These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

168 related articles for article (PubMed ID: 33776611)

  • 21. CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.
    Baek Y; Shin S
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408251
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
    Albahar M
    Sci Eng Ethics; 2019 Aug; 25(4):993-1006. PubMed ID: 28058619
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.
    Park Y; Park Y
    Sensors (Basel); 2016 Dec; 16(12):. PubMed ID: 27983616
    [TBL] [Abstract][Full Text] [Related]  

  • 25. LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review.
    Ruotsalainen H; Shen G; Zhang J; Fujdiak R
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590817
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.
    Paté-Cornell ME; Kuypers M; Smith M; Keller P
    Risk Anal; 2018 Feb; 38(2):226-241. PubMed ID: 28679022
    [TBL] [Abstract][Full Text] [Related]  

  • 27. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.
    Amin R; Biswas GP
    J Med Syst; 2015 Aug; 39(8):78. PubMed ID: 26112322
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks.
    Mohamed A; Wang F; Butun I; Qadir J; Lagerström R; Gastaldo P; Caviglia DD
    Sensors (Basel); 2022 May; 22(9):. PubMed ID: 35591187
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era.
    Mugarza I; Flores JL; Montero JL
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33327461
    [TBL] [Abstract][Full Text] [Related]  

  • 30. D-CEWS: DEVS-Based Cyber-Electronic Warfare M&S Framework for Enhanced Communication Effectiveness Analysis in Battlefield.
    Seo S; Han S; Kim D
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590837
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.
    Mishra D
    J Med Syst; 2015 Mar; 39(3):19. PubMed ID: 25651950
    [TBL] [Abstract][Full Text] [Related]  

  • 32. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS.
    Amin R; Biswas GP
    J Med Syst; 2015 Mar; 39(3):33. PubMed ID: 25681100
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations.
    Siddiqi MA; Iwendi C; Jaroslava K; Anumbe N
    Math Biosci Eng; 2022 Jan; 19(3):2641-2670. PubMed ID: 35240800
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities.
    Song L; García-Valls M
    Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808499
    [TBL] [Abstract][Full Text] [Related]  

  • 35. The Increasing Centrality of Robotic Technology in the Context of Nursing Care: Bioethical Implications Analyzed through a Scoping Review Approach.
    Gibelli F; Ricci G; Sirignano A; Turrina S; De Leo D
    J Healthc Eng; 2021; 2021():1478025. PubMed ID: 34493953
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.
    Mrabet H; Belguith S; Alhomoud A; Jemai A
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach.
    Figueroa-Lorenzo S; Añorga J; Arrizabalaga S
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31615147
    [TBL] [Abstract][Full Text] [Related]  

  • 38. The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives.
    Giansanti D; Gulino RA
    Healthcare (Basel); 2021 Nov; 9(12):. PubMed ID: 34946379
    [TBL] [Abstract][Full Text] [Related]  

  • 39. A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC.
    Qi M; Chen J; Chen Y
    Comput Methods Programs Biomed; 2018 Oct; 164():101-109. PubMed ID: 30195418
    [TBL] [Abstract][Full Text] [Related]  

  • 40. High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems.
    Zhang Z; Wang X; Hao Q; Xu D; Zhang J; Liu J; Ma J
    Micromachines (Basel); 2021 May; 12(5):. PubMed ID: 34063441
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.