These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
6. Breaking down silos between business continuity and cyber security. Phillips R; Tanner B J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581 [TBL] [Abstract][Full Text] [Related]
7. Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness. Medenou Choumanof RD; Llopis Sanchez S; Calzado Mayo VM; Garcia Balufo M; Páramo Castrillo M; González Garrido FJ; Luis Martinez A; Nevado Catalán D; Hu A; Rodríguez-Bermejo DS; Pasqual de Riquelme GR; Sotelo Monge MA; Berardi A; De Santis P; Torelli F; Maestre Vidal J Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890786 [TBL] [Abstract][Full Text] [Related]
9. A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness. Ask TF; Kullman K; Sütterlin S; Knox BJ; Engel D; Lugo RG Front Big Data; 2023; 6():1042783. PubMed ID: 36777449 [TBL] [Abstract][Full Text] [Related]
10. Cyber security threats in the microbial genomics era: implications for public health. Fayans I; Motro Y; Rokach L; Oren Y; Moran-Gilad J Euro Surveill; 2020 Feb; 25(6):. PubMed ID: 32070468 [TBL] [Abstract][Full Text] [Related]
11. Analyzing Cyber-Physical Threats on Robotic Platforms. Ahmad Yousef KM; AlMajali A; Ghalyon SA; Dweik W; Mohd BJ Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29883403 [TBL] [Abstract][Full Text] [Related]
12. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users. Veksler VD; Buchler N; Hoffman BE; Cassenti DN; Sample C; Sugrim S Front Psychol; 2018; 9():691. PubMed ID: 29867661 [TBL] [Abstract][Full Text] [Related]
13. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites. Mehmood A; Epiphaniou G; Maple C; Ersotelos N; Wiseman R Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960419 [TBL] [Abstract][Full Text] [Related]
14. Addressing the Security Gap in IoT: Towards an IoT Cyber Range. Nock O; Starkey J; Angelopoulos CM Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32971956 [TBL] [Abstract][Full Text] [Related]
15. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400 [TBL] [Abstract][Full Text] [Related]
16. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways. Ashraf S; Shawon MH; Khalid HM; Muyeen SM Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735 [TBL] [Abstract][Full Text] [Related]
17. Multi-Source Knowledge Reasoning for Data-Driven IoT Security. Zhang S; Bai G; Li H; Liu P; Zhang M; Li S Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833653 [TBL] [Abstract][Full Text] [Related]
18. LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution. Bouzidi M; Amro A; Dalveren Y; Alaya Cheikh F; Derawi M Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850676 [TBL] [Abstract][Full Text] [Related]
19. A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Bakhshi T; Ghita B; Kuzminykh I Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38276399 [TBL] [Abstract][Full Text] [Related]
20. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]