These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

150 related articles for article (PubMed ID: 33101096)

  • 1. Human Cognition Through the Lens of Social Engineering Cyberattacks.
    Montañez R; Golob E; Xu S
    Front Psychol; 2020; 11():1755. PubMed ID: 33101096
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study.
    Ünözkan H; Ertem M; Bendak S
    Netw Model Anal Health Inform Bioinform; 2022; 11(1):52. PubMed ID: 36408329
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Spatiotemporal patterns and predictability of cyberattacks.
    Chen YZ; Huang ZG; Xu S; Lai YC
    PLoS One; 2015; 10(5):e0124472. PubMed ID: 25992837
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.
    Argaw ST; Bempong NE; Eshaya-Chauvin B; Flahault A
    BMC Med Inform Decis Mak; 2019 Jan; 19(1):10. PubMed ID: 30634962
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cybersecurity: Positive Changes Through Processes and Team Culture.
    Pullin DW
    Front Health Serv Manage; 2018; 35(1):3-12. PubMed ID: 30124509
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 8. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks.
    Canetti D; Gross M; Waismel-Manor I; Levanon A; Cohen H
    Cyberpsychol Behav Soc Netw; 2017 Feb; 20(2):72-77. PubMed ID: 28121462
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cybersecurity Testing for Automotive Domain: A Survey.
    Luo F; Zhang X; Yang Z; Jiang Y; Wang J; Wu M; Feng W
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501913
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Evaluating the adoption of cybersecurity and its influence on organizational performance.
    Hasani T; O'Reilly N; Dehghantanha A; Rezania D; Levallet N
    SN Bus Econ; 2023; 3(5):97. PubMed ID: 37131522
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Trends and best practices in health care cybersecurity insurance policy.
    Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A
    J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Emerging Cybersecurity Threats in Radiation Oncology.
    Joyce C; Roman FL; Miller B; Jeffries J; Miller RC
    Adv Radiat Oncol; 2021; 6(6):100796. PubMed ID: 34746516
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Enterprise Cybersecurity: Building a Successful Defense Program.
    Reagin MJ; Gentry MV
    Front Health Serv Manage; 2018; 35(1):13-22. PubMed ID: 30124510
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber insurance: state of the art, trends and future directions.
    Tsohou A; Diamantopoulou V; Gritzalis S; Lambrinoudakis C
    Int J Inf Secur; 2023; 22(3):737-748. PubMed ID: 36684688
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments.
    Weichbroth P; Wereszko K; Anacka H; Kowal J
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991866
    [TBL] [Abstract][Full Text] [Related]  

  • 16. The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance.
    Dawson J; Thomson R
    Front Psychol; 2018; 9():744. PubMed ID: 29946276
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cybersecurity in Medical Imaging.
    Ferrara A
    Radiol Technol; 2019 Jul; 90(6):563-575. PubMed ID: 31270257
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyberattacks on Devices Threaten Data and Patients: Cybersecurity Risks Come with the Territory. Three Experts Explain What You Need to Know.
    Mertz L
    IEEE Pulse; 2018; 9(3):25-28. PubMed ID: 29757749
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks.
    Khan N; J Houghton R; Sharples S
    Cogn Technol Work; 2022; 24(3):393-421. PubMed ID: 34725543
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.