These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

174 related articles for article (PubMed ID: 34803469)

  • 21. Effectiveness of and user preferences for security awareness training methodologies.
    Tschakert KF; Ngamsuriyaroj S
    Heliyon; 2019 Jun; 5(6):e02010. PubMed ID: 31338464
    [TBL] [Abstract][Full Text] [Related]  

  • 22. CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence.
    Ortiz-Garcés I; Govea J; Sánchez-Viteri S; Villegas-Ch W
    PeerJ Comput Sci; 2024; 10():e2041. PubMed ID: 38983228
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A comprehensive survey of AI-enabled phishing attacks detection techniques.
    Basit A; Zafar M; Liu X; Javed AR; Jalil Z; Kifayat K
    Telecommun Syst; 2021; 76(1):139-154. PubMed ID: 33110340
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks.
    Xu T; Singh K; Rajivan P
    Appl Ergon; 2023 Apr; 108():103908. PubMed ID: 36403509
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages.
    Xiong A; Proctor RW; Yang W; Li N
    Hum Factors; 2019 Jun; 61(4):577-595. PubMed ID: 30526089
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Advancing Phishing Email Detection: A Comparative Study of Deep Learning Models.
    Altwaijry N; Al-Turaiki I; Alotaibi R; Alakeel F
    Sensors (Basel); 2024 Mar; 24(7):. PubMed ID: 38610289
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis.
    Alqahtani MA
    Comput Intell Neurosci; 2022; 2022():6775980. PubMed ID: 35341185
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Cybersecurity: Positive Changes Through Processes and Team Culture.
    Pullin DW
    Front Health Serv Manage; 2018; 35(1):3-12. PubMed ID: 30124509
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 31. The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19.
    Al-Qahtani AF; Cresci S
    IET Inf Secur; 2022 Sep; 16(5):324-345. PubMed ID: 35942004
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Applications of deep learning for phishing detection: a systematic literature review.
    Catal C; Giray G; Tekinerdogan B; Kumar S; Shukla S
    Knowl Inf Syst; 2022; 64(6):1457-1500. PubMed ID: 35645443
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Informing, simulating experience, or both: A field experiment on phishing risks.
    Baillon A; de Bruin J; Emirmahmutoglu A; van de Veer E; van Dijk B
    PLoS One; 2019; 14(12):e0224216. PubMed ID: 31851688
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Signal Detection Theory (SDT) Is Effective for Modeling User Behavior Toward Phishing and Spear-Phishing Attacks.
    Martin J; Dubé C; Coovert MD
    Hum Factors; 2018 Dec; 60(8):1179-1191. PubMed ID: 30063406
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.
    Rajivan P; Gonzalez C
    Front Psychol; 2018; 9():135. PubMed ID: 29515478
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 38. The Role of Health Concerns in Phishing Susceptibility: Survey Design Study.
    Abdelhamid M
    J Med Internet Res; 2020 May; 22(5):e18394. PubMed ID: 32364511
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Ethics and Phishing Experiments.
    Resnik DB; Finn PR
    Sci Eng Ethics; 2018 Aug; 24(4):1241-1252. PubMed ID: 28812222
    [TBL] [Abstract][Full Text] [Related]  

  • 40. The role of cue utilization in the detection of phishing emails.
    Sturman D; Valenzuela C; Plate O; Tanvir T; Auton JC; Bayl-Smith P; Wiggins MW
    Appl Ergon; 2023 Jan; 106():103887. PubMed ID: 36037654
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.