These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
168 related articles for article (PubMed ID: 36408329)
1. Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study. Ünözkan H; Ertem M; Bendak S Netw Model Anal Health Inform Bioinform; 2022; 11(1):52. PubMed ID: 36408329 [TBL] [Abstract][Full Text] [Related]
2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354 [No Abstract] [Full Text] [Related]
3. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Wasserman L; Wasserman Y Front Digit Health; 2022; 4():862221. PubMed ID: 36033634 [TBL] [Abstract][Full Text] [Related]
4. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review. Ewoh P; Vartiainen T J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579 [TBL] [Abstract][Full Text] [Related]
5. Clinicians' Perspectives on Healthcare Cybersecurity and Cyber Threats. Alanazi AT Cureus; 2023 Oct; 15(10):e47026. PubMed ID: 37965389 [TBL] [Abstract][Full Text] [Related]
6. A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Alawida M; Omolara AE; Abiodun OI; Al-Rajab M J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180 [TBL] [Abstract][Full Text] [Related]
7. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468 [TBL] [Abstract][Full Text] [Related]
8. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study. Portela D; Nogueira-Leite D; Almeida R; Cruz-Correia R JMIR Form Res; 2023 Jun; 7():e41738. PubMed ID: 37389934 [TBL] [Abstract][Full Text] [Related]
9. Advocacy of cyber public health. Hashimoto N Glob Health Med; 2021 Aug; 3(4):246-248. PubMed ID: 34532607 [TBL] [Abstract][Full Text] [Related]
10. Security vulnerabilities in healthcare: an analysis of medical devices and software. Mejía-Granda CM; Fernández-Alemán JL; Carrillo-de-Gea JM; García-Berná JA Med Biol Eng Comput; 2024 Jan; 62(1):257-273. PubMed ID: 37789249 [TBL] [Abstract][Full Text] [Related]
11. BoostedEnML: Efficient Technique for Detecting Cyberattacks in IoT Systems Using Boosted Ensemble Machine Learning. Okey OD; Maidin SS; Adasme P; Lopes Rosa R; Saadi M; Carrillo Melgarejo D; Zegarra Rodríguez D Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236506 [TBL] [Abstract][Full Text] [Related]
12. Interconnected and resilient: A CGE analysis of AI-driven cyberattacks in global trade. Osman R; El-Gendy S Risk Anal; 2024 Jun; ():. PubMed ID: 38837258 [TBL] [Abstract][Full Text] [Related]
13. Impact of cyberattacks on safety and stability of connected and automated vehicle platoons under lane changes. Khattak ZH; Smith BL; Fontaine MD Accid Anal Prev; 2021 Feb; 150():105861. PubMed ID: 33445034 [TBL] [Abstract][Full Text] [Related]
14. The elephant in the room: cybersecurity in healthcare. Cartwright AJ J Clin Monit Comput; 2023 Oct; 37(5):1123-1132. PubMed ID: 37088852 [TBL] [Abstract][Full Text] [Related]
15. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks. Abu Al-Haija Q Front Big Data; 2021; 4():782902. PubMed ID: 35098112 [TBL] [Abstract][Full Text] [Related]
16. Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations. Alqudhaibi A; Albarrak M; Aloseel A; Jagtap S; Salonitis K Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177743 [TBL] [Abstract][Full Text] [Related]
17. Human Cognition Through the Lens of Social Engineering Cyberattacks. Montañez R; Golob E; Xu S Front Psychol; 2020; 11():1755. PubMed ID: 33101096 [TBL] [Abstract][Full Text] [Related]
18. Intrusion Detection in Vehicle Controller Area Network (CAN) Bus Using Machine Learning: A Comparative Performance Study. Bari BS; Yelamarthi K; Ghafoor S Sensors (Basel); 2023 Mar; 23(7):. PubMed ID: 37050674 [TBL] [Abstract][Full Text] [Related]
19. Support for the Vulnerability Management Process Using Conversion CVSS Base Score 2.0 to 3.x. Nowak MR; Walkowski M; Sujecki S Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850400 [TBL] [Abstract][Full Text] [Related]
20. Detection and mitigation of coordinated cyber-physical attack in CPPS. Sree Varshini GY; Latha S Heliyon; 2024 Feb; 10(4):e26332. PubMed ID: 38420452 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]