These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

114 related articles for article (PubMed ID: 39204846)

  • 41. A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.
    Muzammal SM; Murugesan RK; Jhanjhi NZ; Humayun M; Ibrahim AO; Abdelmaboud A
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146400
    [TBL] [Abstract][Full Text] [Related]  

  • 42. A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems.
    Meziane H; Ouerdi N
    Sci Rep; 2023 Dec; 13(1):21255. PubMed ID: 38040952
    [TBL] [Abstract][Full Text] [Related]  

  • 43. Blockchain and IoT Integration: A Systematic Survey.
    Panarello A; Tapas N; Merlino G; Longo F; Puliafito A
    Sensors (Basel); 2018 Aug; 18(8):. PubMed ID: 30082633
    [TBL] [Abstract][Full Text] [Related]  

  • 44. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions.
    Bagga P; Das AK; Chamola V; Guizani M
    Telecommun Syst; 2022; 81(1):125-173. PubMed ID: 35879968
    [TBL] [Abstract][Full Text] [Related]  

  • 45. Decades of Internet of Things Towards Twenty-first Century: A Research-Based Introspective.
    Nagajayanthi B
    Wirel Pers Commun; 2022; 123(4):3661-3697. PubMed ID: 34812221
    [TBL] [Abstract][Full Text] [Related]  

  • 46. Untargeted white-box adversarial attack to break into deep leaning based COVID-19 monitoring face mask detection system.
    Sheikh BUH; Zafar A
    Multimed Tools Appl; 2023 May; ():1-27. PubMed ID: 37362697
    [TBL] [Abstract][Full Text] [Related]  

  • 47. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.
    Mahalingam A; Perumal G; Subburayalu G; Albathan M; Altameem A; Almakki RS; Hussain A; Abbas Q
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836874
    [TBL] [Abstract][Full Text] [Related]  

  • 48. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.
    Mrabet H; Belguith S; Alhomoud A; Jemai A
    Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178
    [TBL] [Abstract][Full Text] [Related]  

  • 49. Internet of Nano-Things (IoNT): A Comprehensive Review from Architecture to Security and Privacy Challenges.
    Alabdulatif A; Thilakarathne NN; Lawal ZK; Fahim KE; Zakari RY
    Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36905010
    [TBL] [Abstract][Full Text] [Related]  

  • 50. State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things.
    Ankergård SFJJ; Dushku E; Dragoni N
    Sensors (Basel); 2021 Feb; 21(5):. PubMed ID: 33668796
    [TBL] [Abstract][Full Text] [Related]  

  • 51. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology.
    Razaque A; Yoo J; Bektemyssova G; Alshammari M; Chinibayeva TT; Amanzholova S; Alotaibi A; Umutkulov D
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139535
    [TBL] [Abstract][Full Text] [Related]  

  • 52. Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection.
    Karthikeyan M; Manimegalai D; RajaGopal K
    Sci Rep; 2024 Jan; 14(1):231. PubMed ID: 38168562
    [TBL] [Abstract][Full Text] [Related]  

  • 53. An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection.
    Kareem SS; Mostafa RR; Hashim FA; El-Bakry HM
    Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214297
    [TBL] [Abstract][Full Text] [Related]  

  • 54. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review.
    Majid M; Habib S; Javed AR; Rizwan M; Srivastava G; Gadekallu TR; Lin JC
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336261
    [TBL] [Abstract][Full Text] [Related]  

  • 55. A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique.
    Alghofaili Y; Rassam MA
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112155
    [TBL] [Abstract][Full Text] [Related]  

  • 56. Robust Medical Diagnosis: A Novel Two-Phase Deep Learning Framework for Adversarial Proof Disease Detection in Radiology Images.
    Haque SBU; Zafar A
    J Imaging Inform Med; 2024 Feb; 37(1):308-338. PubMed ID: 38343214
    [TBL] [Abstract][Full Text] [Related]  

  • 57. Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets.
    Gyamfi E; Jurcut A
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632153
    [TBL] [Abstract][Full Text] [Related]  

  • 58. A systematic and comprehensive review and investigation of intelligent IoT-based healthcare systems in rural societies and governments.
    Ge Y; Zhang G; Meqdad MN; Chen S
    Artif Intell Med; 2023 Dec; 146():102702. PubMed ID: 38042611
    [TBL] [Abstract][Full Text] [Related]  

  • 59. Security at the Edge for Resource-Limited IoT Devices.
    Canavese D; Mannella L; Regano L; Basile C
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257680
    [TBL] [Abstract][Full Text] [Related]  

  • 60. Cyber-Internet Security Framework to Conquer Energy-Related Attacks on the Internet of Things with Machine Learning Techniques.
    Kumar A; Dhabliya D; Agarwal P; Aneja N; Dadheech P; Jamal SS; Antwi OA
    Comput Intell Neurosci; 2022; 2022():8803586. PubMed ID: 36210975
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.