These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
134 related articles for article (PubMed ID: 38475211)
1. BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Papathanasiou A; Liontos G; Paparis G; Liagkou V; Glavas E Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475211 [TBL] [Abstract][Full Text] [Related]
2. A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Alawida M; Omolara AE; Abiodun OI; Al-Rajab M J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180 [TBL] [Abstract][Full Text] [Related]
3. A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication. Obaidat M; Brown J; Obeidat S; Rawashdeh M Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751189 [TBL] [Abstract][Full Text] [Related]
4. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354 [No Abstract] [Full Text] [Related]
5. Adaptive visual cryptography scheme design based on QR codes. Zhang LN; Cui CY; Zhang XY; Wu W Math Biosci Eng; 2022 Aug; 19(12):12160-12179. PubMed ID: 36653991 [TBL] [Abstract][Full Text] [Related]
6. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment. King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C Front Psychol; 2018; 9():39. PubMed ID: 29459838 [TBL] [Abstract][Full Text] [Related]
7. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets. Aqeel S; Khan SU; Khan AS; Alharbi M; Shah S; Affendi ME; Ahmad N Sci Rep; 2024 Jun; 14(1):13839. PubMed ID: 38879689 [TBL] [Abstract][Full Text] [Related]
8. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code. Wan S; Yang GZ; Qi LL; Li LL; Yan XH; Lu YL Math Biosci Eng; 2019 Jul; 16(6):6367-6385. PubMed ID: 31698567 [TBL] [Abstract][Full Text] [Related]
9. Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication. Wang S; Huang K; Xu X; Hu X; Yang J; Jin L Entropy (Basel); 2022 Mar; 24(4):. PubMed ID: 35455151 [TBL] [Abstract][Full Text] [Related]
10. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks. Li C; Zhang X; Wang H; Li D Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29324719 [TBL] [Abstract][Full Text] [Related]
11. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study. He Y; Zamani E; Yevseyeva I; Luo C J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723 [TBL] [Abstract][Full Text] [Related]
12. Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token. Yang YS; Lee SH; Wang JM; Yang CS; Huang YM; Hou TW Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430882 [TBL] [Abstract][Full Text] [Related]
13. Two-level QR code scheme based on region matrix image secret sharing algorithm. Zhang LN; Sun JQ; Zhang XY; Chen QP; Zhang J Math Biosci Eng; 2023 Aug; 20(9):16678-16704. PubMed ID: 37920029 [TBL] [Abstract][Full Text] [Related]
14. Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Yaacoub JA; Noura HN; Salman O; Chehab A Int J Inf Secur; 2022; 21(1):115-158. PubMed ID: 33776611 [TBL] [Abstract][Full Text] [Related]
15. CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks. Baek Y; Shin S Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408251 [TBL] [Abstract][Full Text] [Related]
16. Secure Vehicular Platoon Management against Sybil Attacks. Junaidi DR; Ma M; Su R Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433596 [TBL] [Abstract][Full Text] [Related]
17. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. Xu T; Singh K; Rajivan P Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509 [TBL] [Abstract][Full Text] [Related]
18. Speckle visual cryptography for credential authentication. Jiao A; Zhu Y; Mi Z; Zhou X; Zhu Q; Ke C; Shi Y Appl Opt; 2024 Jun; 63(16):4351-4359. PubMed ID: 38856613 [TBL] [Abstract][Full Text] [Related]
19. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks. Wan Y; Cao J Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353 [TBL] [Abstract][Full Text] [Related]