These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

146 related articles for article (PubMed ID: 38276399)

  • 1. A Review of IoT Firmware Vulnerabilities and Auditing Techniques.
    Bakhshi T; Ghita B; Kuzminykh I
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276399
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Highly Secure IoT Firmware Update Mechanism Using Blockchain.
    Tsaur WJ; Chang JC; Chen CL
    Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062490
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.
    Noman HA; Abu-Sharkh OMF
    Sensors (Basel); 2023 Jun; 23(13):. PubMed ID: 37447915
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Framework to perform taint analysis and security assessment of IoT devices in smart cities.
    Bhardwaj A; Vishnoi A; Bharany S; Abdelmaboud A; Ibrahim AO; Mamoun M; Nagmeldin W
    PeerJ Comput Sci; 2023; 9():e1771. PubMed ID: 38192478
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
    Tariq N; Asim M; Al-Obeidat F; Zubair Farooqi M; Baker T; Hammoudeh M; Ghafir I
    Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013993
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Over-the-Air Firmware Updates for Constrained NB-IoT Devices.
    Mahfoudhi F; Sultania AK; Famaey J
    Sensors (Basel); 2022 Oct; 22(19):. PubMed ID: 36236673
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Implementing a high-efficiency similarity analysis approach for firmware code.
    Wang Y; Wang R; Jing J; Wang H
    PLoS One; 2021; 16(1):e0245098. PubMed ID: 33434199
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Secure LoRa Firmware Update with Adaptive Data Rate Techniques.
    Heeger D; Garigan M; Eleni Tsiropoulou E; Plusquellic J
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33808160
    [TBL] [Abstract][Full Text] [Related]  

  • 9. MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices.
    Sahlmann K; Clemens V; Nowak M; Schnor B
    Sensors (Basel); 2020 Dec; 21(1):. PubMed ID: 33374965
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Threat Modeling-How to Visualize Attacks on IOTA?
    Ullah I; de Roode G; Meratnia N; Havinga P
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33800712
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk.
    Agarwal S; Oser P; Lueders S
    Sensors (Basel); 2019 Sep; 19(19):. PubMed ID: 31547561
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.
    Diro A; Chilamkurti N; Nguyen VD; Heyne W
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Framework for Malicious Traffic Detection in IoT Healthcare Environment.
    Hussain F; Abbas SG; Shah GA; Pires IM; Fayyaz UU; Shahzad F; Garcia NM; Zdravevski E
    Sensors (Basel); 2021 Apr; 21(9):. PubMed ID: 33925813
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review.
    Zubaydi HD; Varga P; Molnár S
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679582
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology.
    Razaque A; Yoo J; Bektemyssova G; Alshammari M; Chinibayeva TT; Amanzholova S; Alotaibi A; Umutkulov D
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139535
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective.
    Xu H; Yu W; Griffith D; Golmie N
    IEEE Access; 2018; 6():. PubMed ID: 35531371
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms.
    Jamil F; Kahng HK; Kim S; Kim DH
    Sensors (Basel); 2021 Feb; 21(5):. PubMed ID: 33652773
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
    Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.