These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

260 related articles for article (PubMed ID: 35300555)

  • 21. Enterprise Cybersecurity: Building a Successful Defense Program.
    Reagin MJ; Gentry MV
    Front Health Serv Manage; 2018; 35(1):13-22. PubMed ID: 30124510
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Analysis of the security and privacy requirements of cloud-based electronic health records systems.
    Rodrigues JJ; de la Torre I; Fernández G; López-Coronado M
    J Med Internet Res; 2013 Aug; 15(8):e186. PubMed ID: 23965254
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.
    Sahi A; Lai D; Li Y
    Comput Biol Med; 2016 Nov; 78():1-8. PubMed ID: 27639895
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives.
    Bhukya CR; Thakur P; Mudhivarthi BR; Singh G
    Sensors (Basel); 2023 Sep; 23(19):. PubMed ID: 37836937
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework.
    Jabar T; Mahinderjit Singh M
    Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808159
    [TBL] [Abstract][Full Text] [Related]  

  • 26. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.
    Argaw ST; Bempong NE; Eshaya-Chauvin B; Flahault A
    BMC Med Inform Decis Mak; 2019 Jan; 19(1):10. PubMed ID: 30634962
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Hospital Bring-Your-Own-Device Security Challenges and Solutions: Systematic Review of Gray Literature.
    Wani TA; Mendoza A; Gray K
    JMIR Mhealth Uhealth; 2020 Jun; 8(6):e18175. PubMed ID: 32554388
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Do data security measures, privacy regulations, and communication standards impact the interoperability of patient health information? A cross-country investigation.
    Shrivastava U; Song J; Han BT; Dietzman D
    Int J Med Inform; 2021 Apr; 148():104401. PubMed ID: 33571743
    [TBL] [Abstract][Full Text] [Related]  

  • 29. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.
    Rezaeibagha F; Win KT; Susilo W
    Health Inf Manag; 2015; 44(3):23-38. PubMed ID: 26464299
    [TBL] [Abstract][Full Text] [Related]  

  • 30. eHealth Cloud Security Challenges: A Survey.
    Al-Issa Y; Ottom MA; Tamrawi A
    J Healthc Eng; 2019; 2019():7516035. PubMed ID: 31565209
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cloud designs and deployment models: a systematic mapping study.
    Odun-Ayo I; Goddy-Worlu R; Samuel V; Geteloma V
    BMC Res Notes; 2019 Jul; 12(1):436. PubMed ID: 31324263
    [TBL] [Abstract][Full Text] [Related]  

  • 32. The need for cybersecurity self-evaluation in healthcare.
    Burke W; Stranieri A; Oseni T; Gondal I
    BMC Med Inform Decis Mak; 2024 May; 24(1):133. PubMed ID: 38783250
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A review on the state-of-the-art privacy-preserving approaches in the e-health clouds.
    Abbas A; Khan SU
    IEEE J Biomed Health Inform; 2014 Jul; 18(4):1431-41. PubMed ID: 25014943
    [TBL] [Abstract][Full Text] [Related]  

  • 35. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 36. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

  • 37. A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus.
    Kowalski SJ; Østby G
    Stud Health Technol Inform; 2022 Nov; 299():20-29. PubMed ID: 36325843
    [TBL] [Abstract][Full Text] [Related]  

  • 38. EARS to cyber incidents in health care.
    Jalali MS; Russell B; Razak S; Gordon WJ
    J Am Med Inform Assoc; 2019 Jan; 26(1):81-90. PubMed ID: 30517701
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Success indicators for an efficient utilization of cloud computing in healthcare organizations: Saudi healthcare as case study.
    Alassafi MO
    Comput Methods Programs Biomed; 2021 Nov; 212():106466. PubMed ID: 34736170
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing.
    Kibiwott KP; Zhao YN; Kogo J; Zhang FL
    Math Biosci Eng; 2019 Apr; 16(5):3561-3594. PubMed ID: 31509915
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 13.