BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

226 related articles for article (PubMed ID: 36426265)

  • 1. A systematic review of routing attacks detection in wireless sensor networks.
    Alansari Z; Anuar NB; Kamsin A; Belgaum MR
    PeerJ Comput Sci; 2022; 8():e1135. PubMed ID: 36426265
    [TBL] [Abstract][Full Text] [Related]  

  • 2. RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things.
    Alansari Z; Anuar NB; Kamsin A; Belgaum MR
    PeerJ Comput Sci; 2023; 9():e1309. PubMed ID: 37346586
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.
    Mathur A; Newe T; Rao M
    Sensors (Basel); 2016 Jan; 16(1):. PubMed ID: 26797620
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A survey of Sybil attack countermeasures in IoT-based wireless sensor networks.
    Arshad A; Mohd Hanapi Z; Subramaniam S; Latip R
    PeerJ Comput Sci; 2021; 7():e673. PubMed ID: 34712787
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
    Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
    Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

  • 8. THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.
    Arshad D; Asim M; Tariq N; Baker T; Tawfik H; Al-Jumeily Obe D
    PLoS One; 2022; 17(7):e0271277. PubMed ID: 35901074
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review.
    Majid M; Habib S; Javed AR; Rizwan M; Srivastava G; Gadekallu TR; Lin JC
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336261
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
    Alajmi N; Elleithy K
    Sensors (Basel); 2015 Nov; 15(11):29332-45. PubMed ID: 26610499
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.
    Farooq U; Asim M; Tariq N; Baker T; Awad AI
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746321
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.
    Zahra F; Jhanjhi NZ; Brohi SN; Khan NA; Masud M; AlZain MA
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146111
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Geographic wormhole detection in wireless sensor networks.
    Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
    PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.
    Dhamodharan US; Vayanaperumal R
    ScientificWorldJournal; 2015; 2015():841267. PubMed ID: 26236773
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks.
    Khan S; Khan MA; Alnazzawi N
    Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475178
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.
    Khan F; Rehman AU; Yahya A; Jan MA; Chuma J; Tan Z; Hussain K
    Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590452
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks.
    Fu H; Liu Y; Dong Z; Wu Y
    Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31861510
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A survey on clustering routing protocols in wireless sensor networks.
    Liu X
    Sensors (Basel); 2012; 12(8):11113-53. PubMed ID: 23112649
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Tactile Routing for Location Privacy Preservation in Wireless Sensor Networks: A Game Theoretic Approach.
    Syed MN; Baroudi U
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236429
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 12.