• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4593037)   Today's Articles (3665)   Subscriber (49318)
Number Citation Analysis
51
Bradshaw EL, Ryan RM, Noetel M, Saeri AK, Slattery P, Grundy E, Calvo R. Information Safety Assurances Increase Intentions to Use COVID-19 Contact Tracing Applications, Regardless of Autonomy-Supportive or Controlling Message Framing. Front Psychol 2021;11:591638. [PMID: 33542699 PMCID: PMC7852485 DOI: 10.3389/fpsyg.2020.591638] [Citation(s) in RCA: 17] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/05/2020] [Accepted: 12/07/2020] [Indexed: 11/25/2022]  Open
52
Gordon WJ, Wright A, Glynn RJ, Kadakia J, Mazzone C, Leinbach E, Landman A. Evaluation of a mandatory phishing training program for high-risk employees at a US healthcare system. J Am Med Inform Assoc 2020;26:547-552. [PMID: 30861069 DOI: 10.1093/jamia/ocz005] [Citation(s) in RCA: 28] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/08/2018] [Revised: 12/21/2018] [Accepted: 01/21/2019] [Indexed: 11/12/2022]  Open
53
Dönmez E, Kitapçı NŞ, Kitapçı OC, Yay M, Aksu PK, Köksal L, Mumcu G. Readiness for Health Information Technology is Associated to Information Security in Healthcare Institutions. Acta Inform Med 2020;28:265-271. [PMID: 33627928 PMCID: PMC7879439 DOI: 10.5455/aim.2020.28.265-271] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/05/2020] [Accepted: 12/11/2020] [Indexed: 11/23/2022]  Open
54
Continuous Quantitative Risk Management in Smart Grids Using Attack Defense Trees. SENSORS 2020;20:s20164404. [PMID: 32784568 PMCID: PMC7472492 DOI: 10.3390/s20164404] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2020] [Revised: 07/24/2020] [Accepted: 07/27/2020] [Indexed: 11/29/2022]
55
Jardine E. The Case against Commercial Antivirus Software: Risk Homeostasis and Information Problems in Cybersecurity. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2020;40:1571-1588. [PMID: 32573007 DOI: 10.1111/risa.13534] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/12/2019] [Revised: 02/29/2020] [Accepted: 03/27/2020] [Indexed: 06/11/2023]
56
Nawaz A, Peña Queralta J, Guan J, Awais M, Gia TN, Bashir AK, Kan H, Westerlund T. Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. SENSORS 2020;20:s20143965. [PMID: 32708807 PMCID: PMC7412471 DOI: 10.3390/s20143965] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/30/2020] [Revised: 07/08/2020] [Accepted: 07/08/2020] [Indexed: 11/16/2022]
57
Zhou G, Gou M, Gan Y, Schwarzer R. Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage. Front Psychol 2020;11:1066. [PMID: 32595556 PMCID: PMC7303355 DOI: 10.3389/fpsyg.2020.01066] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/28/2020] [Accepted: 04/27/2020] [Indexed: 12/03/2022]  Open
58
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. SENSORS 2020;20:s20082417. [PMID: 32344534 PMCID: PMC7219501 DOI: 10.3390/s20082417] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/18/2020] [Revised: 04/21/2020] [Accepted: 04/22/2020] [Indexed: 11/26/2022]
59
Tanikawa T, Sasamoto K, Tani Y, Ogasawara K. [Willingness to Acceptance for the Information Leakage of Medical Information Data Using the Contingent Valuation Method]. Nihon Hoshasen Gijutsu Gakkai Zasshi 2019;75:1277-1285. [PMID: 31748453 DOI: 10.6009/jjrt.2019_jsrt_75.11.1277] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
60
Nestor T, De Dieu NJ, Jacques K, Yves EJ, Iliyasu AM, Abd El-Latif AA. A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem. SENSORS (BASEL, SWITZERLAND) 2019;20:E83. [PMID: 31877798 PMCID: PMC6983160 DOI: 10.3390/s20010083] [Citation(s) in RCA: 65] [Impact Index Per Article: 13.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/09/2019] [Revised: 12/16/2019] [Accepted: 12/16/2019] [Indexed: 11/24/2022]
