These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

118 related articles for article (PubMed ID: 38341499)

  • 1. Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions.
    Bhatti DS; Saleem S; Imran A; Kim HJ; Kim KI; Lee KC
    Sci Rep; 2024 Feb; 14(1):3428. PubMed ID: 38341499
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A New MANET wormhole detection algorithm based on traversal time and hop count analysis.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2011; 11(12):11122-40. PubMed ID: 22247657
    [TBL] [Abstract][Full Text] [Related]  

  • 3. DLSMR: Deep Learning-Based Secure Multicast Routing Protocol against Wormhole Attack in Flying Ad Hoc Networks with Cell-Free Massive Multiple-Input Multiple-Output.
    Pramitarini Y; Perdana RHY; Shim K; An B
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37766016
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm.
    Karlsson J; Dooley LS; Pulkkis G
    Sensors (Basel); 2013 May; 13(5):6651-68. PubMed ID: 23686143
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Geographic wormhole detection in wireless sensor networks.
    Sookhak M; Akhundzada A; Sookhak A; Eslaminejad M; Gani A; Khurram Khan M; Li X; Wang X
    PLoS One; 2015; 10(1):e0115324. PubMed ID: 25602616
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A wormhole attack detection method for tactical wireless sensor networks.
    Zhang K
    PeerJ Comput Sci; 2023; 9():e1449. PubMed ID: 37705659
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
    Jen SM; Laih CS; Kuo WC
    Sensors (Basel); 2009; 9(6):5022-39. PubMed ID: 22408566
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Networked control system with MANET communication and AODV routing.
    Bhatia A; Kumar A; Jain A; Kumar A; Verma C; Illes Z; Aschilean I; Raboaca MS
    Heliyon; 2022 Nov; 8(11):e11678. PubMed ID: 36439715
    [TBL] [Abstract][Full Text] [Related]  

  • 9. T2AR: trust-aware ad-hoc routing protocol for MANET.
    Dhananjayan G; Subbiah J
    Springerplus; 2016; 5(1):995. PubMed ID: 27441127
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.
    Hung LX; Canh NT; Lee S; Lee YK; Lee H
    Sensors (Basel); 2008 Dec; 8(12):7753-7782. PubMed ID: 27873956
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET.
    Shukla M; Joshi BK; Singh U
    Wirel Pers Commun; 2021; 121(1):503-526. PubMed ID: 34219973
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Artificial Neural Network-Based Mechanism to Detect Security Threats in Wireless Sensor Networks.
    Khan S; Khan MA; Alnazzawi N
    Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475178
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Systematic review on modification to the
    Alameri I; Komarkova J; Al-Hadhrami T; Lotfi A
    PeerJ Comput Sci; 2022; 8():e1079. PubMed ID: 36091998
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.
    Soundararajan R; Rajagopal M; Muthuramalingam A; Hossain E; Lloret J
    Sensors (Basel); 2022 Oct; 22(20):. PubMed ID: 36298399
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks.
    Lwin MT; Yim J; Ko YB
    Sensors (Basel); 2020 Jan; 20(3):. PubMed ID: 32012774
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.
    Abdelhaq M; Alsaqour R; Abdelhaq S
    PLoS One; 2015; 10(5):e0120715. PubMed ID: 25946001
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Adaptive MANET multipath routing algorithm based on the simulated annealing approach.
    Kim S
    ScientificWorldJournal; 2014; 2014():872526. PubMed ID: 25032241
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
    Saleem K; Derhab A; Orgun MA; Al-Muhtadi J; Rodrigues JJ; Khalil MS; Ali Ahmed A
    Sensors (Basel); 2016 Mar; 16(4):460. PubMed ID: 27043572
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Greedy data transportation scheme with hard packet deadlines for wireless ad hoc networks.
    Lee H
    ScientificWorldJournal; 2014; 2014():815123. PubMed ID: 25258736
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).
    Shaukat HR; Hashim F; Shaukat MA; Ali Alezabi K
    Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32316487
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.