These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

123 related articles for article (PubMed ID: 36720897)

  • 1. Knowledge mining of unstructured information: application to cyber domain.
    Takko T; Bhattacharya K; Lehto M; Jalasvirta P; Cederberg A; Kaski K
    Sci Rep; 2023 Jan; 13(1):1714. PubMed ID: 36720897
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An ontology-driven framework for knowledge representation of digital extortion attacks.
    Keshavarzi M; Ghaffary HR
    Comput Human Behav; 2023 Feb; 139():107520. PubMed ID: 36268220
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Automated ontology generation framework powered by linked biomedical ontologies for disease-drug domain.
    Alobaidi M; Malik KM; Hussain M
    Comput Methods Programs Biomed; 2018 Oct; 165():117-128. PubMed ID: 30337066
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A holistic and proactive approach to forecasting cyber threats.
    Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
    Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 7. Advancing Coordinated Cyber-investigations and Tool Interoperability using a Community Developed Specification Language.
    Casey E; Barnum S; Griffith R; Snyder J; van Beek H; Nelson A
    Digit Investig; 2017; 22():. PubMed ID: 31579279
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.
    Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P
    Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Systemic Cyber Risk and Aggregate Impacts.
    Welburn JW; Strong AM
    Risk Anal; 2022 Aug; 42(8):1606-1622. PubMed ID: 33594708
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Generating a Tolerogenic Cell Therapy Knowledge Graph from Literature.
    Lamurias A; Ferreira JD; Clarke LA; Couto FM
    Front Immunol; 2017; 8():1656. PubMed ID: 29238346
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Diverging deep learning cognitive computing techniques into cyber forensics.
    Karie NM; Kebande VR; Venter HS
    Forensic Sci Int Synerg; 2019; 1():61-67. PubMed ID: 32411955
    [TBL] [Abstract][Full Text] [Related]  

  • 14. How to punish cyber criminals: A study to investigate the target and consequence based punishments for malware attacks in UK, USA, China, Ethiopia & Pakistan.
    Khadam N; Anjum N; Alam A; Ali Mirza Q; Assam M; Ismail EAA; Abonazel MR
    Heliyon; 2023 Dec; 9(12):e22823. PubMed ID: 38076082
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Automatic Narrative Summarization for Visualizing Cyber Security Logs and Incident Reports.
    Gove R
    IEEE Trans Vis Comput Graph; 2022 Jan; 28(1):1182-1190. PubMed ID: 34587070
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Analysis of cyber security knowledge gaps based on cyber security body of knowledge.
    Catal C; Ozcan A; Donmez E; Kasif A
    Educ Inf Technol (Dordr); 2023; 28(2):1809-1831. PubMed ID: 35967829
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A systematic review of literature on credit card cyber fraud detection using machine and deep learning.
    Marazqah Btoush EAL; Zhou X; Gururajan R; Chan KC; Genrich R; Sankaran P
    PeerJ Comput Sci; 2023; 9():e1278. PubMed ID: 37346569
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Representation Learning Method with Semantic Propagation on Text-Augmented Knowledge Graphs.
    Wang L; Lu J; Zhou G; Pan H; Zhu T; Huang N; He P
    Comput Intell Neurosci; 2022; 2022():1438047. PubMed ID: 36203718
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Framework for cyber risk loss distribution of hospital infrastructure: Bond percolation on mixed random graphs approach.
    Chiaradonna S; Jevtić P; Lanchier N
    Risk Anal; 2023 Dec; 43(12):2450-2485. PubMed ID: 37038249
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Extracting medication information from unstructured public health data: a demonstration on data from population-based and tertiary-based samples.
    Chen R; Ho JC; Lin JS
    BMC Med Res Methodol; 2020 Oct; 20(1):258. PubMed ID: 33059588
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.