These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

206 related articles for article (PubMed ID: 37631808)

  • 21. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.
    He M; Devine L; Zhuang J
    Risk Anal; 2018 Feb; 38(2):215-225. PubMed ID: 28799659
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics.
    Djenna A; Barka E; Benchikh A; Khadir K
    Sensors (Basel); 2023 Jul; 23(14):. PubMed ID: 37514596
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Cyber security threats: A never-ending challenge for e-commerce.
    Liu X; Ahmad SF; Anser MK; Ke J; Irshad M; Ul-Haq J; Abbas S
    Front Psychol; 2022; 13():927398. PubMed ID: 36337532
    [TBL] [Abstract][Full Text] [Related]  

  • 24. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Economic Impact of a Hospital Cyberattack in a National Health System: Descriptive Case Study.
    Portela D; Nogueira-Leite D; Almeida R; Cruz-Correia R
    JMIR Form Res; 2023 Jun; 7():e41738. PubMed ID: 37389934
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Resilience of Cyber Systems with Over- and Underregulation.
    Gisladottir V; Ganin AA; Keisler JM; Kepner J; Linkov I
    Risk Anal; 2017 Sep; 37(9):1644-1651. PubMed ID: 27935146
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 30. An Adversarial Risk Analysis Framework for Cybersecurity.
    Rios Insua D; Couce-Vieira A; Rubio JA; Pieters W; Labunets K; G Rasines D
    Risk Anal; 2021 Jan; 41(1):16-36. PubMed ID: 31183890
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.
    Nankya M; Chataut R; Akl R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960539
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Clinicians' Perspectives on Healthcare Cybersecurity and Cyber Threats.
    Alanazi AT
    Cureus; 2023 Oct; 15(10):e47026. PubMed ID: 37965389
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.
    Kim K; Alshenaifi IM; Ramachandran S; Kim J; Zia T; Almorjan A
    Sensors (Basel); 2023 Apr; 23(7):. PubMed ID: 37050740
    [TBL] [Abstract][Full Text] [Related]  

  • 34. A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems.
    Żebrowski P; Couce-Vieira A; Mancuso A
    Risk Anal; 2022 Oct; 42(10):2275-2290. PubMed ID: 35229333
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.
    Zaid T; Garai S
    Blockchain Healthc Today; 2024; 7():. PubMed ID: 38715765
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Trends and best practices in health care cybersecurity insurance policy.
    Kabir UY; Ezekekwu E; Bhuyan SS; Mahmood A; Dobalian A
    J Healthc Risk Manag; 2020 Oct; 40(2):10-14. PubMed ID: 32441812
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Breaking down silos between business continuity and cyber security.
    Phillips R; Tanner B
    J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.
    He Y; Zamani E; Yevseyeva I; Luo C
    J Med Internet Res; 2023 Apr; 25():e41748. PubMed ID: 37097723
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Hospital cybersecurity risks and gaps: Review (for the non-cyber professional).
    Wasserman L; Wasserman Y
    Front Digit Health; 2022; 4():862221. PubMed ID: 36033634
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 11.