These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
134 related articles for article (PubMed ID: 25136688)
1. Automating risk analysis of software design models. Frydman M; Ruiz G; Heymann E; César E; Miller BP ScientificWorldJournal; 2014; 2014():805856. PubMed ID: 25136688 [TBL] [Abstract][Full Text] [Related]
2. A Framework for Cybersecurity Requirements Management in the Automotive Domain. Luo F; Jiang Y; Wang J; Li Z; Zhang X Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430891 [TBL] [Abstract][Full Text] [Related]
3. Design and implementation of secure medical database systems. Pangalos GJ Med Inform (Lond); 1995; 20(3):265-77. PubMed ID: 8882564 [TBL] [Abstract][Full Text] [Related]
4. Security threats and solutions in distributed, interoperable health information systems using middleware. Blobel B; Holena M Stud Health Technol Inform; 1997; 45():66-73. PubMed ID: 10175374 [TBL] [Abstract][Full Text] [Related]
5. An Efficient Identification of Security Threats in Requirement Engineering Methodology. Subha R; Haldorai A Comput Intell Neurosci; 2022; 2022():1872079. PubMed ID: 36035846 [TBL] [Abstract][Full Text] [Related]
6. Secure medical databases: design and operation. Pangalos GJ Int J Biomed Comput; 1996 Oct; 43(1-2):53-60. PubMed ID: 8960922 [TBL] [Abstract][Full Text] [Related]
11. Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring. Levshun D; Chechulin A; Kotenko I Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960544 [TBL] [Abstract][Full Text] [Related]
12. A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development. Ansari MTJ; Al-Zahrani FA; Pandey D; Agrawal A BMC Med Inform Decis Mak; 2020 Sep; 20(1):236. PubMed ID: 32948169 [TBL] [Abstract][Full Text] [Related]
13. Modeling risk in distributed healthcare information systems. Maglogiannis I; Zafiropoulos E Conf Proc IEEE Eng Med Biol Soc; 2006; 2006():5447-50. PubMed ID: 17945902 [TBL] [Abstract][Full Text] [Related]
14. Adoption of Deep-Learning Models for Managing Threat in API Calls with Transparency Obligation Practice for Overall Resilience. Basheer N; Islam S; Alwaheidi MKS; Papastergiou S Sensors (Basel); 2024 Jul; 24(15):. PubMed ID: 39123906 [TBL] [Abstract][Full Text] [Related]
15. Development and evaluation of SOA-based AAL services in real-life environments: a case study and lessons learned. Stav E; Walderhaug S; Mikalsen M; Hanke S; Benc I Int J Med Inform; 2013 Nov; 82(11):e269-93. PubMed ID: 21481634 [TBL] [Abstract][Full Text] [Related]
16. Simulation of Attacks for Security in Wireless Sensor Network. Diaz A; Sanchez P Sensors (Basel); 2016 Nov; 16(11):. PubMed ID: 27869710 [TBL] [Abstract][Full Text] [Related]
17. Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP. Althar RR; Samanta D; Kaur M; Alnuaim AA; Aljaffan N; Aman Ullah M Comput Intell Neurosci; 2021; 2021():8522839. PubMed ID: 34987569 [TBL] [Abstract][Full Text] [Related]
18. A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments. Ramalingam S; Gan H; Epiphaniou G; Mistretta E Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32937974 [TBL] [Abstract][Full Text] [Related]
19. Challenges With Developing Secure Mobile Health Applications: Systematic Review. Aljedaani B; Babar MA JMIR Mhealth Uhealth; 2021 Jun; 9(6):e15654. PubMed ID: 34152277 [TBL] [Abstract][Full Text] [Related]
20. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring. Griggs KN; Ossipova O; Kohlios CP; Baccarini AN; Howson EA; Hayajneh T J Med Syst; 2018 Jun; 42(7):130. PubMed ID: 29876661 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]