These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

172 related articles for article (PubMed ID: 37688011)

  • 1. Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach.
    Hammad M; Jillani RM; Ullah S; Namoun A; Tufail A; Kim KH; Shah H
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37688011
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Systematic review on modification to the
    Alameri I; Komarkova J; Al-Hadhrami T; Lotfi A
    PeerJ Comput Sci; 2022; 8():e1079. PubMed ID: 36091998
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Efficient Dynamic Solution for the Detection and Prevention of Black Hole Attack in VANETs.
    Malik A; Khan MZ; Faisal M; Khan F; Seo JT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35271043
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Lightweight Payload Encryption-Based Authentication Scheme for Advanced Metering Infrastructure Sensor Networks.
    Abosata N; Al-Rubaye S; Inalhan G
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062494
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token.
    Yang YS; Lee SH; Wang JM; Yang CS; Huang YM; Hou TW
    Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430882
    [TBL] [Abstract][Full Text] [Related]  

  • 6. THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.
    Arshad D; Asim M; Tariq N; Baker T; Tawfik H; Al-Jumeily Obe D
    PLoS One; 2022; 17(7):e0271277. PubMed ID: 35901074
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure malicious node detection in flying ad-hoc networks using enhanced AODV algorithm.
    Chandrasekar V; Shanmugavalli V; Mahesh TR; Shashikumar R; Borah N; Kumar VV; Guluwadi S
    Sci Rep; 2024 Apr; 14(1):7818. PubMed ID: 38570527
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective.
    Xu H; Yu W; Griffith D; Golmie N
    IEEE Access; 2018; 6():. PubMed ID: 35531371
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.
    Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA
    Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Intelligent dynamic trust secure attacker detection routing for WSN-IoT networks.
    Kiruthika B; P SB
    Math Biosci Eng; 2023 Jan; 20(2):4243-4257. PubMed ID: 36899625
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Survey on the Role of Industrial IoT in Manufacturing for Implementation of Smart Industry.
    Farooq MS; Abdullah M; Riaz S; Alvi A; Rustam F; Flores MAL; Galán JC; Samad MA; Ashraf I
    Sensors (Basel); 2023 Nov; 23(21):. PubMed ID: 37960657
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Big datasets of optical-wireless cyber-physical systems for optimizing manufacturing services in the internet of things-enabled industry 4.0.
    Faheem M; Butt RA
    Data Brief; 2022 Jun; 42():108026. PubMed ID: 35330737
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks.
    Rani P; Kavita ; Verma S; Kaur N; Wozniak M; Shafi J; Ijaz MF
    Sensors (Basel); 2021 Dec; 22(1):. PubMed ID: 35274628
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 15. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.
    You I; Kwon S; Choudhary G; Sharma V; Seo JT
    Sensors (Basel); 2018 Jun; 18(6):. PubMed ID: 29890704
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
    Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
    PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
    [TBL] [Abstract][Full Text] [Related]  

  • 17. T2AR: trust-aware ad-hoc routing protocol for MANET.
    Dhananjayan G; Subbiah J
    Springerplus; 2016; 5(1):995. PubMed ID: 27441127
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.
    Khan F; Rehman AU; Yahya A; Jan MA; Chuma J; Tan Z; Hussain K
    Sensors (Basel); 2019 Oct; 19(19):. PubMed ID: 31590452
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Networked control system with MANET communication and AODV routing.
    Bhatia A; Kumar A; Jain A; Kumar A; Verma C; Illes Z; Aschilean I; Raboaca MS
    Heliyon; 2022 Nov; 8(11):e11678. PubMed ID: 36439715
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Anomaly Detection in a Smart Industrial Machinery Plant Using IoT and Machine Learning.
    Jaramillo-Alcazar A; Govea J; Villegas-Ch W
    Sensors (Basel); 2023 Oct; 23(19):. PubMed ID: 37837116
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.