These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

147 related articles for article (PubMed ID: 26341157)

  • 1. A cloud-based forensics tracking scheme for online social network clients.
    Lin FY; Huang CC; Chang PY
    Forensic Sci Int; 2015 Oct; 255():64-71. PubMed ID: 26341157
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Applications of social network media in medicolegal death investigation.
    Hookano R; Knight LD; Brunelli RA; Stoppacher R
    J Forensic Sci; 2013 Nov; 58(6):1628-32. PubMed ID: 23822156
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Nuclear Forensics: Scientific Analysis Supporting Law Enforcement and Nuclear Security Investigations.
    Keegan E; Kristo MJ; Toole K; Kips R; Young E
    Anal Chem; 2016 Feb; 88(3):1496-505. PubMed ID: 26703823
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks.
    Arshad H; Abdullah S; Alawida M; Alabdulatif A; Abiodun OI; Riaz O
    Sensors (Basel); 2022 Feb; 22(3):. PubMed ID: 35161859
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Benford's Law Applies to Online Social Networks.
    Golbeck J
    PLoS One; 2015; 10(8):e0135169. PubMed ID: 26308716
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A case study on anonymised sharing platforms and digital traces left by their usage.
    Horsman G
    Sci Justice; 2021 Jan; 61(1):97-106. PubMed ID: 33357832
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Competition between global and local online social networks.
    Kleineberg KK; Boguñá M
    Sci Rep; 2016 Apr; 6():25116. PubMed ID: 27117826
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
    Al-Muhtadi J; Shahzad B; Saleem K; Jameel W; Orgun MA
    Health Informatics J; 2019 Jun; 25(2):315-329. PubMed ID: 28480788
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.
    Khan S; Shiraz M; Wahab AW; Gani A; Han Q; Rahman ZB
    ScientificWorldJournal; 2014; 2014():547062. PubMed ID: 25097880
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
    Wu J; Su Z; Wang S; Li J
    Sensors (Basel); 2017 Jul; 17(8):. PubMed ID: 28758943
    [TBL] [Abstract][Full Text] [Related]  

  • 11. NLP-Based Digital Forensic Analysis for Online Social Network Based on System Security.
    Shahbazi Z; Byun YC
    Int J Environ Res Public Health; 2022 Jun; 19(12):. PubMed ID: 35742272
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The monitoring and managing application of cloud computing based on Internet of Things.
    Luo S; Ren B
    Comput Methods Programs Biomed; 2016 Jul; 130():154-61. PubMed ID: 27208530
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Digital forensics: an analytical crime scene procedure model (ACSPM).
    Bulbul HI; Yavuzcan HG; Ozel M
    Forensic Sci Int; 2013 Dec; 233(1-3):244-56. PubMed ID: 24314526
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The four faces of microbial forensics.
    Tucker JB; Koblentz GD
    Biosecur Bioterror; 2009 Dec; 7(4):389-97. PubMed ID: 20028247
    [TBL] [Abstract][Full Text] [Related]  

  • 15. When finding nothing may be evidence of something: Anti-forensics and digital tool marks.
    Horsman G; Errickson D
    Sci Justice; 2019 Sep; 59(5):565-572. PubMed ID: 31472802
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Advanced framework for digital forensic technologies and procedures.
    Trček D; Abie H; Skomedal A; Starc I
    J Forensic Sci; 2010 Nov; 55(6):1471-80. PubMed ID: 20735706
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Geographies of an Online Social Network.
    Lengyel B; Varga A; Ságvári B; Jakobi Á; Kertész J
    PLoS One; 2015; 10(9):e0137248. PubMed ID: 26359668
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Social media and its dual use in biopreparedness: communication and visualization tools in an animal bioterrorism incident.
    Sjöberg E; Barker GC; Landgren J; Griberg I; Skiby JE; Tubbin A; von Stapelmohr A; Härenstam M; Jansson M; Knutsson R
    Biosecur Bioterror; 2013 Sep; 11 Suppl 1():S264-75. PubMed ID: 23971817
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Criminal networks analysis in missing data scenarios through graph distances.
    Ficara A; Cavallaro L; Curreri F; Fiumara G; De Meo P; Bagdasar O; Song W; Liotta A
    PLoS One; 2021; 16(8):e0255067. PubMed ID: 34379625
    [TBL] [Abstract][Full Text] [Related]  

  • 20. The Identity Mapping Project: Demographic differences in patterns of distributed identity.
    Gilbert RL; Dionisio JD; Forney A; Dorin P
    Stud Health Technol Inform; 2015; 219():91-6. PubMed ID: 26799886
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.