These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

249 related articles for article (PubMed ID: 34149309)

  • 1. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 5. The Role of User Behaviour in Improving Cyber Security Management.
    Moustafa AA; Bello A; Maurushat A
    Front Psychol; 2021; 12():561011. PubMed ID: 34220596
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.
    Żebrowski P; Couce-Vieira A; Mancuso A
    Risk Anal; 2022 Oct; 42(10):2275-2290. PubMed ID: 35229333
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber-attacks and threats for healthcare - a multi-layer thread analysis.
    Spanakis EG; Bonomi S; Sfakianakis S; Santucci G; Lenti S; Sorella M; Tanasache FD; Palleschi A; Ciccotelli C; Sakkalis V; Magalini S
    Annu Int Conf IEEE Eng Med Biol Soc; 2020 Jul; 2020():5705-5708. PubMed ID: 33019270
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
    Achaal B; Adda M; Berger M; Ibrahim H; Awde A
    Cybersecur (Singap); 2024; 7(1):10. PubMed ID: 38707764
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Comprehensive user requirements engineering methodology for secure and interoperable health data exchange.
    Natsiavas P; Rasmussen J; Voss-Knude M; Votis Κ; Coppolino L; Campegiani P; Cano I; Marí D; Faiella G; Clemente F; Nalin M; Grivas E; Stan O; Gelenbe E; Dumortier J; Petersen J; Tzovaras D; Romano L; Komnios I; Koutkias V
    BMC Med Inform Decis Mak; 2018 Oct; 18(1):85. PubMed ID: 30326890
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.
    Nankya M; Chataut R; Akl R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960539
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Modelling cybersecurity regulations for automated vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P; Warren M
    Accid Anal Prev; 2023 Jun; 186():107054. PubMed ID: 37023653
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 13.