These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

127 related articles for article (PubMed ID: 35746386)

  • 1. LPG-PCFG: An Improved Probabilistic Context- Free Grammar to Hit Low-Probability Passwords.
    Guo X; Tan K; Liu Y; Jin M; Lu H
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746386
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Recurrent GANs Password Cracker For IoT Password Security Enhancement.
    Nam S; Jeon S; Kim H; Moon J
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486361
    [TBL] [Abstract][Full Text] [Related]  

  • 3. PassTCN-PPLL: A Password Guessing Model Based on Probability Label Learning and Temporal Convolutional Neural Network.
    Ye J; Jin M; Gong G; Shen R; Lu H
    Sensors (Basel); 2022 Aug; 22(17):. PubMed ID: 36080943
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Improving computer security for authentication of users: influence of proactive password restrictions.
    Proctor RW; Lien MC; Vu KP; Schultz EE; Salvendy G
    Behav Res Methods Instrum Comput; 2002 May; 34(2):163-9. PubMed ID: 12109007
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Security analysis and improvements to the PsychoPass method.
    Brumen B; Heričko M; Rozman I; Hölbl M
    J Med Internet Res; 2013 Aug; 15(8):e161. PubMed ID: 23942458
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A study on user authentication methodology using numeric password and fingerprint biometric information.
    Ju SH; Seo HS; Han SH; Ryou JC; Kwak J
    Biomed Res Int; 2013; 2013():427542. PubMed ID: 24151601
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Siamese Neural Network for Keystroke Dynamics-Based Authentication on Partial Passwords.
    Lis K; Niewiadomska-Szynkiewicz E; Dziewulska K
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571467
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles.
    Suárez-Plasencia L; Herrera-Macías JA; Legón-Pérez CM; Sosa-Gómez G; Rojas O
    Sensors (Basel); 2022 Mar; 22(5):. PubMed ID: 35271135
    [TBL] [Abstract][Full Text] [Related]  

  • 9. "Passwords protect my stuff"-a study of children's password practices.
    Choong YY; Theofanos MF; Renaud K; Prior S
    J Cybersecur; 2019; 5(1):. PubMed ID: 33042580
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.
    Xie Q; Lu Y; Tan X; Tang Z; Hu B
    PLoS One; 2018; 13(10):e0203984. PubMed ID: 30289897
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.
    Ho PF; Kam YH; Wee MC; Chong YN; Por LY
    ScientificWorldJournal; 2014; 2014():838623. PubMed ID: 24991649
    [TBL] [Abstract][Full Text] [Related]  

  • 12. How strong are passwords used to protect personal health information in clinical trials?
    El Emam K; Moreau K; Jonker E
    J Med Internet Res; 2011 Feb; 13(1):e18. PubMed ID: 21317106
    [TBL] [Abstract][Full Text] [Related]  

  • 13. One-Time Password Generation and Two-Factor Authentication Using Molecules and Light.
    Naren G; Li S; Andréasson J
    Chemphyschem; 2017 Jul; 18(13):1726-1729. PubMed ID: 28252833
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Applying semantic-based probabilistic context-free grammar to medical language processing--a preliminary study on parsing medication sentences.
    Xu H; AbdelRahman S; Lu Y; Denny JC; Doan S
    J Biomed Inform; 2011 Dec; 44(6):1068-75. PubMed ID: 21856440
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Convergence of Password Guessing to Optimal Success Rates.
    Murray H; Malone D
    Entropy (Basel); 2020 Mar; 22(4):. PubMed ID: 33286152
    [TBL] [Abstract][Full Text] [Related]  

  • 16. On the security of a simple three-party key exchange protocol without server's public keys.
    Nam J; Choo KK; Park M; Paik J; Won D
    ScientificWorldJournal; 2014; 2014():479534. PubMed ID: 25258723
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks.
    Carballal A; Galego-Carro JP; Rodriguez-Fernandez N; Fernandez-Lozano C
    PeerJ Comput Sci; 2022; 8():e1185. PubMed ID: 37346318
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cognitive Based Authentication Protocol for Distributed Data and Web Technologies.
    Krzyworzeka N; Ogiela L; Ogiela MR
    Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770571
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Password Meter without Password Exposure.
    Kim P; Lee Y; Hong YS; Kwon T
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33419094
    [TBL] [Abstract][Full Text] [Related]  

  • 20. GRA-PIN: A Graphical and PIN-Based Hybrid Authentication Approach for Smart Devices.
    Kausar N; Din IU; Khan MA; Almogren A; Kim BS
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214251
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.