These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

161 related articles for article (PubMed ID: 38715765)

  • 1. Emerging Trends in Cybersecurity: A Holistic View on Current Threats, Assessing Solutions, and Pioneering New Frontiers.
    Zaid T; Garai S
    Blockchain Healthc Today; 2024; 7():. PubMed ID: 38715765
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs.
    Manzoor J; Waleed A; Jamali AF; Masood A
    PLoS One; 2024; 19(3):e0301183. PubMed ID: 38547149
    [TBL] [Abstract][Full Text] [Related]  

  • 4. CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence.
    Ortiz-Garcés I; Govea J; Sánchez-Viteri S; Villegas-Ch W
    PeerJ Comput Sci; 2024; 10():e2041. PubMed ID: 38983228
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Usability and Feasibility Evaluation of a Web-Based and Offline Cybersecurity Resource for Health Care Organizations (The Essentials of Cybersecurity in Health Care Organizations Framework Resource): Mixed Methods Study.
    O'Brien N; Fernandez Crespo R; O'Driscoll F; Prendergast M; Chana D; Darzi A; Ghafur S
    JMIR Form Res; 2024 Apr; 8():e50968. PubMed ID: 38603777
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance.
    Savaş S; Karataş S
    Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 11. An Adversarial Risk Analysis Framework for Cybersecurity.
    Rios Insua D; Couce-Vieira A; Rubio JA; Pieters W; Labunets K; G Rasines D
    Risk Anal; 2021 Jan; 41(1):16-36. PubMed ID: 31183890
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
    Oh SH; Jeong MK; Kim HC; Park J
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991711
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges.
    Achaal B; Adda M; Berger M; Ibrahim H; Awde A
    Cybersecur (Singap); 2024; 7(1):10. PubMed ID: 38707764
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Leveraging human factors in cybersecurity: an integrated methodological approach.
    Pollini A; Callari TC; Tedeschi A; Ruscio D; Save L; Chiarugi F; Guerri D
    Cogn Technol Work; 2022; 24(2):371-390. PubMed ID: 34149309
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cybersecurity and remote working: Croatia's (non-)response to increased cyber threats.
    Škiljić A
    Int Cybersecur Law Rev; 2020; 1(1-2):51-61. PubMed ID: 38624512
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data.
    SaberiKamarposhti M; Ng KW; Chua FF; Abdullah J; Yadollahi M; Moradi M; Ahmadpour S
    Heliyon; 2024 May; 10(10):e31406. PubMed ID: 38826742
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Challenges and efforts in managing AI trustworthiness risks: a state of knowledge.
    Polemi N; Praça I; Kioskli K; Bécue A
    Front Big Data; 2024; 7():1381163. PubMed ID: 38798307
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Transforming Healthcare Cybersecurity from Reactive to Proactive: Current Status and Future Recommendations.
    Bhuyan SS; Kabir UY; Escareno JM; Ector K; Palakodeti S; Wyant D; Kumar S; Levy M; Kedia S; Dasgupta D; Dobalian A
    J Med Syst; 2020 Apr; 44(5):98. PubMed ID: 32239357
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.