These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

362 related articles for article (PubMed ID: 34890922)

  • 21. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives.
    Bhukya CR; Thakur P; Mudhivarthi BR; Singh G
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836937
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 23. A multinational empirical study of perceived cyber barriers to automated vehicles deployment.
    Khan SK; Shiwakoti N; Stasinopoulos P; Warren M
    Sci Rep; 2023 Feb; 13(1):1842. PubMed ID: 36725959
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity.
    Aldhyani THH; Alkahtani H
    Sensors (Basel); 2022 Jan; 22(1):. PubMed ID: 35009899
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Vulnerable Road Users and Connected Autonomous Vehicles Interaction: A Survey.
    Reyes-Muñoz A; Guerrero-Ibáñez J
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746397
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Cybersecurity in Hospitals: A Systematic, Organizational Perspective.
    Jalali MS; Kaiser JP
    J Med Internet Res; 2018 May; 20(5):e10059. PubMed ID: 29807882
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Graph Reinforcement Learning-Based Decision-Making Technology for Connected and Autonomous Vehicles: Framework, Review, and Future Trends.
    Liu Q; Li X; Tang Y; Gao X; Yang F; Li Z
    Sensors (Basel); 2023 Oct; 23(19):. PubMed ID: 37837063
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Developing dynamic speed limit strategies for mixed traffic flow to reduce collision risks at freeway bottlenecks.
    Li Y; Pan B; Xing L; Yang M; Dai J
    Accid Anal Prev; 2022 Sep; 175():106781. PubMed ID: 35926373
    [TBL] [Abstract][Full Text] [Related]  

  • 31. The Role of User Behaviour in Improving Cyber Security Management.
    Moustafa AA; Bello A; Maurushat A
    Front Psychol; 2021; 12():561011. PubMed ID: 34220596
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Mixed traffic flow of human-driven vehicles and connected autonomous vehicles: String stability and fundamental diagram.
    Ma L; Qu S; Ren J; Zhang X
    Math Biosci Eng; 2023 Jan; 20(2):2280-2295. PubMed ID: 36899534
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach.
    Abbas SG; Vaccari I; Hussain F; Zahid S; Fayyaz UU; Shah GA; Bakhshi T; Cambiaso E
    Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300556
    [TBL] [Abstract][Full Text] [Related]  

  • 36. GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids.
    Le TD; Ge M; Anwar A; Loke SW; Beuran R; Doss R; Tan Y
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808292
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms.
    Alsaade FW; Al-Adhaileh MH
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112429
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Stability and safety evaluation of mixed traffic flow with connected automated vehicles on expressways.
    Yao Z; Hu R; Jiang Y; Xu T
    J Safety Res; 2020 Dec; 75():262-274. PubMed ID: 33334485
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 19.