61
Venčkauskas A, Morkevicius N, Jukavičius V, Damaševičius R, Toldinas J, Grigaliūnas Š. An Edge-Fog Secure Self-Authenticable Data Transfer Protocol. SENSORS 2019;19:s19163612. [PMID: 31431005 PMCID: PMC6721158 DOI: 10.3390/s19163612] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/01/2019] [Revised: 08/14/2019] [Accepted: 08/16/2019] [Indexed: 11/23/2022]
62
Cilliers L. Wearable devices in healthcare: Privacy and information security issues. Health Inf Manag 2019;49:150-156. [PMID: 31146589 DOI: 10.1177/1833358319851684] [Citation(s) in RCA: 24] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
63
Wang W, Deng Z, Wang J. Enhancing Sensor Network Security with Improved Internal Hardware Design. SENSORS 2019;19:s19081752. [PMID: 31013741 PMCID: PMC6515428 DOI: 10.3390/s19081752] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/05/2019] [Revised: 04/08/2019] [Accepted: 04/10/2019] [Indexed: 12/02/2022]
64
Kessler SR, Pindek S, Kleinman G, Andel SA, Spector PE. Information security climate and the assessment of information security risk among healthcare employees. Health Informatics J 2019;26:461-473. [PMID: 30866704 DOI: 10.1177/1460458219832048] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
65
Berger KM, Schneck PA. National and Transnational Security Implications of Asymmetric Access to and Use of Biological Data. Front Bioeng Biotechnol 2019;7:21. [PMID: 30859099 PMCID: PMC6397826 DOI: 10.3389/fbioe.2019.00021] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/29/2018] [Accepted: 01/29/2019] [Indexed: 11/13/2022]  Open
66
Luo X, Chen D, Wang Y, Xie P. A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering. SENSORS 2019;19:s19030716. [PMID: 30744187 PMCID: PMC6386832 DOI: 10.3390/s19030716] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/08/2019] [Revised: 01/25/2019] [Accepted: 02/02/2019] [Indexed: 11/28/2022]
67
Wang Z, Yao Y, Tong X, Luo Q, Chen X. Dynamically Reconfigurable Encryption and Decryption System Design for the Internet of Things Information Security. SENSORS (BASEL, SWITZERLAND) 2019;19:s19010143. [PMID: 30609820 PMCID: PMC6338910 DOI: 10.3390/s19010143] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2018] [Revised: 12/23/2018] [Accepted: 12/25/2018] [Indexed: 06/09/2023]
68
Sarbaz M, Manouchehri Monazah F, Banaye Yazdipour A, Kimiafar K. Views of Health Information Management Staff on Non-Technical Security Management Factors, Mashhad, Iran. Stud Health Technol Inform 2019;258:65-69. [PMID: 30942716] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
69
Zhou L, Parmanto B, Joshi J. Development and Evaluation of a New Security and Privacy Track in a Health Informatics Graduate Program: Multidisciplinary Collaboration in Education. JMIR MEDICAL EDUCATION 2018;4:e19. [PMID: 30578227 PMCID: PMC6320416 DOI: 10.2196/mededu.9081] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/28/2017] [Revised: 04/07/2018] [Accepted: 08/25/2018] [Indexed: 06/09/2023]
70
Yu L, Liu X, Zhang W, Hu J, Zou L. [Design and Validation of Remote Radiotherapy System]. ZHONGGUO YI LIAO QI XIE ZA ZHI = CHINESE JOURNAL OF MEDICAL INSTRUMENTATION 2018;42:417-420. [PMID: 30560619 DOI: 10.3969/j.issn.1671-7104.2018.06.007] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
71
Chen H, Song M, Guo Z, Li R, Zou Q, Luo S, Zhang S, Luo Q, Hong J, You L. Highly Secure Physically Unclonable Cryptographic Primitives Based on Interfacial Magnetic Anisotropy. NANO LETTERS 2018;18:7211-7216. [PMID: 30365330 DOI: 10.1021/acs.nanolett.8b03338] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
72
