These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

160 related articles for article (PubMed ID: 38879689)

  • 1. DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets.
    Aqeel S; Khan SU; Khan AS; Alharbi M; Shah S; Affendi ME; Ahmad N
    Sci Rep; 2024 Jun; 14(1):13839. PubMed ID: 38879689
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cybersecurity on a budget: Evaluating security and performance of open-source SIEM solutions for SMEs.
    Manzoor J; Waleed A; Jamali AF; Masood A
    PLoS One; 2024; 19(3):e0301183. PubMed ID: 38547149
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Development of an IoT Architecture Based on a Deep Neural Network against Cyber Attacks for Automated Guided Vehicles.
    Elsisi M; Tran MQ
    Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960561
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review.
    Apau R; Asante M; Twum F; Ben Hayfron-Acquah J; Peasah KO
    PLoS One; 2024; 19(9):e0308807. PubMed ID: 39283894
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber Hygiene Methodology for Raising Cybersecurity and Data Privacy Awareness in Health Care Organizations: Concept Study.
    Argyridou E; Nifakos S; Laoudias C; Panda S; Panaousis E; Chandramouli K; Navarro-Llobet D; Mora Zamorano J; Papachristou P; Bonacina S
    J Med Internet Res; 2023 Jul; 25():e41294. PubMed ID: 37498644
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems.
    Kumari KA; Sharma A; Chakraborty C; Ananyaa M
    Big Data; 2022 Feb; 10(1):1-17. PubMed ID: 34375143
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations.
    Saeed S; Altamimi SA; Alkayyal NA; Alshehri E; Alabbad DA
    Sensors (Basel); 2023 Jul; 23(15):. PubMed ID: 37571451
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Emerging Security Mechanisms for Medical Cyber Physical Systems.
    Kocabas O; Soyata T; Aktas MK
    IEEE/ACM Trans Comput Biol Bioinform; 2016; 13(3):401-16. PubMed ID: 26812732
    [TBL] [Abstract][Full Text] [Related]  

  • 13. BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks.
    Papathanasiou A; Liontos G; Paparis G; Liagkou V; Glavas E
    Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475211
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach.
    Banu S A; Amirtharajan R
    Med Biol Eng Comput; 2020 Jul; 58(7):1445-1458. PubMed ID: 32319032
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 16. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience.
    Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM
    Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Preschool Cyber Security Management System Based on Intelligent Agents.
    Song J
    Comput Intell Neurosci; 2022; 2022():1992429. PubMed ID: 36248916
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring.
    Ghadi YY; Alsuhibany SA; Ahmad J; Kumar H; Boulila W; Alsaedi M; Khan K; Bhatti SA
    J Healthc Eng; 2022; 2022():7745132. PubMed ID: 36397885
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure Vehicular Platoon Management against Sybil Attacks.
    Junaidi DR; Ma M; Su R
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433596
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.