These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

147 related articles for article (PubMed ID: 33322224)

  • 1. A Review of Cyber-Ranges and Test-Beds: Current and Future Trends.
    Ukwandu E; Farah MAB; Hindy H; Brosset D; Kavallieros D; Atkinson R; Tachtatzis C; Bures M; Andonovic I; Bellekens X
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33322224
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber-physical systems security: Limitations, issues and future trends.
    Yaacoub JA; Salman O; Noura HN; Kaaniche N; Chehab A; Malli M
    Microprocess Microsyst; 2020 Sep; 77():103201. PubMed ID: 32834204
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness.
    Medenou Choumanof RD; Llopis Sanchez S; Calzado Mayo VM; Garcia Balufo M; Páramo Castrillo M; González Garrido FJ; Luis Martinez A; Nevado Catalán D; Hu A; Rodríguez-Bermejo DS; Pasqual de Riquelme GR; Sotelo Monge MA; Berardi A; De Santis P; Torelli F; Maestre Vidal J
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890786
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness.
    Ask TF; Kullman K; Sütterlin S; Knox BJ; Engel D; Lugo RG
    Front Big Data; 2023; 6():1042783. PubMed ID: 36777449
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber security threats in the microbial genomics era: implications for public health.
    Fayans I; Motro Y; Rokach L; Oren Y; Moran-Gilad J
    Euro Surveill; 2020 Feb; 25(6):. PubMed ID: 32070468
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Analyzing Cyber-Physical Threats on Robotic Platforms.
    Ahmad Yousef KM; AlMajali A; Ghalyon SA; Dweik W; Mohd BJ
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29883403
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.
    Veksler VD; Buchler N; Hoffman BE; Cassenti DN; Sample C; Sugrim S
    Front Psychol; 2018; 9():691. PubMed ID: 29867661
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
    Mehmood A; Epiphaniou G; Maple C; Ersotelos N; Wiseman R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960419
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Addressing the Security Gap in IoT: Towards an IoT Cyber Range.
    Nock O; Starkey J; Angelopoulos CM
    Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32971956
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.
    Ashraf S; Shawon MH; Khalid HM; Muyeen SM
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Multi-Source Knowledge Reasoning for Data-Driven IoT Security.
    Zhang S; Bai G; Li H; Liu P; Zhang M; Li S
    Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833653
    [TBL] [Abstract][Full Text] [Related]  

  • 18. LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution.
    Bouzidi M; Amro A; Dalveren Y; Alaya Cheikh F; Derawi M
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850676
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A Review of IoT Firmware Vulnerabilities and Auditing Techniques.
    Bakhshi T; Ghita B; Kuzminykh I
    Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276399
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.