Basel); 2018 Aug; 18(8):. PubMed ID: 30110880
    [TBL] [Abstract][Full Text] [Related]  

  • 9. An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks.
    Yin XC; Liu ZG; Ndibanje B; Nkenyereye L; Riazul Islam SM
    Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31319562
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Realizing Efficient Security and Privacy in IoT Networks.
    Anajemba JH; Tang Y; Iwendi C; Ohwoekevwo A; Srivastava G; Jo O
    Sensors (Basel); 2020 May; 20(9):. PubMed ID: 32375240
    [TBL] [Abstract][Full Text] [Related]  

  • 11. IoT Resource Allocation and Optimization Based on Heuristic Algorithm.
    Sangaiah AK; Hosseinabadi AAR; Shareh MB; Bozorgi Rad SY; Zolfagharian A; Chilamkurti N
    Sensors (Basel); 2020 Jan; 20(2):. PubMed ID: 31963762
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network.
    Guerrero-Sanchez AE; Rivas-Araiza EA; Gonzalez-Cordoba JL; Toledano-Ayala M; Takacs A
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32423025
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optimal Consensus with Dual Abnormality Mode of Cellular IoT Based on Edge Computing.
    Pan SH; Wang SC
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33477963
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Detection of malicious nodes based on consortium blockchain.
    Luo S; Lai L; Hu T; Hu X
    PeerJ Comput Sci; 2024; 10():e2108. PubMed ID: 38983233
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Location Privacy Protection in Distributed IoT Environments Based on Dynamic Sensor Node Clustering.
    Dimitriou K; Roussaki I
    Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31324012
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enhanced Anomaly Detection System for IoT Based on Improved Dynamic SBPSO.
    Sarwar A; Alnajim AM; Marwat SNK; Ahmed S; Alyahya S; Khan WU
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808425
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Resource Allocation in the Cognitive Radio Network-Aided Internet of Things for the Cyber-Physical-Social System: An Efficient Jaya Algorithm.
    Luo X; He Z; Zhao Z; Wang L; Wang W; Ning H; Wang JH; Zhao W; Zhang J
    Sensors (Basel); 2018 Oct; 18(11):. PubMed ID: 30373268
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Searchable Encryption Scheme for Personalized Privacy in IoT-Based Big Data.
    Li S; Li M; Xu H; Zhou X
    Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30832294
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.