These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

173 related articles for article (PubMed ID: 34803469)

  • 61. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 62. The Role of User Behaviour in Improving Cyber Security Management.
    Moustafa AA; Bello A; Maurushat A
    Front Psychol; 2021; 12():561011. PubMed ID: 34220596
    [TBL] [Abstract][Full Text] [Related]  

  • 63. Maritime cybersecurity: are onboard systems ready?
    Kanwal K; Shi W; Kontovas C; Yang Z; Chang CH
    Marit Policy Manag; 2024; 51(3):484-502. PubMed ID: 38832094
    [TBL] [Abstract][Full Text] [Related]  

  • 64. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling.
    Kleitman S; Law MKH; Kay J
    PLoS One; 2018; 13(10):e0205089. PubMed ID: 30365492
    [TBL] [Abstract][Full Text] [Related]  

  • 65. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities.
    Alhuwail D; Al-Jafar E; Abdulsalam Y; AlDuaij S
    Appl Clin Inform; 2021 Aug; 12(4):924-932. PubMed ID: 34587638
    [TBL] [Abstract][Full Text] [Related]  

  • 66. Phishing suspiciousness in older and younger adults: The role of executive functioning.
    Gavett BE; Zhao R; John SE; Bussell CA; Roberts JR; Yue C
    PLoS One; 2017; 12(2):e0171620. PubMed ID: 28158316
    [TBL] [Abstract][Full Text] [Related]  

  • 67. Cybersecurity and critical care staff: A mixed methods study.
    Hore K; Hoi Tan M; Kehoe A; Beegan A; Mason S; Al Mane N; Hughes D; Kelly C; Wells J; Magner C
    Int J Med Inform; 2024 May; 185():105412. PubMed ID: 38492407
    [TBL] [Abstract][Full Text] [Related]  

  • 68. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.
    He M; Devine L; Zhuang J
    Risk Anal; 2018 Feb; 38(2):215-225. PubMed ID: 28799659
    [TBL] [Abstract][Full Text] [Related]  

  • 69. An overview of cybersecurity in Zimbabwe's financial services sector.
    Maphosa V
    F1000Res; 2023; 12():1251. PubMed ID: 38559360
    [TBL] [Abstract][Full Text] [Related]  

  • 70. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

  • 71. Is This Phishing? Older Age Is Associated With Greater Difficulty Discriminating Between Safe and Malicious Emails.
    Grilli MD; McVeigh KS; Hakim ZM; Wank AA; Getz SJ; Levin BE; Ebner NC; Wilson RC
    J Gerontol B Psychol Sci Soc Sci; 2021 Oct; 76(9):1711-1715. PubMed ID: 33378418
    [TBL] [Abstract][Full Text] [Related]  

  • 72. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 73. Susceptibility to phishing on social network sites: A personality information processing model.
    Frauenstein ED; Flowerday S
    Comput Secur; 2020 Jul; 94():101862. PubMed ID: 32501314
    [TBL] [Abstract][Full Text] [Related]  

  • 74. Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk.
    Canfield CI; Fischhoff B
    Risk Anal; 2018 Apr; 38(4):826-838. PubMed ID: 29023908
    [TBL] [Abstract][Full Text] [Related]  

  • 75. How personal characteristics impact phishing susceptibility: The mediating role of mail processing.
    Ge Y; Lu L; Cui X; Chen Z; Qu W
    Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073
    [TBL] [Abstract][Full Text] [Related]  

  • 76. Detecting phishing websites using machine learning technique.
    Dutta AK
    PLoS One; 2021; 16(10):e0258361. PubMed ID: 34634081
    [TBL] [Abstract][Full Text] [Related]  

  • 77. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
    Allodi L; Massacci F
    Risk Anal; 2017 Aug; 37(8):1606-1627. PubMed ID: 28800378
    [TBL] [Abstract][Full Text] [Related]  

  • 78. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
    Djenna A; Barka E; Benchikh A; Khadir K
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
    [TBL] [Abstract][Full Text] [Related]  

  • 79. Trends and best practices in health care cybersecurity insurance policy.
    Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A
    J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812
    [TBL] [Abstract][Full Text] [Related]  

  • 80. COVID-19 malicious domain names classification.
    Mvula PK; Branco P; Jourdan GV; Viktor HL
    Expert Syst Appl; 2022 Oct; 204():117553. PubMed ID: 35611122
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.