These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

171 related articles for article (PubMed ID: 37521508)

  • 1. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 6. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Reconceptualizing cybersecurity awareness capability in the data-driven digital economy.
    Akter S; Uddin MR; Sajib S; Lee WJT; Michael K; Hossain MA
    Ann Oper Res; 2022 Aug; ():1-26. PubMed ID: 35935743
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.
    Zaid T; Garai S
    Blockchain Healthc Today; 2024; 7():. PubMed ID: 38715765
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cyber risk and cybersecurity: a systematic review of data availability.
    Cremer F; Sheehan B; Fortmann M; Kia AN; Mullins M; Murphy F; Materne S
    Geneva Pap Risk Insur Issues Pract; 2022; 47(3):698-736. PubMed ID: 35194352
    [TBL] [Abstract][Full Text] [Related]  

  • 13. An Ontology-Based Cybersecurity Framework for the Internet of Things.
    Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R
    Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Modelling cybersecurity regulations for automated vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P; Warren M
    Accid Anal Prev; 2023 Jun; 186():107054. PubMed ID: 37023653
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
    Oh SH; Jeong MK; Kim HC; Park J
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991711
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Clinicians' Perspectives on Healthcare Cybersecurity and Cyber Threats.
    Alanazi AT
    Cureus; 2023 Oct; 15(10):e47026. PubMed ID: 37965389
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

  • 19. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.