These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

163 related articles for article (PubMed ID: 30925207)

  • 1. Risk and the Five Hard Problems of Cybersecurity.
    Scala NM; Reilly AC; Goethals PL; Cukier M
    Risk Anal; 2019 Oct; 39(10):2119-2126. PubMed ID: 30925207
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.
    Fernández-Caramés TM; Fraga-Lamas P
    Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32471252
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Organizational science and cybersecurity: abundant opportunities for research at the interface.
    Dalal RS; Howard DJ; Bennett RJ; Posey C; Zaccaro SJ; Brummel BJ
    J Bus Psychol; 2022; 37(1):1-29. PubMed ID: 33564206
    [TBL] [Abstract][Full Text] [Related]  

  • 6. An Adversarial Risk Analysis Framework for Cybersecurity.
    Rios Insua D; Couce-Vieira A; Rubio JA; Pieters W; Labunets K; G Rasines D
    Risk Anal; 2021 Jan; 41(1):16-36. PubMed ID: 31183890
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 8. An Ontology-Based Cybersecurity Framework for the Internet of Things.
    Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber-mitigation: Cybersecurity emergency management.
    Straub J
    J Emerg Manag; 2020; 18(6):463-473. PubMed ID: 33428202
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience.
    Schabacker DS; Levy LA; Evans NJ; Fowler JM; Dickey EA
    Front Bioeng Biotechnol; 2019; 7():61. PubMed ID: 31001526
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cybersecurity in Power Grids: Challenges and Opportunities.
    Krause T; Ernst R; Klaer B; Hacker I; Henze M
    Sensors (Basel); 2021 Sep; 21(18):. PubMed ID: 34577432
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity.
    Jardine E
    Risk Anal; 2020 Aug; 40(8):1571-1588. PubMed ID: 32573007
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Comparing Canada's proposed
    Malone M; Walton R
    Int Cybersecur Law Rev; 2023; 4(2):165-196. PubMed ID: 37153843
    [TBL] [Abstract][Full Text] [Related]  

  • 14. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
    Allodi L; Massacci F
    Risk Anal; 2017 Aug; 37(8):1606-1627. PubMed ID: 28800378
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management.
    Ganin AA; Quach P; Panwar M; Collier ZA; Keisler JM; Marchese D; Linkov I
    Risk Anal; 2020 Jan; 40(1):183-199. PubMed ID: 28873246
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Assessing the Role of Cyberbiosecurity in Agriculture: A Case Study.
    Drape T; Magerkorth N; Sen A; Simpson J; Seibel M; Murch RS; Duncan SE
    Front Bioeng Biotechnol; 2021; 9():737927. PubMed ID: 34490231
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Trends and best practices in health care cybersecurity insurance policy.
    Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A
    J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation.
    Cains MG; Flora L; Taber D; King Z; Henshel DS
    Risk Anal; 2022 Aug; 42(8):1643-1669. PubMed ID: 33586204
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.