These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

141 related articles for article (PubMed ID: 38136475)

  • 1. Theory and Application of Zero Trust Security: A Brief Survey.
    Kang H; Liu G; Wang Q; Meng L; Liu J
    Entropy (Basel); 2023 Nov; 25(12):. PubMed ID: 38136475
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Research on Medical Security System Based on Zero Trust.
    Wang Z; Yu X; Xue P; Qu Y; Ju L
    Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050834
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.
    Alotaibi B
    Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687926
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review.
    Rahmani MKI; Shuaib M; Alam S; Siddiqui ST; Ahmad S; Bhatia S; Mashat A
    Comput Intell Neurosci; 2022; 2022():9766844. PubMed ID: 35634070
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
    Kayes ASM; Kalaria R; Sarker IH; Islam MS; Watters PA; Ng A; Hammoudeh M; Badsha S; Kumara I
    Sensors (Basel); 2020 Apr; 20(9):. PubMed ID: 32349242
    [TBL] [Abstract][Full Text] [Related]  

  • 6. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
    Tariq N; Asim M; Al-Obeidat F; Zubair Farooqi M; Baker T; Hammoudeh M; Ghafir I
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013993
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology.
    Sultana M; Hossain A; Laila F; Taher KA; Islam MN
    BMC Med Inform Decis Mak; 2020 Oct; 20(1):256. PubMed ID: 33028318
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An intelligent zero trust secure framework for software defined networking.
    Guo X; Xian H; Feng T; Jiang Y; Zhang D; Fang J
    PeerJ Comput Sci; 2023; 9():e1674. PubMed ID: 38077550
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic.
    Mandal S; Khan DA; Jain S
    New Gener Comput; 2021; 39(3-4):599-622. PubMed ID: 34219861
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security issues and challenges in cloud of things-based applications for industrial automation.
    Pandey NK; Kumar K; Saini G; Mishra AK
    Ann Oper Res; 2023 Mar; ():1-20. PubMed ID: 37361100
    [TBL] [Abstract][Full Text] [Related]  

  • 11. AgriTrust-A Trust Management Approach for Smart Agriculture in Cloud-based Internet of Agriculture Things.
    Awan KA; Ud Din I; Almogren A; Almajed H
    Sensors (Basel); 2020 Oct; 20(21):. PubMed ID: 33138295
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An Ontology-Based Cybersecurity Framework for the Internet of Things.
    Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Zero trust in edge computing environment: a blockchain based practical scheme.
    Li D; Zhang E; Lei M; Song C
    Math Biosci Eng; 2022 Feb; 19(4):4196-4216. PubMed ID: 35341294
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments.
    Wu TY; Meng Q; Kumari S; Zhang P
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632264
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Towards Double Defense Network Security Based on Multi-Identifier Network Architecture.
    Wang Y; Smahi A; Zhang H; Li H
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161493
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing.
    Uslu S; Kaur D; Durresi M; Durresi A
    Sensors (Basel); 2022 Dec; 22(24):. PubMed ID: 36560272
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Internet of things security evaluation mechanism based on meta attribute fluctuation.
    Liu Z; Yuan Y; Zhao B; Wang Y
    PLoS One; 2023; 18(7):e0282630. PubMed ID: 37450503
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review.
    Tariq U; Ahmed I; Bashir AK; Shaukat K
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112457
    [TBL] [Abstract][Full Text] [Related]  

  • 19. IoT Security Configurability with Security-by-Contract.
    Giaretta A; Dragoni N; Massacci F
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31548501
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm.
    Wu TY; Kong F; Wang L; Chen YC; Kumari S; Pan JS
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501875
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.