These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

193 related articles for article (PubMed ID: 34450935)

  • 1. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 4. Analysis of security and privacy challenges for DNA-genomics applications and databases.
    Arshad S; Arshad J; Khan MM; Parkinson S
    J Biomed Inform; 2021 Jul; 119():103815. PubMed ID: 34022422
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem.
    Silvestri S; Islam S; Papastergiou S; Tzagkarakis C; Ciampi M
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679446
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cyber risk and privacy liability: a click in the right direction?
    McDonough WJ
    J Healthc Risk Manag; 2007; 27(4):9, 11-2. PubMed ID: 20200889
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Information security and privacy in hospitals: a literature mapping and review of research gaps.
    Ahouanmenou S; Van Looy A; Poels G
    Inform Health Soc Care; 2023 Jan; 48(1):30-46. PubMed ID: 35300555
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cyber security threats in the microbial genomics era: implications for public health.
    Fayans I; Motro Y; Rokach L; Oren Y; Moran-Gilad J
    Euro Surveill; 2020 Feb; 25(6):. PubMed ID: 32070468
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyberbiosecurity in high-containment laboratories.
    Crawford E; Bobrow A; Sun L; Joshi S; Vijayan V; Blacksell S; Venugopalan G; Tensmeyer N
    Front Bioeng Biotechnol; 2023; 11():1240281. PubMed ID: 37560539
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture.
    Masip-Bruin X; Marín-Tordera E; Ruiz J; Jukan A; Trakadas P; Cernivec A; Lioy A; López D; Santos H; Gonos A; Silva A; Soriano J; Kalogiannis G
    Sensors (Basel); 2021 Sep; 21(18):. PubMed ID: 34577264
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
    Dunn Cavelty M
    Sci Eng Ethics; 2014 Sep; 20(3):701-15. PubMed ID: 24781874
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.