These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

134 related articles for article (PubMed ID: 36904809)

  • 21. Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network.
    Guerrero-Sanchez AE; Rivas-Araiza EA; Gonzalez-Cordoba JL; Toledano-Ayala M; Takacs A
    Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32423025
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.
    Shakhov V; Koo I
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29882784
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Suppression Attack Against Multicast Protocol in Low Power and Lossy Networks: Analysis and Defenses.
    Pu C; Zhou X
    Sensors (Basel); 2018 Sep; 18(10):. PubMed ID: 30261619
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Survivability-Enhanced Virtual Network Embedding Strategy in Virtualized Wireless Sensor Networks.
    Wu D; Liu Z; Yang Z; Zhang P; Wang R; Ma X
    Sensors (Basel); 2020 Dec; 21(1):. PubMed ID: 33396380
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Security Control of Denial-of-Service Attacks in Cyber-Physical Systems Based on Dynamic Feedback.
    Wang Y; Hu B; Pan X; Xu T; Sun Q
    Comput Intell Neurosci; 2022; 2022():5472137. PubMed ID: 35733578
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL).
    Chen Y; Chanet JP; Hou KM; Shi H; de Sousa G
    Sensors (Basel); 2015 Aug; 15(8):19507-40. PubMed ID: 26266411
    [TBL] [Abstract][Full Text] [Related]  

  • 27. SDN Architecture for 6LoWPAN Wireless Sensor Networks.
    Miguel MLF; Jamhour E; Pellenz ME; Penna MC
    Sensors (Basel); 2018 Nov; 18(11):. PubMed ID: 30400194
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Energy and Delay Aware Data Aggregation in Routing Protocol for Internet of Things.
    Sennan S; Balasubramaniyam S; Luhach AK; Ramasubbareddy S; Chilamkurti N; Nam Y
    Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31842437
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.
    Muzammal SM; Murugesan RK; Jhanjhi NZ; Humayun M; Ibrahim AO; Abdelmaboud A
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146400
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs' Lifetime.
    Ahmad R; Wazirali R; Bsoul Q; Abu-Ain T; Abu-Ain W
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300561
    [TBL] [Abstract][Full Text] [Related]  

  • 31. CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things.
    Sankar S; Ramasubbareddy S; Luhach AK; Nayyar A; Qureshi B
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33081218
    [TBL] [Abstract][Full Text] [Related]  

  • 32. TSCH and RPL Joining Time Model for Industrial Wireless Sensor Networks.
    Vera-Pérez J; Silvestre-Blanes J; Sempere-Payá V
    Sensors (Basel); 2021 Jun; 21(11):. PubMed ID: 34198793
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks.
    Keum D; Ko YB
    Sensors (Basel); 2022 May; 22(11):. PubMed ID: 35684595
    [TBL] [Abstract][Full Text] [Related]  

  • 34. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.
    Taboun MS; Brennan RW
    Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28906452
    [TBL] [Abstract][Full Text] [Related]  

  • 35. LoRaWan Sensitivity Analysis and Prevention Strategies Against Wireless DoS Attacks.
    Prasad N; Lynggaard P
    Wirel Pers Commun; 2022; 126(4):3663-3675. PubMed ID: 35756171
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Towards Sustainable Distributed Sensor Networks: An Approach for Addressing Power Limitation Issues in WSNs.
    Alaerjan A
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679770
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
    Morales-Molina CD; Hernandez-Suarez A; Sanchez-Perez G; Toscano-Medina LK; Perez-Meana H; Olivares-Mercado J; Portillo-Portillo J; Sanchez V; Garcia-Villalba LJ
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34063577
    [TBL] [Abstract][Full Text] [Related]  

  • 38. A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks.
    Osanaiye O; Alfa AS; Hancke GP
    Sensors (Basel); 2018 May; 18(6):. PubMed ID: 29794994
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.
    Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA
    Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975
    [TBL] [Abstract][Full Text] [Related]  

  • 40. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things.
    Al-Amiedy TA; Anbar M; Belaton B; Kabla AHH; Hasbullah IH; Alashhab ZR
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591090
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.