These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

128 related articles for article (PubMed ID: 36732583)

  • 1. A secure and dependable trust assessment (SDTS) scheme for industrial communication networks.
    Khan T; Singh K; Ahmad K; Ahmad KAB
    Sci Rep; 2023 Feb; 13(1):1910. PubMed ID: 36732583
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A robust trust establishment scheme for wireless sensor networks.
    Ishmanov F; Kim SW; Nam SY
    Sensors (Basel); 2015 Mar; 15(3):7040-61. PubMed ID: 25806875
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A secure trust establishment scheme for wireless sensor networks.
    Ishmanov F; Kim SW; Nam SY
    Sensors (Basel); 2014 Jan; 14(1):1877-97. PubMed ID: 24451471
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Evaluating Trust Management Frameworks for Wireless Sensor Networks.
    Gangwani P; Perez-Pons A; Upadhyay H
    Sensors (Basel); 2024 Apr; 24(9):. PubMed ID: 38732961
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Trusted Routing Scheme Using Blockchain and Reinforcement Learning for Wireless Sensor Networks.
    Yang J; He S; Xu Y; Chen L; Ren J
    Sensors (Basel); 2019 Feb; 19(4):. PubMed ID: 30823560
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs).
    Hosseinzadeh M; Yoo J; Ali S; Lansky J; Mildeova S; Yousefpoor MS; Ahmed OH; Rahmani AM; Tightiz L
    Sci Rep; 2023 Aug; 13(1):13046. PubMed ID: 37567984
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory.
    Feng R; Xu X; Zhou X; Wan J
    Sensors (Basel); 2011; 11(2):1345-60. PubMed ID: 22319355
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Information-Aware Secure Routing in Wireless Sensor Networks.
    Shi Q; Qin L; Ding Y; Xie B; Zheng J; Song L
    Sensors (Basel); 2019 Dec; 20(1):. PubMed ID: 31888095
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Sensor data security level estimation scheme for wireless sensor networks.
    Ramos A; Filho RH
    Sensors (Basel); 2015 Jan; 15(1):2104-36. PubMed ID: 25608215
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.
    Nirmal Raja K; Maraline Beno M
    J Med Syst; 2017 Jul; 41(7):107. PubMed ID: 28550503
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.
    Abdalzaher MS; Seddik K; Elsabrouty M; Muta O; Furukawa H; Abdel-Rahman A
    Sensors (Basel); 2016 Jun; 16(7):. PubMed ID: 27367700
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks.
    Awan S; Javaid N; Ullah S; Khan AU; Qamar AM; Choi JG
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062371
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
    Liu C; Li X
    Sensors (Basel); 2020 Mar; 20(6):. PubMed ID: 32178445
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Using trust to secure geographic and energy aware routing against multiple attacks.
    Zhang G; Zhang Y; Chen Z
    PLoS One; 2013; 8(10):e77488. PubMed ID: 24204842
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Reputation-based secure sensor localization in wireless sensor networks.
    He J; Xu J; Zhu X; Zhang Y; Zhang T; Fu W
    ScientificWorldJournal; 2014; 2014():308341. PubMed ID: 24982940
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.
    Ding C; Yang L; Wu M
    Sensors (Basel); 2017 Jan; 17(1):. PubMed ID: 28098846
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks.
    Teng Z; Li M; Yu L; Gu J; Li M
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139555
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks.
    Han G; Liu L; Jiang J; Shu L; Rodrigues JJ
    Sensors (Basel); 2016 Feb; 16(2):229. PubMed ID: 26891300
    [TBL] [Abstract][Full Text] [Related]  

  • 20. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.