These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
130 related articles for article (PubMed ID: 32344534)
1. Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. Al-Eidi S; Darwish O; Chen Y Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32344534 [TBL] [Abstract][Full Text] [Related]
2. Ordinal synchronization mark sequence and its steganography for a multi-link network covert channel. Fu S; Wang R; Dong L; Yan D PLoS One; 2021; 16(6):e0252813. PubMed ID: 34086805 [TBL] [Abstract][Full Text] [Related]
3. Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems. Miketic I; Dhananjay K; Salman E Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850679 [TBL] [Abstract][Full Text] [Related]
4. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks. Osanaiye O; Alfa AS; Hancke GP Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29794994 [TBL] [Abstract][Full Text] [Related]
5. Traffic Priority Based Channel Assignment Technique for Critical Data Transmission in Wireless Body Area Network. Ambigavathi M; Sridharan D J Med Syst; 2018 Sep; 42(11):206. PubMed ID: 30238165 [TBL] [Abstract][Full Text] [Related]
6. Inferring the background traffic arrival process in the Internet. Hága P; Csabai I; Vattay G Phys Rev E Stat Nonlin Soft Matter Phys; 2009 Dec; 80(6 Pt 2):066103. PubMed ID: 20365227 [TBL] [Abstract][Full Text] [Related]
7. Cross-World Covert Channel on ARM Trustzone through PMU. Li X; Tyagi A Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236456 [TBL] [Abstract][Full Text] [Related]
8. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Thamilarasu G; Chawla S Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611 [TBL] [Abstract][Full Text] [Related]
9. Toward Exposing Timing-Based Probing Attacks in Web Applications. Mao J; Chen Y; Shi F; Jia Y; Liang Z Sensors (Basel); 2017 Feb; 17(3):. PubMed ID: 28245610 [TBL] [Abstract][Full Text] [Related]
10. A new sensors-based covert channel on android. Al-Haiqi A; Ismail M; Nordin R ScientificWorldJournal; 2014; 2014():969628. PubMed ID: 25295311 [TBL] [Abstract][Full Text] [Related]
11. A Preemptive Priority-Based Data Fragmentation Scheme for Heterogeneous Traffic in Wireless Sensor Networks. Khan AA; Ghani S; Siddiqui S Sensors (Basel); 2018 Dec; 18(12):. PubMed ID: 30563026 [TBL] [Abstract][Full Text] [Related]
12. Artificial Intelligence-Based Anomaly Detection Technology over Encrypted Traffic: A Systematic Literature Review. Ji IH; Lee JH; Kang MJ; Park WJ; Jeon SH; Seo JT Sensors (Basel); 2024 Jan; 24(3):. PubMed ID: 38339615 [TBL] [Abstract][Full Text] [Related]
14. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Ali B; Awad AI Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023 [TBL] [Abstract][Full Text] [Related]
15. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA. Harrop W; Matteson A J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):149-62. PubMed ID: 24457326 [TBL] [Abstract][Full Text] [Related]
16. Internet of things technologies in medical sector: cyber security issues. Dovhan AD; Bernaziuk YO; Tkachuk TY Wiad Lek; 2019; 72(12 cz 2):2563-2567. PubMed ID: 32124786 [TBL] [Abstract][Full Text] [Related]
17. An Ontology-Based Cybersecurity Framework for the Internet of Things. Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085 [TBL] [Abstract][Full Text] [Related]
19. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Li CT; Wu TY; Chen CL; Lee CC; Chen CM Sensors (Basel); 2017 Jun; 17(7):. PubMed ID: 28644381 [TBL] [Abstract][Full Text] [Related]