Double Quantum Image Encryption Based on Arnold Transform and Qubit Random Rotation. ENTROPY 2018;20:e20110867. [PMID: 33266591 PMCID: PMC7512429 DOI: 10.3390/e20110867] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/08/2018] [Revised: 11/01/2018] [Accepted: 11/08/2018] [Indexed: 11/17/2022]
73
Tempini N, Leonelli S. Concealment and discovery: The role of information security in biomedical data re-use. SOCIAL STUDIES OF SCIENCE 2018;48:663-690. [PMID: 30322372 PMCID: PMC6193209 DOI: 10.1177/0306312718804875] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/26/2023]
74
Difficulties and Challenges of Anomaly Detection in Smart Cities: A Laboratory Analysis. SENSORS 2018;18:s18103198. [PMID: 30248954 PMCID: PMC6210066 DOI: 10.3390/s18103198] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/19/2018] [Revised: 09/13/2018] [Accepted: 09/18/2018] [Indexed: 11/21/2022]
75
Gao X, Zhao Y, Ma H. Fringing Electric Field Sensors for Anti-Attack at System-Level Protection. SENSORS (BASEL, SWITZERLAND) 2018;18:s18093034. [PMID: 30208573 PMCID: PMC6164414 DOI: 10.3390/s18093034] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/01/2018] [Revised: 09/05/2018] [Accepted: 09/05/2018] [Indexed: 06/08/2023]
76
Sawyer BD, Hancock PA. Hacking the Human: The Prevalence Paradox in Cybersecurity. HUMAN FACTORS 2018;60:597-609. [PMID: 29986155 DOI: 10.1177/0018720818780472] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
77
Venčkauskas A, Morkevicius N, Bagdonas K, Damaševičius R, Maskeliūnas R. A Lightweight Protocol for Secure Video Streaming. SENSORS 2018;18:s18051554. [PMID: 29757988 PMCID: PMC5982168 DOI: 10.3390/s18051554] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/16/2018] [Revised: 05/10/2018] [Accepted: 05/11/2018] [Indexed: 11/16/2022]
78
Hao S, Lü Y, Liu J, Liu Y, Xu D. [Application of classified protection of information security in the information system of air pollution and health impact monitoring]. WEI SHENG YAN JIU = JOURNAL OF HYGIENE RESEARCH 2018;47:103-107. [PMID: 29903233] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
79
Gladden ME. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization. Front Neurosci 2017;11:605. [PMID: 29163010 PMCID: PMC5681937 DOI: 10.3389/fnins.2017.00605] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/31/2017] [Accepted: 10/16/2017] [Indexed: 11/13/2022]  Open
80
Hadlington L, Parsons K. Can Cyberloafing and Internet Addiction Affect Organizational Information Security? CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2017;20:567-571. [PMID: 28872364 DOI: 10.1089/cyber.2017.0239] [Citation(s) in RCA: 29] [Impact Index Per Article: 4.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/23/2023]
81
Zhang Y, Wang Z, Wang Z, Liu X, Yuan X. A DNA-Based Encryption Method Based on Two Biological Axioms of DNA Chip and Polymerase Chain Reaction (PCR) Amplification Techniques. Chemistry 2017;23:13387-13403. [PMID: 28657690 DOI: 10.1002/chem.201701411] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/30/2017] [Indexed: 11/06/2022]
82
Attack Classification Schema for Smart City WSNs. SENSORS 2017;17:s17040771. [PMID: 28379192 PMCID: PMC5422044 DOI: 10.3390/s17040771] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/16/2017] [Revised: 03/03/2017] [Accepted: 04/01/2017] [Indexed: 11/16/2022]
83
Humaidi N, Balakrishnan V. Indirect effect of management support on users' compliance behaviour towards information security policies. Health Inf Manag 2017;47:17-27. [PMID: 28537207 DOI: 10.1177/1833358317700255] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
84
