These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

179 related articles for article (PubMed ID: 35194352)

  • 1. Cyber risk and cybersecurity: a systematic review of data availability.
    Cremer F; Sheehan B; Fortmann M; Kia AN; Mullins M; Murphy F; Materne S
    Geneva Pap Risk Insur Issues Pract; 2022; 47(3):698-736. PubMed ID: 35194352
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Risk mitigation services in cyber insurance: optimal contract design and price structure.
    Zeller G; Scherer M
    Geneva Pap Risk Insur Issues Pract; 2023; 48(2):502-547. PubMed ID: 37207020
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
    Kavallieratos G; Spathoulas G; Katsikas S
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33804503
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Reconceptualizing cybersecurity awareness capability in the data-driven digital economy.
    Akter S; Uddin MR; Sajib S; Lee WJT; Michael K; Hossain MA
    Ann Oper Res; 2022 Aug; ():1-26. PubMed ID: 35935743
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A multinational empirical study of perceived cyber barriers to automated vehicles deployment.
    Khan SK; Shiwakoti N; Stasinopoulos P; Warren M
    Sci Rep; 2023 Feb; 13(1):1842. PubMed ID: 36725959
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
    Djenna A; Barka E; Benchikh A; Khadir K
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Patient informed consent, ethical and legal considerations in the context of digital vulnerability with smart, cardiac implantable electronic devices.
    Torgersen LNS; Schulz SM; Lugo RG; Sütterlin S
    PLOS Digit Health; 2024 May; 3(5):e0000507. PubMed ID: 38781144
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.