These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

131 related articles for article (PubMed ID: 35224445)

  • 1. Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
    Venkatachary SK; Alagappan A; Andrews LJB
    Energy Inform; 2021; 4(1):5. PubMed ID: 35224445
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Survey of Security in Cloud, Edge, and Fog Computing.
    Ometov A; Molua OL; Komarov M; Nurmi J
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161675
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review.
    Mohsin AH; Zaidan AA; Zaidan BB; Albahri AS; Albahri OS; Alsalem MA; Mohammed KI
    J Med Syst; 2018 Oct; 42(12):238. PubMed ID: 30327939
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Microservice Security Agent Based On API Gateway in Edge Computing.
    Xu R; Jin W; Kim D
    Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31717617
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An Overview of Fog Computing and Edge Computing Security and Privacy Issues.
    Alwakeel AM
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960320
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Intuitive Development to Examine Collaborative IoT Supply Chain System Underlying Privacy and Security Levels and Perspective Powering through Proactive Blockchain.
    Shahzad A; Zhang K; Gherbi A
    Sensors (Basel); 2020 Jul; 20(13):. PubMed ID: 32635589
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.
    Honar Pajooh H; Rashid M; Alam F; Demidenko S
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33430274
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Challenges of the digital age for privacy and personal data protection.
    Romansky RP; Noninska IS
    Math Biosci Eng; 2020 Aug; 17(5):5288-5303. PubMed ID: 33120553
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.
    Masip-Bruin X; Marín-Tordera E; Ruiz J; Jukan A; Trakadas P; Cernivec A; Lioy A; López D; Santos H; Gonos A; Silva A; Soriano J; Kalogiannis G
    Sensors (Basel); 2021 Sep; 21(18):. PubMed ID: 34577264
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

  • 11. NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.
    Liu X; Ma W; Cao H
    J Med Syst; 2019 Sep; 43(10):318. PubMed ID: 31522286
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The need for cybersecurity self-evaluation in healthcare.
    Burke W; Stranieri A; Oseni T; Gondal I
    BMC Med Inform Decis Mak; 2024 May; 24(1):133. PubMed ID: 38783250
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Developing a three stage coordinated approach to enhance efficiency and reliability of virtual power plants.
    Amissah J; Abdel-Rahim O; Mansour DA; Bajaj M; Zaitsev I; Abdelkader S
    Sci Rep; 2024 Jun; 14(1):13105. PubMed ID: 38849420
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Federated Learning in Edge Computing: A Systematic Survey.
    Abreha HG; Hayajneh M; Serhani MA
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062410
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.
    Li CT; Shih DH; Wang CC
    Comput Methods Programs Biomed; 2018 Apr; 157():191-203. PubMed ID: 29477428
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Comprehensive Survey on Security and Privacy for Electronic Health Data.
    Oh SR; Seo YD; Lee E; Kim YG
    Int J Environ Res Public Health; 2021 Sep; 18(18):. PubMed ID: 34574593
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.
    Suárez-Albela M; Fernández-Caramés TM; Fraga-Lamas P; Castedo L
    Sensors (Basel); 2017 Aug; 17(9):. PubMed ID: 28850104
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.
    Suárez-Albela M; Fraga-Lamas P; Fernández-Caramés TM
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30423831
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach.
    Figueroa-Lorenzo S; Añorga J; Arrizabalaga S
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31615147
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Analysis of security and privacy challenges for DNA-genomics applications and databases.
    Arshad S; Arshad J; Khan MM; Parkinson S
    J Biomed Inform; 2021 Jul; 119():103815. PubMed ID: 34022422
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.