These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

265 related articles for article (PubMed ID: 34786300)

  • 1. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cybersecurity and remote working: Croatia's (non-)response to increased cyber threats.
    Škiljić A
    Int Cybersecur Law Rev; 2020; 1(1-2):51-61. PubMed ID: 38624512
    [TBL] [Abstract][Full Text] [Related]  

  • 5. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
    Vrhovec S; Markelj B
    PLoS One; 2024; 19(10):e0312266. PubMed ID: 39423170
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Social Engineering Attacks During the COVID-19 Pandemic.
    Venkatesha S; Reddy KR; Chandavarkar BR
    SN Comput Sci; 2021; 2(2):78. PubMed ID: 33585823
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health.
    Muthuppalaniappan M; Stevenson K
    Int J Qual Health Care; 2021 Feb; 33(1):. PubMed ID: 33351134
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber security threats: A never-ending challenge for e-commerce.
    Liu X; Ahmad SF; Anser MK; Ke J; Irshad M; Ul-Haq J; Abbas S
    Front Psychol; 2022; 13():927398. PubMed ID: 36337532
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Stochastic Counterfactual Risk Analysis for the Vulnerability Assessment of Cyber-Physical Attacks on Electricity Distribution Infrastructure Networks.
    Oughton EJ; Ralph D; Pant R; Leverett E; Copic J; Thacker S; Dada R; Ruffle S; Tuveson M; Hall JW
    Risk Anal; 2019 Sep; 39(9):2012-2031. PubMed ID: 30812052
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Review OSINT tool for social engineering.
    Nobili M
    Front Big Data; 2023; 6():1169636. PubMed ID: 37719683
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Health Care Cybersecurity Challenges and Solutions Under the Climate of COVID-19: Scoping Review.
    He Y; Aliyu A; Evans M; Luo C
    J Med Internet Res; 2021 Apr; 23(4):e21747. PubMed ID: 33764885
    [TBL] [Abstract][Full Text] [Related]  

  • 16. What changed in the cyber-security after COVID-19?
    Kumar R; Sharma S; Vachhani C; Yadav N
    Comput Secur; 2022 Sep; 120():102821. PubMed ID: 35813991
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security risk models against attacks in smart grid using big data and artificial intelligence.
    Yasin Ghadi Y; Mazhar T; Aurangzeb K; Haq I; Shahzad T; Ali Laghari A; Shahid Anwar M
    PeerJ Comput Sci; 2024; 10():e1840. PubMed ID: 38686008
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
    Achaal B; Adda M; Berger M; Ibrahim H; Awde A
    Cybersecur (Singap); 2024; 7(1):10. PubMed ID: 38707764
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 14.