These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

168 related articles for article (PubMed ID: 36408329)

  • 21. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.
    Wang W; Harrou F; Bouyeddou B; Senouci SM; Sun Y
    Cluster Comput; 2022; 25(1):561-578. PubMed ID: 34629940
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach.
    Chiaradonna S; Jevtić P; Lanchier N
    Risk Anal; 2023 Dec; 43(12):2450-2485. PubMed ID: 37038249
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Cybersecurity: Positive Changes Through Processes and Team Culture.
    Pullin DW
    Front Health Serv Manage; 2018; 35(1):3-12. PubMed ID: 30124509
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning.
    Akshay Kumaar M; Samiayya D; Vincent PMDR; Srinivasan K; Chang CY; Ganesh H
    Front Public Health; 2021; 9():824898. PubMed ID: 35096763
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Deep Reinforcement Learning for Cyber Security.
    Nguyen TT; Reddi VJ
    IEEE Trans Neural Netw Learn Syst; 2023 Aug; 34(8):3779-3795. PubMed ID: 34723814
    [TBL] [Abstract][Full Text] [Related]  

  • 26. A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids.
    Hussain S; Iqbal A; Hussain SMS; Zanero S; Shikfa A; Ragaini E; Khan I; Alammari R
    Sci Rep; 2023 Feb; 13(1):1857. PubMed ID: 36725897
    [TBL] [Abstract][Full Text] [Related]  

  • 27. The state of research on cyberattacks against hospitals and available best practice recommendations: a scoping review.
    Argaw ST; Bempong NE; Eshaya-Chauvin B; Flahault A
    BMC Med Inform Decis Mak; 2019 Jan; 19(1):10. PubMed ID: 30634962
    [TBL] [Abstract][Full Text] [Related]  

  • 28. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

  • 29. How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks.
    Canetti D; Gross M; Waismel-Manor I; Levanon A; Cohen H
    Cyberpsychol Behav Soc Netw; 2017 Feb; 20(2):72-77. PubMed ID: 28121462
    [TBL] [Abstract][Full Text] [Related]  

  • 30. A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.
    Żebrowski P; Couce-Vieira A; Mancuso A
    Risk Anal; 2022 Oct; 42(10):2275-2290. PubMed ID: 35229333
    [TBL] [Abstract][Full Text] [Related]  

  • 31. A Cybersecure P300-Based Brain-to-Computer Interface against Noise-Based and Fake P300 Cyberattacks.
    Mezzina G; Annese VF; De Venuto D
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960373
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Examining the Suitability of NetFlow Features in Detecting IoT Network Intrusions.
    Awad M; Fraihat S; Salameh K; Al Redhaei A
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015924
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT.
    Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Cyberattack on Flight Safety: Detection and Mitigation Using LoRa.
    Ronen R; Ben-Moshe B
    Sensors (Basel); 2021 Jul; 21(13):. PubMed ID: 34283155
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Cybersecurity and critical care staff: A mixed methods study.
    Hore K; Hoi Tan M; Kehoe A; Beegan A; Mason S; Al Mane N; Hughes D; Kelly C; Wells J; Magner C
    Int J Med Inform; 2024 May; 185():105412. PubMed ID: 38492407
    [TBL] [Abstract][Full Text] [Related]  

  • 36. When all computers shut down: the clinical impact of a major cyber-attack on a general hospital.
    Abbou B; Kessel B; Ben Natan M; Gabbay-Benziv R; Dahan Shriki D; Ophir A; Goldschmid N; Klein A; Roguin A; Dudkiewicz M
    Front Digit Health; 2024; 6():1321485. PubMed ID: 38433989
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Emerging Cybersecurity Threats in Radiation Oncology.
    Joyce C; Roman FL; Miller B; Jeffries J; Miller RC
    Adv Radiat Oncol; 2021; 6(6):100796. PubMed ID: 34746516
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Classification of Challenges and Threats in Healthcare Cybersecurity: A Systematic Review.
    Aljuraid R; Justinia T
    Stud Health Technol Inform; 2022 Jun; 295():362-365. PubMed ID: 35773885
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.
    Yin XC; Liu ZG; Nkenyereye L; Ndibanje B
    Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31739400
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Transfer-Learning-Based Intrusion Detection Framework in IoT Networks.
    Rodríguez E; Valls P; Otero B; Costa JJ; Verdú J; Pajuelo MA; Canal R
    Sensors (Basel); 2022 Jul; 22(15):. PubMed ID: 35957178
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 9.