These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

135 related articles for article (PubMed ID: 38931707)

  • 1. Design and Development Considerations of a Cyber Physical Testbed for Operational Technology Research and Education.
    Hosseinzadeh S; Voutos D; Barrie D; Owoh N; Ashawa M; Shahrabi A
    Sensors (Basel); 2024 Jun; 24(12):. PubMed ID: 38931707
    [TBL] [Abstract][Full Text] [Related]  

  • 2. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.
    Vrhovec S; Markelj B
    PLoS One; 2024; 19(10):e0312266. PubMed ID: 39423170
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure.
    Riggs H; Tufail S; Parvez I; Tariq M; Khan MA; Amir A; Vuda KV; Sarwat AI
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112400
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 5. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks.
    Farringer DR
    J Law Med Ethics; 2019 Dec; 47(4_suppl):91-102. PubMed ID: 31955693
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 8. A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats During the COVID-19 Pandemic: Challenges and Prospective Solutions.
    Hijji M; Alam G
    IEEE Access; 2021; 9():7152-7169. PubMed ID: 34786300
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.
    Kavallieratos G; Spathoulas G; Katsikas S
    Sensors (Basel); 2021 Mar; 21(5):. PubMed ID: 33804503
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.
    Alzahrani A; Alshehri M; AlGhamdi R; Sharma SK
    Healthcare (Basel); 2023 Jan; 11(3):. PubMed ID: 36766959
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Hybrid Methodology to Assess Cyber Resilience of IoT in Energy Management and Connected Sites.
    Mehmood A; Epiphaniou G; Maple C; Ersotelos N; Wiseman R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960419
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Application Perspective on Cybersecurity Testbed for Industrial Control Systems.
    Pospisil O; Blazek P; Kuchar K; Fujdiak R; Misurec J
    Sensors (Basel); 2021 Dec; 21(23):. PubMed ID: 34884123
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles.
    Khalid Khan S; Shiwakoti N; Stasinopoulos P
    Accid Anal Prev; 2022 Feb; 165():106515. PubMed ID: 34890922
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey.
    Xing W; Shen J
    Sensors (Basel); 2024 Jun; 24(12):. PubMed ID: 38931599
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies.
    Nankya M; Chataut R; Akl R
    Sensors (Basel); 2023 Oct; 23(21):. PubMed ID: 37960539
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Generator of Slow Denial-of-Service Cyber Attacks.
    Sikora M; Fujdiak R; Kuchar K; Holasova E; Misurec J
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450915
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression.
    Lee JH; Ji IH; Jeon SH; Seo JT
    Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Correlation-Based Anomaly Detection in Industrial Control Systems.
    Jadidi Z; Pal S; Hussain M; Nguyen Thanh K
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772600
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A deeper look into cybersecurity issues in the wake of Covid-19: A survey.
    Alawida M; Omolara AE; Abiodun OI; Al-Rajab M
    J King Saud Univ Comput Inf Sci; 2022 Nov; 34(10):8176-8206. PubMed ID: 37521180
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.