These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

203 related articles for article (PubMed ID: 37631808)

  • 1. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 4. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
    Lykou G; Anagnostopoulou A; Gritzalis D
    Sensors (Basel); 2018 Dec; 19(1):. PubMed ID: 30577633
    [TBL] [Abstract][Full Text] [Related]  

  • 7. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.
    Ghaleb FA; Alsaedi M; Saeed F; Ahmad J; Alasli M
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591061
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Modelling cybersecurity regulations for automated vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P; Warren M
    Accid Anal Prev; 2023 Jun; 186():107054. PubMed ID: 37023653
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cybersecurity and remote working: Croatia's (non-)response to increased cyber threats.
    Škiljić A
    Int Cybersecur Law Rev; 2020; 1(1-2):51-61. PubMed ID: 38624512
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees.
    Hijji M; Alam G
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433259
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cybersecurity in Hospitals: A Systematic, Organizational Perspective.
    Jalali MS; Kaiser JP
    J Med Internet Res; 2018 May; 20(5):e10059. PubMed ID: 29807882
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study.
    O'Brien N; Fernandez Crespo R; O'Driscoll F; Prendergast M; Chana D; Darzi A; Ghafur S
    JMIR Form Res; 2024 Apr; 8():e50968. PubMed ID: 38603777
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
    Achaal B; Adda M; Berger M; Ibrahim H; Awde A
    Cybersecur (Singap); 2024; 7(1):10. PubMed ID: 38707764
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.
    Ilca LF; Lucian OP; Balan TC
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571540
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.
    He M; Devine L; Zhuang J
    Risk Anal; 2018 Feb; 38(2):215-225. PubMed ID: 28799659
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.