These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

234 related articles for article (PubMed ID: 35341185)

  • 21. Cybersecurity Challenges and the Academic Health Center: An Interactive Tabletop Simulation for Executives.
    Maggio LA; Dameff C; Kanter SL; Woods B; Tully J
    Acad Med; 2021 Jun; 96(6):850-853. PubMed ID: 33239532
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 23. The relationship between cybersecurity ratings and the risk of hospital data breaches.
    Choi SJ; Johnson ME
    J Am Med Inform Assoc; 2021 Sep; 28(10):2085-2092. PubMed ID: 34338786
    [TBL] [Abstract][Full Text] [Related]  

  • 24. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.
    Proctor RW; Chen J
    Hum Factors; 2015 Aug; 57(5):721-7. PubMed ID: 25994927
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Usage of insecure E-mail services among researchers with different scientific background.
    Solić K; Grgić K; Ilakovac V; Zagar D
    Med Glas (Zenica); 2011 Aug; 8(2):273-6. PubMed ID: 21849951
    [TBL] [Abstract][Full Text] [Related]  

  • 27. [Research on testing the robustness of DICOM-e-mail secure teleradiology systems].
    Cao OL; Zhao J; Zhuang TG
    Zhongguo Yi Liao Qi Xie Za Zhi; 2006 Jul; 30(4):280-3, 252. PubMed ID: 17039939
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 29. How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates.
    An Q; Hong WCH; Xu X; Zhang Y; Kolletar-Zhu K
    Int J Inf Secur; 2023; 22(2):305-317. PubMed ID: 36466362
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Cybersecurity Testing for Automotive Domain: A Survey.
    Luo F; Zhang X; Yang Z; Jiang Y; Wang J; Wu M; Feng W
    Sensors (Basel); 2022 Nov; 22(23):. PubMed ID: 36501913
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Cybersecurity Protection for PACS and Medical Imaging: Deployment Considerations and Practical Problems.
    Eichelberg M; Kleber K; Kämmerer M
    Acad Radiol; 2021 Dec; 28(12):1761-1774. PubMed ID: 33023808
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Connected Medical Technology and Cybersecurity Informed Consent: A New Paradigm.
    Tully J; Coravos A; Doerr M; Dameff C
    J Med Internet Res; 2020 Mar; 22(3):e17612. PubMed ID: 32224492
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Cybersecurity features of digital medical devices: an analysis of FDA product summaries.
    Stern AD; Gordon WJ; Landman AB; Kramer DB
    BMJ Open; 2019 Jun; 9(6):e025374. PubMed ID: 31256020
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Information Security in Medical Robotics: A Survey on the Level of Training, Awareness and Use of the Physiotherapist.
    Monoscalco L; Simeoni R; Maccioni G; Giansanti D
    Healthcare (Basel); 2022 Jan; 10(1):. PubMed ID: 35052322
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Assessment of Employee Susceptibility to Phishing Attacks at US Health Care Institutions.
    Gordon WJ; Wright A; Aiyagari R; Corbo L; Glynn RJ; Kadakia J; Kufahl J; Mazzone C; Noga J; Parkulo M; Sanford B; Scheib P; Landman AB
    JAMA Netw Open; 2019 Mar; 2(3):e190393. PubMed ID: 30848810
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Cybersecurity and Technical Patient Privacy Protection.
    Nachbar JM; Kinney BM; Sacks JM; Gurtner GC; TerKonda SP; Reddy SK; Jeffers LL
    Plast Reconstr Surg; 2024 Jul; 154(1):250-257. PubMed ID: 37220229
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Ethics and Phishing Experiments.
    Resnik DB; Finn PR
    Sci Eng Ethics; 2018 Aug; 24(4):1241-1252. PubMed ID: 28812222
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Measuring the level of cyber-security awareness for cybercrime in Saudi Arabia.
    Alzubaidi A
    Heliyon; 2021 Jan; 7(1):e06016. PubMed ID: 33537477
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Are implanted electronic devices hackable?
    Alexander B; Haseeb S; Baranchuk A
    Trends Cardiovasc Med; 2019 Nov; 29(8):476-480. PubMed ID: 30482482
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Health Care and Cybersecurity: Bibliometric Analysis of the Literature.
    Jalali MS; Razak S; Gordon W; Perakslis E; Madnick S
    J Med Internet Res; 2019 Feb; 21(2):e12644. PubMed ID: 30767908
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 12.