These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

301 related articles for article (PubMed ID: 36298399)

  • 1. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Energy-efficient boarder node medium access control protocol for wireless sensor networks.
    Razaque A; Elleithy KM
    Sensors (Basel); 2014 Mar; 14(3):5074-117. PubMed ID: 24625737
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Towards a Secure Thermal-Energy Aware Routing Protocol in Wireless Body Area Network Based on Blockchain Technology.
    Shahbazi Z; Byun YC
    Sensors (Basel); 2020 Jun; 20(12):. PubMed ID: 32604851
    [TBL] [Abstract][Full Text] [Related]  

  • 4. SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network.
    Erskine SK; Chi H; Elleithy A
    Sensors (Basel); 2023 Jun; 23(11):. PubMed ID: 37299998
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Lightweight Authentication MAC Protocol for CR-WSNs.
    Aloufi BO; Alhakami W
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850612
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.
    Adnan AI; Hanapi ZM; Othman M; Zukarnain ZA
    PLoS One; 2017; 12(1):e0170273. PubMed ID: 28121992
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks.
    Awan S; Javaid N; Ullah S; Khan AU; Qamar AM; Choi JG
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062371
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Simulation of Attacks for Security in Wireless Sensor Network.
    Diaz A; Sanchez P
    Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A feedback-based secure path approach for wireless sensor network data collection.
    Mao Y; Wei G
    Sensors (Basel); 2010; 10(10):9529-40. PubMed ID: 22163424
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A secure cluster-based multipath routing protocol for WMSNs.
    Almalkawi IT; Zapata MG; Al-Karaki JN
    Sensors (Basel); 2011; 11(4):4401-24. PubMed ID: 22163854
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.
    Banković Z; Fraga D; Moya JM; Vallejo JC
    Sensors (Basel); 2012; 12(8):10834-50. PubMed ID: 23112632
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Energy-efficiency analysis of a distributed queuing medium access control protocol for biomedical wireless sensor networks in saturation conditions.
    Otal B; Alonso L; Verikoukis C
    Sensors (Basel); 2011; 11(2):1277-96. PubMed ID: 22319351
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Energy-Efficient and Secure Opportunistic Routing Protocol for WSN: Performance Analysis with Nature-Inspired Algorithms and Its Application in Biomedical Applications.
    Bangotra DK; Singh Y; Kumar N; Kumar Singh P; Ojeniyi A
    Biomed Res Int; 2022; 2022():1976694. PubMed ID: 35372577
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Efficient Multilevel Probabilistic Model for Abnormal Traffic Detection in Wireless Sensor Networks.
    Khan MA; Nasralla MM; Umar MM; Ghani-Ur-Rehman ; Khan S; Choudhury N
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062372
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A schedule-based multi-channel MAC protocol for wireless sensor networks.
    Hamid MA; Abdullah-Al-Wadud M; Chong I
    Sensors (Basel); 2010; 10(10):9466-80. PubMed ID: 22163420
    [TBL] [Abstract][Full Text] [Related]  

  • 18. W-MAC: a workload-aware MAC protocol for heterogeneous convergecast in wireless sensor networks.
    Xia M; Dong Y; Lu D
    Sensors (Basel); 2011; 11(3):2505-24. PubMed ID: 22163753
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Location-aware dynamic session-key management for grid-based Wireless Sensor Networks.
    Chen CL; Lin IH
    Sensors (Basel); 2010; 10(8):7347-70. PubMed ID: 22163606
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.