These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

144 related articles for article (PubMed ID: 36166531)

  • 1. The State of the Art in BGP Visualization Tools: A Mapping of Visualization Techniques to Cyberattack Types.
    Raynor J; Crnovrsanin T; Di Bartolomeo S; South L; Saffo D; Dunne C
    IEEE Trans Vis Comput Graph; 2023 Jan; 29(1):1059-1069. PubMed ID: 36166531
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques.
    Scott BA; Johnstone MN; Szewczyk P
    Sensors (Basel); 2024 Oct; 24(19):. PubMed ID: 39409453
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Enhancing Border Gateway Protocol Security Using Public Blockchain.
    Mastilak L; Galinski M; Helebrandt P; Kotuliak I; Ries M
    Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32796562
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey.
    Mastilak L; Helebrandt P; Galinski M; Kotuliak I
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214339
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.
    Sriram VK; Montgomery D
    Comput Commun; 2017 Jul; 106():75-85. PubMed ID: 28824212
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.
    Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P
    Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Understanding Visualization Authoring Techniques for Genomics Data in the Context of Personas and Tasks.
    Brandt AVD; L'Yi S; Nguyen HN; Vilanova A; Gehlenborg N
    IEEE Trans Vis Comput Graph; 2024 Sep; PP():. PubMed ID: 39288066
    [TBL] [Abstract][Full Text] [Related]  

  • 8. GenoREC: A Recommendation System for Interactive Genomics Data Visualization.
    Pandey A; L'Yi S; Wang Q; Borkin MA; Gehlenborg N
    IEEE Trans Vis Comput Graph; 2023 Jan; 29(1):570-580. PubMed ID: 36191105
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Long-Range Correlations and Memory in the Dynamics of Internet Interdomain Routing.
    Kitsak M; Elmokashfi A; Havlin S; Krioukov D
    PLoS One; 2015; 10(11):e0141481. PubMed ID: 26529312
    [TBL] [Abstract][Full Text] [Related]  

  • 10. The future of Cochrane Neonatal.
    Soll RF; Ovelman C; McGuire W
    Early Hum Dev; 2020 Nov; 150():105191. PubMed ID: 33036834
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A systematic review of routing attacks detection in wireless sensor networks.
    Alansari Z; Anuar NB; Kamsin A; Belgaum MR
    PeerJ Comput Sci; 2022; 8():e1135. PubMed ID: 36426265
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A State-of-the-Art Survey of Tasks for Tree Design and Evaluation With a Curated Task Dataset.
    Pandey A; Syeda UH; Shah C; Guerra-Gomez JA; Borkin MA
    IEEE Trans Vis Comput Graph; 2022 Oct; 28(10):3563-3584. PubMed ID: 33667165
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications.
    Abosata N; Al-Rubaye S; Inalhan G; Emmanouilidis C
    Sensors (Basel); 2021 May; 21(11):. PubMed ID: 34073975
    [TBL] [Abstract][Full Text] [Related]  

  • 15. GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
    Le TD; Ge M; Anwar A; Loke SW; Beuran R; Doss R; Tan Y
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808292
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 17. From Information to Choice: A Critical Inquiry Into Visualization Tools for Decision Making.
    Oral E; Chawla R; Wijkstra M; Mahyar N; Dimara E
    IEEE Trans Vis Comput Graph; 2024 Jan; 30(1):359-369. PubMed ID: 37871054
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.
    Sutrala AK; Das AK; Odelu V; Wazid M; Kumari S
    Comput Methods Programs Biomed; 2016 Oct; 135():167-85. PubMed ID: 27586489
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Macromolecular crowding: chemistry and physics meet biology (Ascona, Switzerland, 10-14 June 2012).
    Foffi G; Pastore A; Piazza F; Temussi PA
    Phys Biol; 2013 Aug; 10(4):040301. PubMed ID: 23912807
    [TBL] [Abstract][Full Text] [Related]  

  • 20. MTD-Diorama: Moving Target Defense Visualization Engine for Systematic Cybersecurity Strategy Orchestration.
    Lee SH; Kim K; Kim Y; Park KW
    Sensors (Basel); 2024 Jul; 24(13):. PubMed ID: 39001148
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.