These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

212 related articles for article (PubMed ID: 31579279)

  • 1. Advancing Coordinated Cyber-investigations and Tool Interoperability using a Community Developed Specification Language.
    Casey E; Barnum S; Griffith R; Snyder J; van Beek H; Nelson A
    Digit Investig; 2017; 22():. PubMed ID: 31579279
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Diverging deep learning cognitive computing techniques into cyber forensics.
    Karie NM; Kebande VR; Venter HS
    Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
    [TBL] [Abstract][Full Text] [Related]  

  • 3. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
    Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
    Array (N Y); 2020; 5():. PubMed ID: 35531088
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Toward a general ontology for digital forensic disciplines.
    Karie NM; Venter HS
    J Forensic Sci; 2014 Sep; 59(5):1231-41. PubMed ID: 24931294
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Traceable Research Data Sharing in a German Medical Data Integration Center With FAIR (Findability, Accessibility, Interoperability, and Reusability)-Geared Provenance Implementation: Proof-of-Concept Study.
    Gierend K; Waltemath D; Ganslandt T; Siegel F
    JMIR Form Res; 2023 Dec; 7():e50027. PubMed ID: 38060305
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Inter-regional digital forensic knowledge management: needs, challenges, and solutions.
    Casey E; Zehnder A
    J Forensic Sci; 2021 Mar; 66(2):619-629. PubMed ID: 33156519
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Review and Qualitative Meta-Analysis of Digital Human Modeling and Cyber-Physical-Systems in Ergonomics 4.0.
    Paul G; Abele ND; Kluth K
    IISE Trans Occup Ergon Hum Factors; 2021; 9(3-4):111-123. PubMed ID: 34380380
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Clinical data integration model. Core interoperability ontology for research using primary care data.
    Ethier JF; Curcin V; Barton A; McGilchrist MM; Bastiaens H; Andreasson A; Rossiter J; Zhao L; Arvanitis TN; Taweel A; Delaney BC; Burgun A
    Methods Inf Med; 2015; 54(1):16-23. PubMed ID: 24954896
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security.
    Yadav A; Kumar A; Singh V
    Artif Intell Rev; 2023 Mar; ():1-32. PubMed ID: 37362900
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Advanced framework for digital forensic technologies and procedures.
    TrĨek D; Abie H; Skomedal A; Starc I
    J Forensic Sci; 2010 Nov; 55(6):1471-80. PubMed ID: 20735706
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Effects of Information Overload, Communication Overload, and Inequality on Digital Distrust: A Cyber-Violence Behavior Mechanism.
    Fan M; Huang Y; Qalati SA; Shah SMM; Ostic D; Pu Z
    Front Psychol; 2021; 12():643981. PubMed ID: 33959073
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Digital forensics: an analytical crime scene procedure model (ACSPM).
    Bulbul HI; Yavuzcan HG; Ozel M
    Forensic Sci Int; 2013 Dec; 233(1-3):244-56. PubMed ID: 24314526
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.
    He M; Devine L; Zhuang J
    Risk Anal; 2018 Feb; 38(2):215-225. PubMed ID: 28799659
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Knowledge mining of unstructured information: application to cyber domain.
    Takko T; Bhattacharya K; Lehto M; Jalasvirta P; Cederberg A; Kaski K
    Sci Rep; 2023 Jan; 13(1):1714. PubMed ID: 36720897
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Cyber-ITS framework for massive traffic data analysis using cyber infrastructure.
    Xia Y; Hu J; Fontaine MD
    ScientificWorldJournal; 2013; 2013():462846. PubMed ID: 23766690
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The critical care data exchange format: a proposed flexible data standard for combining clinical and high-frequency physiologic data in critical care.
    Laird P; Wertz A; Welter G; Maslove D; Hamilton A; Heung Yoon J; Lake DE; Zimmet AE; Bobko R; Randall Moorman J; Pinsky MR; Dubrawski A; Clermont G
    Physiol Meas; 2021 Jun; 42(6):. PubMed ID: 33910179
    [No Abstract]   [Full Text] [Related]  

  • 18. An ontology-driven framework for knowledge representation of digital extortion attacks.
    Keshavarzi M; Ghaffary HR
    Comput Human Behav; 2023 Feb; 139():107520. PubMed ID: 36268220
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Application of forensic image analysis in accident investigations.
    Verolme E; Mieremet A
    Forensic Sci Int; 2017 Sep; 278():137-147. PubMed ID: 28728049
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 11.