These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

198 related articles for article (PubMed ID: 36236412)

  • 1. SecIoTComm: An Actor-Based Model and Framework for Secure IoT Communication.
    Eze K; Ahmed AA; Akujuobi C
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236412
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 3. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112389
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.
    Honar Pajooh H; Rashid M; Alam F; Demidenko S
    Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33430274
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Edge Computing, IoT and Social Computing in Smart Energy Scenarios.
    Sittón-Candanedo I; Alonso RS; García Ó; Muñoz L; Rodríguez-González S
    Sensors (Basel); 2019 Jul; 19(15):. PubMed ID: 31370149
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 7. BEST-Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment.
    Bhawana ; Kumar S; Rathore RS; Mahmud M; Kaiwartya O; Lloret J
    Sensors (Basel); 2022 Jul; 22(15):. PubMed ID: 35957292
    [TBL] [Abstract][Full Text] [Related]  

  • 8. IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.
    Sadique KM; Rahmani R; Johannesson P
    Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33207820
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Real-Time Scheduling in IoT Applications: A Systematic Review.
    Abolhassani Khajeh S; Saberikamarposhti M; Rahmani AM
    Sensors (Basel); 2022 Dec; 23(1):. PubMed ID: 36616830
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Fractional chaotic maps based short signature scheme under human-centered IoT environments.
    Meshram C; Ibrahim RW; Obaid AJ; Meshram SG; Meshram A; El-Latif AMA
    J Adv Res; 2021 Sep; 32():139-148. PubMed ID: 34484833
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare.
    Hosseinzadeh M; Yoo J; Ali S; Lansky J; Mildeova S; Yousefpoor MS; Ahmed OH; Rahmani AM; Tightiz L
    Sci Rep; 2023 Jul; 13(1):11058. PubMed ID: 37422490
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Attred: Attribute Based Resource Discovery for IoT.
    Kamel MBM; Yan Y; Ligeti P; Reich C
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300461
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security at the Edge for Resource-Limited IoT Devices.
    Canavese D; Mannella L; Regano L; Basile C
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257680
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
    Pardeshi MS; Sheu RK; Yuan SM
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.
    Diro A; Chilamkurti N; Nguyen VD; Heyne W
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure Communications for Resource-Constrained IoT Devices.
    Taha AM; Rashwan AM; Hassanein HS
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32610438
    [TBL] [Abstract][Full Text] [Related]  

  • 17. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
    Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Security Requirements for the Internet of Things: A Systematic Approach.
    Pal S; Hitchens M; Rabehaja T; Mukhopadhyay S
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33086542
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms.
    Jamil F; Kahng HK; Kim S; Kim DH
    Sensors (Basel); 2021 Feb; 21(5):. PubMed ID: 33652773
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.
    Tariq U; Ahmed I; Bashir AK; Shaukat K
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112457
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.