These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

139 related articles for article (PubMed ID: 25254229)

  • 1. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks.
    Shorov A; Kotenko I
    ScientificWorldJournal; 2014; 2014():172583. PubMed ID: 25254229
    [TBL] [Abstract][Full Text] [Related]  

  • 2. On the security of a simple three-party key exchange protocol without server's public keys.
    Nam J; Choo KK; Park M; Paik J; Won D
    ScientificWorldJournal; 2014; 2014():479534. PubMed ID: 25258723
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Keeping HIEs safe.
    Goedert J
    Health Data Manag; 2009 Apr; 17(4):92-4, 96. PubMed ID: 19408569
    [No Abstract]   [Full Text] [Related]  

  • 4. High level security policies for health: from theory to practice.
    Defteraios S; Lambrinoudakis C; Gritzalis D
    Stud Health Technol Inform; 2004; 103():416-23. PubMed ID: 15747949
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Enhancing security and improving interoperability in healthcare information systems.
    Gritzalis DA
    Med Inform (Lond); 1998; 23(4):309-23. PubMed ID: 9922951
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.
    Yang A; Nam J; Kim M; Choo KK
    ScientificWorldJournal; 2014; 2014():825984. PubMed ID: 25276863
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Protection of Location Privacy Based on Distributed Collaborative Recommendations.
    Wang P; Yang J; Zhang JP
    PLoS One; 2016; 11(9):e0163053. PubMed ID: 27649308
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Standard guide for EDI (HL7) communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():153-81; discussion 229-37. PubMed ID: 15458166
    [No Abstract]   [Full Text] [Related]  

  • 9. Standard guide for implementing HL7 communication security.
    Blobel B; Spiegel V; Pharow P; Engel K; Krohn R
    Stud Health Technol Inform; 2002; 69():183-219; discussion 229-37. PubMed ID: 15458167
    [No Abstract]   [Full Text] [Related]  

  • 10. A security architecture for health information networks.
    Kailar R; Muralidhar V
    AMIA Annu Symp Proc; 2007 Oct; 2007():379-83. PubMed ID: 18693862
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Use of the ISO/IEC 17799 framework in healthcare information security management.
    Posthumus L
    Stud Health Technol Inform; 2004; 103():447-52. PubMed ID: 15747954
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Network anomaly detection system with optimized DS evidence theory.
    Liu Y; Wang X; Liu K
    ScientificWorldJournal; 2014; 2014():753659. PubMed ID: 25254258
    [TBL] [Abstract][Full Text] [Related]  

  • 13. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems.
    Yaseen M; Iqbal W; Rashid I; Abbas H; Mohsin M; Saleem K; Bangash YA
    J Med Syst; 2019 Oct; 43(11):324. PubMed ID: 31620895
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Visual discovery in computer network defense.
    D'Amico AD; Goodall JR; Tesone DR; Kopylec JK
    IEEE Comput Graph Appl; 2007; 27(5):20-7. PubMed ID: 17913021
    [No Abstract]   [Full Text] [Related]  

  • 15. Security is achievable even in today's complex networks.
    Lafrance S
    Health Manag Technol; 1995 Oct; 16(11):58. PubMed ID: 10151634
    [No Abstract]   [Full Text] [Related]  

  • 16. Securing the IT infrastructure. Protection can be solid and ongoing, even on a conservative budget.
    Norton RC
    Healthc Inform; 2004 Jan; 21(1):22. PubMed ID: 14763104
    [No Abstract]   [Full Text] [Related]  

  • 17. Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363.
    Hu F; Hao Q; Lukowiak M; Sun Q; Wilhelm K; Radziszowski S; Wu Y
    IEEE Trans Inf Technol Biomed; 2010 Nov; 14(6):1397-404. PubMed ID: 20423808
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enhancing the robustness of recommender systems against spammers.
    Zhang C; Liu J; Qu Y; Han T; Ge X; Zeng A
    PLoS One; 2018; 13(11):e0206458. PubMed ID: 30383766
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Issues of security and network security in Health Care Information Systems.
    Patel A; Kantzavelou I
    Stud Health Technol Inform; 1996; 27():216-23. PubMed ID: 10163736
    [TBL] [Abstract][Full Text] [Related]  

  • 20. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.
    N Ahmed M; Abdullah AH; Kaiwartya O
    PLoS One; 2016; 11(6):e0156885. PubMed ID: 27285146
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.