These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

175 related articles for article (PubMed ID: 27564783)

  • 1. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.
    Smith FL
    Health Secur; 2016; 14(5):305-14. PubMed ID: 27564783
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.
    Mallinder J; Drabwell P
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):103-11. PubMed ID: 24457322
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Public Health Surveillance: Electronic Reporting as a Point of Reference.
    Black J; Hulkower R; Suarez W; Patel S; Elliott B
    J Law Med Ethics; 2019 Jun; 47(2_suppl):19-22. PubMed ID: 31298129
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Infotech. Cyber security. Health care learns to share scares and solutions.
    Colias M
    Hosp Health Netw; 2004 May; 78(5):60-4, 2. PubMed ID: 15192882
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Statistical modeling of computer malware propagation dynamics in cyberspace.
    Fang Z; Zhao P; Xu M; Xu S; Hu T; Fang X
    J Appl Stat; 2022; 49(4):858-883. PubMed ID: 35707816
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 8. MDPHnet: secure, distributed sharing of electronic health record data for public health surveillance, evaluation, and planning.
    Vogel J; Brown JS; Land T; Platt R; Klompas M
    Am J Public Health; 2014 Dec; 104(12):2265-70. PubMed ID: 25322301
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Evaluation of Machine Learning Algorithms for Malware Detection.
    Akhtar MS; Feng T
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679741
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Public Health Intelligence: Learning From the Ebola Crisis.
    Carney TJ; Weber DJ
    Am J Public Health; 2015 Sep; 105(9):1740-4. PubMed ID: 26180978
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The cyber threat, trophy information and the fortress mentality.
    Scully T
    J Bus Contin Emer Plan; 2011 Oct; 5(3):195-207. PubMed ID: 22130338
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
    Dunn Cavelty M
    Sci Eng Ethics; 2014 Sep; 20(3):701-15. PubMed ID: 24781874
    [TBL] [Abstract][Full Text] [Related]  

  • 14. US policy on data disclosure debated.
    Fox JL
    Nat Biotechnol; 2003 Feb; 21(2):116-7. PubMed ID: 12560824
    [No Abstract]   [Full Text] [Related]  

  • 15. "Blueprint version 2.0": updating public health surveillance for the 21st century.
    Smith PF; Hadler JL; Stanbury M; Rolfs RT; Hopkins RS;
    J Public Health Manag Pract; 2013; 19(3):231-9. PubMed ID: 22759985
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.
    Kumar R; Subbiah G
    Sensors (Basel); 2022 Apr; 22(7):. PubMed ID: 35408413
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Interfacing a biosurveillance portal and an international network of institutional analysts to detect biological threats.
    Riccardo F; Shigematsu M; Chow C; McKnight CJ; Linge J; Doherty B; Dente MG; Declich S; Barker M; Barboza P; Vaillant L; Donachie A; Mawudeku A; Blench M; Arthur R
    Biosecur Bioterror; 2014; 12(6):325-36. PubMed ID: 25470464
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Public health surveillance with electronic medical records: at risk of surveillance bias and overdiagnosis.
    Chiolero A; Santschi V; Paccaud F
    Eur J Public Health; 2013 Jun; 23(3):350-1. PubMed ID: 23599219
    [No Abstract]   [Full Text] [Related]  

  • 19. Cyberbiosecurity: From Naive Trust to Risk Awareness.
    Peccoud J; Gallegos JE; Murch R; Buchholz WG; Raman S
    Trends Biotechnol; 2018 Jan; 36(1):4-7. PubMed ID: 29224719
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Warding Off Cyber Threats to Health Care.
    Laws J
    Occup Health Saf; 2016 Dec; 85(12):4. PubMed ID: 30289224
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.