These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

149 related articles for article (PubMed ID: 31967498)

  • 1. Hacking and Ransomware: Challenges for Institutions Both Large and Small.
    Ritenour ER
    AJR Am J Roentgenol; 2020 Apr; 214(4):736-737. PubMed ID: 31967498
    [No Abstract]   [Full Text] [Related]  

  • 2. Hacks, hackers and hacking.
    Hancocks S
    Br Dent J; 2011 Jul; 211(2):51. PubMed ID: 21779038
    [No Abstract]   [Full Text] [Related]  

  • 3. Hacking Acute Care: A Qualitative Study on the Health Care Impacts of Ransomware Attacks Against Hospitals.
    van Boven LS; Kusters RWJ; Tin D; van Osch FHM; De Cauwer H; Ketelings L; Rao M; Dameff C; Barten DG
    Ann Emerg Med; 2024 Jan; 83(1):46-56. PubMed ID: 37318433
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Hacking the health system: using public key infrastructure to protect health information on the Internet.
    Pluscauskas M; Stephens A
    Healthc Inf Manage; 1997; 11(3):27-37. PubMed ID: 10175691
    [No Abstract]   [Full Text] [Related]  

  • 5. Healthcare Data Breaches: Implications for Digital Forensic Readiness.
    Chernyshev M; Zeadally S; Baig Z
    J Med Syst; 2018 Nov; 43(1):7. PubMed ID: 30488291
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.
    Sittig DF; Singh H
    Appl Clin Inform; 2016; 7(2):624-32. PubMed ID: 27437066
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Ransomware Cyber Security Threat Tests Providers’ Defenses.
    Connole P
    Provider; 2016 Nov; 42(11):19, 21, 23, 29, 32, 35. PubMed ID: 29601684
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information.
    Ronquillo JG; Erik Winterholler J; Cwikla K; Szymanski R; Levy C
    JAMIA Open; 2018 Jul; 1(1):15-19. PubMed ID: 31984315
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Ransomware: Analysing the Impact on Windows Active Directory Domain Services.
    McDonald G; Papadopoulos P; Pitropakis N; Ahmad J; Buchanan WJ
    Sensors (Basel); 2022 Jan; 22(3):. PubMed ID: 35161699
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Attacking and defence pathways for Intelligent Medical Diagnosis System (IMDS).
    He Y; Camacho RS; Soygazi H; Luo C
    Int J Med Inform; 2021 Apr; 148():104415. PubMed ID: 33601252
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cyber-Analytics: Identifying Discriminants of Data Breaches.
    Dolezel D; McLeod A
    Perspect Health Inf Manag; 2019; 16(Summer):1a. PubMed ID: 31423119
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Survey of Crypto Ransomware Attack Detection Methodologies: An Evolving Outlook.
    Alqahtani A; Sheldon FT
    Sensors (Basel); 2022 Feb; 22(5):. PubMed ID: 35270983
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS).
    Luo C; Soygazi H; Janicke H; He Y
    Annu Int Conf IEEE Eng Med Biol Soc; 2019 Jul; 2019():3454-3457. PubMed ID: 31946622
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Preventing Medjacking.
    Cuningkin V; Riley E; Rainey L
    Am J Nurs; 2021 Oct; 121(10):46-50. PubMed ID: 34554984
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Ransomware in Hospitals: What Providers Will Inevitably Face When Attacked.
    Kelpsas B; Nelson A
    J Med Pract Manage; 2016 Sep; 32(1):67-70. PubMed ID: 30452851
    [TBL] [Abstract][Full Text] [Related]  

  • 16. ROUNDTABLE:RANSOMWARE What experts are doing to safeguard their institutions' data.
    Kass E
    Health Data Manag; 2016 Sep; 24(6):25-32. PubMed ID: 29533550
    [No Abstract]   [Full Text] [Related]  

  • 17. Cybersecurity: Positive Changes Through Processes and Team Culture.
    Pullin DW
    Front Health Serv Manage; 2018; 35(1):3-12. PubMed ID: 30124509
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Infotech. Cyber security. Health care learns to share scares and solutions.
    Colias M
    Hosp Health Netw; 2004 May; 78(5):60-4, 2. PubMed ID: 15192882
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Keys to securing data as a practitioner.
    Rey J; Douglass K
    J Med Pract Manage; 2012; 27(4):203-5. PubMed ID: 22413592
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants.
    Harvey I; Bolgan S; Mosca D; McLean C; Rusconi E
    Front Hum Neurosci; 2016; 10():229. PubMed ID: 27242491
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.