These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

110 related articles for article (PubMed ID: 27559196)

  • 1. Metamorphic Testing for Cybersecurity.
    Chen TY; Kuo FC; Ma W; Susilo W; Towey D; Voas J; Zhou ZQ
    Computer (Long Beach Calif); 2016 Jun; 49(6):48-55. PubMed ID: 27559196
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A metamorphic testing approach for event sequences.
    Chen J; Wang Y; Guo Y; Jiang M
    PLoS One; 2019; 14(2):e0212476. PubMed ID: 30779769
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Testing and Validating Machine Learning Classifiers by Metamorphic Testing.
    Xie X; Ho JW; Murphy C; Kaiser G; Xu B; Chen TY
    J Syst Softw; 2011 Apr; 84(4):544-558. PubMed ID: 21532969
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Verification of phylogenetic inference programs using metamorphic testing.
    Sadi MS; Kuo FC; Ho JW; Charleston MA; Chen TY
    J Bioinform Comput Biol; 2011 Dec; 9(6):729-47. PubMed ID: 22084011
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Towards testing big data analytics software: the essential role of metamorphic testing.
    Zhang Z; Xie X
    Biophys Rev; 2019 Feb; 11(1):123-125. PubMed ID: 30565204
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
    Williams PA; Woodward AJ
    Med Devices (Auckl); 2015; 8():305-16. PubMed ID: 26229513
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.
    Georgescu TM; Iancu B; Zurini M
    Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31374902
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Ffuzz: Towards full system high coverage fuzz testing on binary executables.
    Zhang B; Ye J; Bi X; Feng C; Tang C
    PLoS One; 2018; 13(5):e0196733. PubMed ID: 29791469
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Measuring Effectiveness of Metamorphic Relations for Image Processing Using Mutation Testing.
    Jafari F; Nadeem A
    J Imaging; 2024 Apr; 10(4):. PubMed ID: 38667985
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Exploratory Metamorphic Testing for Scientific Software.
    Lin X; Simon M; Niu N
    Comput Sci Eng; 2018 Nov; 22(2):78-87. PubMed ID: 32461738
    [TBL] [Abstract][Full Text] [Related]  

  • 12. An innovative approach for testing bioinformatics programs using metamorphic testing.
    Chen TY; Ho JW; Liu H; Xie X
    BMC Bioinformatics; 2009 Jan; 10():24. PubMed ID: 19152705
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Application of Metamorphic Testing to Supervised Classifiers.
    Xie X; Ho J; Murphy C; Kaiser G; Xu B; Chen TY
    Proc Int Conf Qual Softw; 2010 Jan; 2009(2009):135-144. PubMed ID: 21243103
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Are implanted electronic devices hackable?
    Alexander B; Haseeb S; Baranchuk A
    Trends Cardiovasc Med; 2019 Nov; 29(8):476-480. PubMed ID: 30482482
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An Ontology-Based Cybersecurity Framework for the Internet of Things.
    Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Risk and the Five Hard Problems of Cybersecurity.
    Scala NM; Reilly AC; Goethals PL; Cukier M
    Risk Anal; 2019 Oct; 39(10):2119-2126. PubMed ID: 30925207
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Rubbing salt in the wound? A large-scale investigation into the effects of refactoring on security.
    Iannone E; Codabux Z; Lenarduzzi V; De Lucia A; Palomba F
    Empir Softw Eng; 2023; 28(4):89. PubMed ID: 37250850
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cybersecurity features of digital medical devices: an analysis of FDA product summaries.
    Stern AD; Gordon WJ; Landman AB; Kramer DB
    BMJ Open; 2019 Jun; 9(6):e025374. PubMed ID: 31256020
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
    Coventry L; Branley D
    Maturitas; 2018 Jul; 113():48-52. PubMed ID: 29903648
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.