Lee J, Yoo B, Lee H, Cha GD, Lee HS, Cho Y, Kim SY, Seo H, Lee W, Son D, Kang M, Kim HM, Park YI, Hyeon T, Kim DH. Ultra-Wideband Multi-Dye-Sensitized Upconverting Nanoparticles for Information Security Application. ADVANCED MATERIALS (DEERFIELD BEACH, FLA.) 2017;29:1603169. [PMID: 27748544 DOI: 10.1002/adma.201603169] [Citation(s) in RCA: 53] [Impact Index Per Article: 7.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/16/2016] [Revised: 08/09/2016] [Indexed: 05/20/2023]
85
Zarei J, Sadoughi F. Information security risk management for computerized health information systems in hospitals: a case study of Iran. Risk Manag Healthc Policy 2016;9:75-85. [PMID: 27313481 PMCID: PMC4890691 DOI: 10.2147/rmhp.s99908] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]  Open
86
Garcia-Font V, Garrigues C, Rifà-Pous H. A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks. SENSORS 2016;16:s16060868. [PMID: 27304957 PMCID: PMC4934294 DOI: 10.3390/s16060868] [Citation(s) in RCA: 76] [Impact Index Per Article: 9.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/15/2016] [Revised: 06/02/2016] [Accepted: 06/03/2016] [Indexed: 12/04/2022]
87
Proctor RW, Chen J. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace. HUMAN FACTORS 2015;57:721-727. [PMID: 25994927 DOI: 10.1177/0018720815585906] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/18/2014] [Accepted: 04/16/2015] [Indexed: 06/04/2023]
88
Raisaro JL, Ayday E, Hubaux JP. Patient privacy in the genomic era. PRAXIS 2014;103:579-586. [PMID: 24800770 DOI: 10.1024/1661-8157/a001657] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
89
Mallinder J, Drabwell P. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. JOURNAL OF BUSINESS CONTINUITY & EMERGENCY PLANNING 2014;7:103-111. [PMID: 24457322] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
90
Henriksen E, Burkow TM, Johnsen E, Vognild LK. Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC Med Inform Decis Mak 2013;13:85. [PMID: 23937965 PMCID: PMC3751072 DOI: 10.1186/1472-6947-13-85] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/09/2012] [Accepted: 07/23/2013] [Indexed: 01/13/2023]  Open
91
Landolt S, Hirschel J, Schlienger T, Businger W, Zbinden AM. Assessing and comparing information security in swiss hospitals. Interact J Med Res 2012;1:e11. [PMID: 23611956 PMCID: PMC3626122 DOI: 10.2196/ijmr.2137] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/16/2012] [Revised: 07/28/2012] [Accepted: 09/25/2012] [Indexed: 11/13/2022]  Open
92
Das B, Yelleswarapu CS, Rao DVGLN. Dual-channel in-line digital holographic double random phase encryption. OPTICS COMMUNICATIONS 2012;285:4262-4267. [PMID: 23471012 PMCID: PMC3587054 DOI: 10.1016/j.optcom.2012.06.056] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/01/2023]
93
SMS-based medical diagnostic telemetry data transmission protocol for medical sensors. SENSORS 2011;11:4231-43. [PMID: 22163845 PMCID: PMC3231350 DOI: 10.3390/s110404231] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/10/2011] [Revised: 03/28/2011] [Accepted: 04/02/2011] [Indexed: 11/25/2022]
94
Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation. SENSORS 2011;11:8085-114. [PMID: 22164064 PMCID: PMC3231747 DOI: 10.3390/s110808085] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2011] [Revised: 08/05/2011] [Accepted: 08/10/2011] [Indexed: 11/28/2022]
95
Cazier JA, Medlin BD. How secure is your information system? An investigation into actual healthcare worker password practices. PERSPECTIVES IN HEALTH INFORMATION MANAGEMENT 2006;3:8. [PMID: 18066366 PMCID: PMC2047302] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Subscribe] [Scholar Register] [Indexed: 05/25/2023]
PrevPage 2 of 2 12Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA