These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

193 related articles for article (PubMed ID: 33105564)

  • 1. Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.
    Rytel M; Felkner A; Janiszewski M
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33105564
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things.
    Janiszewski M; Felkner A; Lewandowski P; Rytel M; Romanowski H
    Sensors (Basel); 2021 Jun; 21(13):. PubMed ID: 34202248
    [TBL] [Abstract][Full Text] [Related]  

  • 3. The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.
    Al-Boghdady A; Wassif K; El-Ramly M
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33810605
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
    Ali B; Awad AI
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.
    Georgescu TM; Iancu B; Zurini M
    Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31374902
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Threat Modeling-How to Visualize Attacks on IOTA?
    Ullah I; de Roode G; Meratnia N; Havinga P
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33800712
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Review of IoT Firmware Vulnerabilities and Auditing Techniques.
    Bakhshi T; Ghita B; Kuzminykh I
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276399
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk.
    Agarwal S; Oser P; Lueders S
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31547561
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
    Deng YY; Chen CL; Tsaur WJ; Tang YW; Chen JH
    Sensors (Basel); 2017 Dec; 17(12):. PubMed ID: 29244776
    [TBL] [Abstract][Full Text] [Related]  

  • 11. iDetect for vulnerability detection in internet of things operating systems using machine learning.
    Al-Boghdady A; El-Ramly M; Wassif K
    Sci Rep; 2022 Oct; 12(1):17086. PubMed ID: 36224208
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Think Like a Hacker.
    Khera M
    J Diabetes Sci Technol; 2017 Mar; 11(2):207-212. PubMed ID: 27920270
    [TBL] [Abstract][Full Text] [Related]  

  • 13. IoTCrawler: Challenges and Solutions for Searching the Internet of Things.
    Iggena T; Bin Ilyas E; Fischer M; Tönjes R; Elsaleh T; Rezvani R; Pourshahrokhi N; Bischof S; Fernbach A; Xavier Parreira J; Schneider P; Smirnov P; Strohbach M; Truong H; González-Vidal A; Skarmeta AF; Singh P; Beliatis MJ; Presser M; Martinez JA; Gonzalez-Gil P; Krogbæk M; Holmgård Christophersen S
    Sensors (Basel); 2021 Feb; 21(5):. PubMed ID: 33668113
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Secure Communications for Resource-Constrained IoT Devices.
    Taha AM; Rashwan AM; Hassanein HS
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610438
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things.
    Ahmed AA; Ahmed WA
    Sensors (Basel); 2019 Aug; 19(17):. PubMed ID: 31443608
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Discrepancies in Demand of Internet of Things Services Among Older People and People With Disabilities, Their Caregivers, and Health Care Providers: Face-to-Face Survey Study.
    Lee H; Park YR; Kim HR; Kang NY; Oh G; Jang IY; Lee E
    J Med Internet Res; 2020 Apr; 22(4):e16614. PubMed ID: 32293575
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.
    Thamilarasu G; Chawla S
    Sensors (Basel); 2019 Apr; 19(9):. PubMed ID: 31035611
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities.
    Song L; García-Valls M
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808499
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.
    Hwang SY; Kim JN
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770290
    [TBL] [Abstract][Full Text] [Related]  

  • 20. State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things.
    Ankergård SFJJ; Dushku E; Dragoni N
    Sensors (Basel); 2021 Feb; 21(5):. PubMed ID: 33668796
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.