Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Search Results
3 results
Filters applied: . Clear all
Page 1
Verification of De-Identification Techniques for Personal Information Using Tree-Based Methods with Shapley Values.
J Pers Med. 2022 Jan 31;12(2):190. doi: 10.3390/jpm12020190.
J Pers Med. 2022.
PMID: 35207676
Free PMC article.
Cooperative Friendly Jamming Techniques for Drone-Based Mobile Secure Zone.
Jeon GH, Lee JH, Sung YS, Park HJ, Lee YJ, Yun SW, Lee IG.
Jeon GH, et al.
Sensors (Basel). 2022 Jan 24;22(3):865. doi: 10.3390/s22030865.
Sensors (Basel). 2022.
PMID: 35161611
Free PMC article.
Item in Clipboard
Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology.
Park NE, Park SH, Oh YS, Moon JH, Lee IG.
Park NE, et al.
Sensors (Basel). 2022 Jan 12;22(2):579. doi: 10.3390/s22020579.
Sensors (Basel). 2022.
PMID: 35062539
Free PMC article.
Item in Clipboard
Cite
Cite