These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

147 related articles for article (PubMed ID: 33322224)

  • 21. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Cyber-physical defense in the quantum Era.
    Barbeau M; Garcia-Alfaro J
    Sci Rep; 2022 Feb; 12(1):1905. PubMed ID: 35115576
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
    Ashok A; Hahn A; Govindarasu M
    J Adv Res; 2014 Jul; 5(4):481-9. PubMed ID: 25685516
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use.
    Tubis AA; Werbińska-Wojciechowska S; Góralczyk M; Wróblewski A; Ziętek B
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33339301
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Enabling cyber resilient shipping through maritime security operation center adoption: A human factors perspective.
    Nganga A; Scanlan J; Lützhöft M; Mallam S
    Appl Ergon; 2024 Sep; 119():104312. PubMed ID: 38735233
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.
    Oughton EJ; Ralph D; Pant R; Leverett E; Copic J; Thacker S; Dada R; Ruffle S; Tuveson M; Hall JW
    Risk Anal; 2019 Sep; 39(9):2012-2031. PubMed ID: 30812052
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework.
    Georgiadou A; Mouzakitis S; Askounis D
    Sensors (Basel); 2021 May; 21(9):. PubMed ID: 34065086
    [TBL] [Abstract][Full Text] [Related]  

  • 34. The Role of User Behaviour in Improving Cyber Security Management.
    Moustafa AA; Bello A; Maurushat A
    Front Psychol; 2021; 12():561011. PubMed ID: 34220596
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation.
    Nikoloudakis Y; Kefaloukos I; Klados S; Panagiotakis S; Pallis E; Skianis C; Markakis EK
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300676
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework.
    Oruc A; Amro A; Gkioulos V
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433344
    [TBL] [Abstract][Full Text] [Related]  

  • 39. D4I - Digital forensics framework for reviewing and investigating cyber attacks.
    Dimitriadis A; Ivezic N; Kulvatunyou B; Mavridis I
    Array (N Y); 2020; 5():. PubMed ID: 35531088
    [TBL] [Abstract][Full Text] [Related]  

  • 40. ExtHT: A hybrid tracing method for cyber-attacks in power industrial control systems.
    Chen YR; Wang Y; Huang GR; Li JE
    ISA Trans; 2023 May; 136():1-15. PubMed ID: 36357220
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 8.