These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

195 related articles for article (PubMed ID: 37177743)

  • 1. Predicting Cybersecurity Threats in Critical Infrastructure for Industry 4.0: A Proactive Approach Based on Attacker Motivations.
    Alqudhaibi A; Albarrak M; Aloseel A; Jagtap S; Salonitis K
    Sensors (Basel); 2023 May; 23(9):. PubMed ID: 37177743
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.
    Nankya M; Chataut R; Akl R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960539
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.
    Wang H; Lau N; Gerdes RM
    Hum Factors; 2018 Aug; 60(5):699-718. PubMed ID: 29664683
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Trustworthy and Reliable Deep Learning-based Cyberattack Detection in Industrial IoT.
    Khan F; Alturki R; Rehman MA; Mastorakis S; Razzak I; Shah ST
    IEEE Trans Industr Inform; 2023 Jan; 19(1):1030-1038. PubMed ID: 37469712
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.
    Yin XC; Liu ZG; Nkenyereye L; Ndibanje B
    Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31739400
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.
    Wang W; Harrou F; Bouyeddou B; Senouci SM; Sun Y
    Cluster Comput; 2022; 25(1):561-578. PubMed ID: 34629940
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.
    Żebrowski P; Couce-Vieira A; Mancuso A
    Risk Anal; 2022 Oct; 42(10):2275-2290. PubMed ID: 35229333
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure.
    Pinto A; Herrera LC; Donoso Y; Gutierrez JA
    Sensors (Basel); 2023 Feb; 23(5):. PubMed ID: 36904618
    [TBL] [Abstract][Full Text] [Related]  

  • 9. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
    Vrhovec S; Markelj B
    PLoS One; 2024; 19(10):e0312266. PubMed ID: 39423170
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap.
    Dhirani LL; Armstrong E; Newe T
    Sensors (Basel); 2021 Jun; 21(11):. PubMed ID: 34198727
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.
    Allodi L; Massacci F
    Risk Anal; 2017 Aug; 37(8):1606-1627. PubMed ID: 28800378
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Application Perspective on Cybersecurity Testbed for Industrial Control Systems.
    Pospisil O; Blazek P; Kuchar K; Fujdiak R; Misurec J
    Sensors (Basel); 2021 Dec; 21(23):. PubMed ID: 34884123
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Clinicians' Perspectives on Healthcare Cybersecurity and Cyber Threats.
    Alanazi AT
    Cureus; 2023 Oct; 15(10):e47026. PubMed ID: 37965389
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cognitive Models in Cybersecurity: Learning From Expert Analysts and Predicting Attacker Behavior.
    Veksler VD; Buchler N; LaFleur CG; Yu MS; Lebiere C; Gonzalez C
    Front Psychol; 2020; 11():1049. PubMed ID: 32612551
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Vulnerability to Cyberattacks and Sociotechnical Solutions for Health Care Systems: Systematic Review.
    Ewoh P; Vartiainen T
    J Med Internet Res; 2024 May; 26():e46904. PubMed ID: 38820579
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach.
    Figueroa-Lorenzo S; Añorga J; Arrizabalaga S
    Sensors (Basel); 2019 Oct; 19(20):. PubMed ID: 31615147
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 20. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 10.