These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

194 related articles for article (PubMed ID: 34450935)

  • 21. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 22. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Preschool Cyber Security Management System Based on Intelligent Agents.
    Song J
    Comput Intell Neurosci; 2022; 2022():1992429. PubMed ID: 36248916
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Modelling cybersecurity regulations for automated vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P; Warren M
    Accid Anal Prev; 2023 Jun; 186():107054. PubMed ID: 37023653
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Enabling Security Services in Socially Assistive Robot Scenarios for Healthcare Applications.
    Vulpe A; Crăciunescu R; Drăgulinescu AM; Kyriazakos S; Paikan A; Ziafati P
    Sensors (Basel); 2021 Oct; 21(20):. PubMed ID: 34696125
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.
    Ferdinand J
    J Bus Contin Emer Plan; 2015-2016 Winter; 9(2):185-95. PubMed ID: 26642176
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.
    Żebrowski P; Couce-Vieira A; Mancuso A
    Risk Anal; 2022 Oct; 42(10):2275-2290. PubMed ID: 35229333
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs.
    Manzoor J; Waleed A; Jamali AF; Masood A
    PLoS One; 2024; 19(3):e0301183. PubMed ID: 38547149
    [TBL] [Abstract][Full Text] [Related]  

  • 33. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 34. CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.
    Baek Y; Shin S
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408251
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cyber-physical systems security: Limitations, issues and future trends.
    Yaacoub JA; Salman O; Noura HN; Kaaniche N; Chehab A; Malli M
    Microprocess Microsyst; 2020 Sep; 77():103201. PubMed ID: 32834204
    [TBL] [Abstract][Full Text] [Related]  

  • 36. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks.
    Singamaneni KK; Dhiman G; Juneja S; Muhammad G; AlQahtani SA; Zaki J
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146089
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework.
    Oruc A; Amro A; Gkioulos V
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433344
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Systemic Cyber Risk and Aggregate Impacts.
    Welburn JW; Strong AM
    Risk Anal; 2022 Aug; 42(8):1606-1622. PubMed ID: 33594708
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Cyber security threats: A never-ending challenge for e-commerce.
    Liu X; Ahmad SF; Anser MK; Ke J; Irshad M; Ul-Haq J; Abbas S
    Front Psychol; 2022; 13():927398. PubMed ID: 36337532
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 10.