These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

161 related articles for article (PubMed ID: 36991781)

  • 1. Hybrid IoT Cyber Range.
    Balto KE; Yamin MM; Shalaginov A; Katt B
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991781
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Addressing the Security Gap in IoT: Towards an IoT Cyber Range.
    Nock O; Starkey J; Angelopoulos CM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32971956
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Security Requirements of Internet of Things-Based Healthcare System: a Survey Study.
    Nasiri S; Sadoughi F; Tadayon MH; Dehnad A
    Acta Inform Med; 2019 Dec; 27(4):253-258. PubMed ID: 32055092
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge.
    Radanliev P; De Roure D; Van Kleek M; Ani U; Burnap P; Anthi E; Nurse JRC; Santos O; Montalvo RM; Maddox L
    Environ Syst Decis; 2021; 41(2):236-247. PubMed ID: 33251087
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Automatic Verification and Execution of Cyber Attack on IoT Devices.
    Færøy FL; Yamin MM; Shukla A; Katt B
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679532
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems.
    Johnson AP; Al-Aqrabi H; Hill R
    Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32033269
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Hardware Security of Fog End-Devices for the Internet of Things.
    Butun I; Sari A; Österberg P
    Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33050165
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Multi-Source Knowledge Reasoning for Data-Driven IoT Security.
    Zhang S; Bai G; Li H; Liu P; Zhang M; Li S
    Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833653
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective.
    Park M; Oh H; Lee K
    Sensors (Basel); 2019 May; 19(9):. PubMed ID: 31075883
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.
    Ali B; Awad AI
    Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.
    Radanliev P; De Roure D; Burnap P; Santos O
    Rev Socionetwork Strateg; 2021; 15(2):381-411. PubMed ID: 35506054
    [TBL] [Abstract][Full Text] [Related]  

  • 13. SAR.IoT: Secured Augmented Reality for IoT Devices Management.
    Fuentes D; Correia L; Costa N; Reis A; Barroso J; Pereira A
    Sensors (Basel); 2021 Sep; 21(18):. PubMed ID: 34577208
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.
    Liu Z; Thapa N; Shaver A; Roy K; Siddula M; Yuan X; Yu A
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300574
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities.
    Li S; Song H; Iqbal M
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31027162
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures.
    Roldán-Gómez J; Boubeta-Puig J; Pachacama-Castillo G; Ortiz G; Martínez JL
    PeerJ Comput Sci; 2021; 7():e787. PubMed ID: 34901434
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Leveraging a novel NFT-enabled blockchain architecture for the authentication of IoT assets in smart cities.
    Khalil U; Malik OA; Hong OW; Uddin M
    Sci Rep; 2023 Nov; 13(1):19785. PubMed ID: 37957161
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.