Results 91 to 100 of about 1,936 (160)
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Cybersecurity in connected medical devices: a policy agenda for the NHS. [PDF]
Toparti O, Rajput K, Darzi A, Ghafur S.
europepmc +1 more source
Ransomware attacks -- in contrast to other cyber attacks -- must not be detected and especially not blocked or recovered on first sight. This relaxation is supported by the rareness of ransomware attacks. Certainly, the uprising of ransomware families, which are able to circumvent the detection mechanism, integrated into the local machine, prevents the
openaire +1 more source
During the first months of 2020, the evolution and importance of the resources proposed by the Digital Society has been showed for the implementation of the concept of "Business Continuity", for teleworking in organizations and also for the establishment of new forms of communication between people.
openaire +1 more source
When the Firewall Fails: A Digital Wake-Up Call for Dermatology. [PDF]
Madhumita M, Ponnarasu S, Ancy A.
europepmc +1 more source
Ransomware Attacks and Data Breaches in US Health Care Systems. [PDF]
Jiang JX, Ross JS, Bai G.
europepmc +1 more source
Enhancing cyberattack resiliency through the radiotherapy backup and recovery dashboard tool. [PDF]
Pijanowski J +5 more
europepmc +1 more source
A multi-label visualisation approach for malware behaviour analysis. [PDF]
Uysal DT +4 more
europepmc +1 more source
Cacography based Ransomware Email Phishing Attack Prevention using Language Pack Tuned Transformer Language Model. [PDF]
Abiramasundari S, Ramaswamy V.
europepmc +1 more source
An intelligent ransomware based cyberthreat detection model using multi head attention-based recurrent neural networks with optimization algorithm in IoT environment. [PDF]
Alzakari SA +7 more
europepmc +1 more source

