Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
1979 2
1980 2
1982 4
1983 2
1984 2
1985 2
1986 6
1987 6
1988 4
1989 4
1990 9
1991 20
1992 25
1993 29
1994 55
1995 56
1996 78
1997 98
1998 106
1999 98
2000 107
2001 105
2002 109
2003 130
2004 144
2005 160
2006 156
2007 162
2008 156
2009 151
2010 149
2011 175
2012 195
2013 251
2014 319
2015 294
2016 329
2017 330
2018 394
2019 459
2020 593
2021 678
2022 828
2023 705
2024 216

Text availability

Article attribute

Article type

Publication date

Search Results

7,322 results

Results by year

Filters applied: . Clear all
Page 1
Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP.
Althar RR, Samanta D, Kaur M, Alnuaim AA, Aljaffan N, Aman Ullah M. Althar RR, et al. Comput Intell Neurosci. 2021 Dec 27;2021:8522839. doi: 10.1155/2021/8522839. eCollection 2021. Comput Intell Neurosci. 2021. PMID: 34987569 Free PMC article. Retracted.
Security of the software system is a prime focus area for software development teams. ...This paper also discusses the capabilities of language modeling and its role in the knowledge system. The source code is modeled to build a deep software securi
Security of the software system is a prime focus area for software development teams. ...This paper also discusses the
Security vulnerabilities in healthcare: an analysis of medical devices and software.
Mejía-Granda CM, Fernández-Alemán JL, Carrillo-de-Gea JM, García-Berná JA. Mejía-Granda CM, et al. Med Biol Eng Comput. 2024 Jan;62(1):257-273. doi: 10.1007/s11517-023-02912-0. Epub 2023 Oct 4. Med Biol Eng Comput. 2024. PMID: 37789249 Free PMC article.
The investigation provides some insights into the consequences of vulnerabilities in health software products, projecting future security issues by 2025, offers mitigation suggestions, and highlights trends in attacks on life support and health systems are also prov …
The investigation provides some insights into the consequences of vulnerabilities in health software products, projecting future s
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.
Ansari MTJ, Al-Zahrani FA, Pandey D, Agrawal A. Ansari MTJ, et al. BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8. BMC Med Inform Decis Mak. 2020. PMID: 32948169 Free PMC article.
BACKGROUND: Today's healthcare organizations want to implement secure and quality healthcare software as cyber-security is a significant risk factor for healthcare data. Considering security requirements during trustworthy healthcare software de …
BACKGROUND: Today's healthcare organizations want to implement secure and quality healthcare software as cyber-security
Security challenges and solutions using healthcare cloud computing.
Mehrtak M, SeyedAlinaghi S, MohsseniPour M, Noori T, Karimi A, Shamsabadi A, Heydari M, Barzegary A, Mirzapour P, Soleymanzadeh M, Vahedi F, Mehraeen E, Dadras O. Mehrtak M, et al. J Med Life. 2021 Jul-Aug;14(4):448-461. doi: 10.25122/jml-2021-0100. J Med Life. 2021. PMID: 34621367 Free PMC article. Review.
Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud se
Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security
Towards a Security Reference Architecture for NFV.
Alnaim AK, Alwakeel AM, Fernandez EB. Alnaim AK, et al. Sensors (Basel). 2022 May 14;22(10):3750. doi: 10.3390/s22103750. Sensors (Basel). 2022. PMID: 35632161 Free PMC article.
Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamental to produce secure networks and allow us to build networks which are secure by design. The resulting SRA defines a roadmap to …
Because security is a global property that requires a holistic approach, we strongly believe that architectural models are fundamenta …
DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield.
McVearry KA. McVearry KA. Mil Med. 2023 Nov 8;188(Suppl 6):192-198. doi: 10.1093/milmed/usad084. Mil Med. 2023. PMID: 37948217
To address this gap, ATC-NY developed DroidChamber, which is a software-based Android system that enables multilevel security and which runs on smartphones and tablets. ...DroidChamber's innovation is isolation of specific Android app resources (e.g., networking) en …
To address this gap, ATC-NY developed DroidChamber, which is a software-based Android system that enables multilevel security
Intelligent sensors security.
Bialas A. Bialas A. Sensors (Basel). 2010;10(1):822-59. doi: 10.3390/s100100822. Epub 2010 Jan 22. Sensors (Basel). 2010. PMID: 22315571 Free PMC article.
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. ...The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is …
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applicatio …
Microservice Security Framework for IoT by Mimic Defense Mechanism.
Ying F, Zhao S, Deng H. Ying F, et al. Sensors (Basel). 2022 Mar 21;22(6):2418. doi: 10.3390/s22062418. Sensors (Basel). 2022. PMID: 35336588 Free PMC article.
Containers and microservices have become the most popular method for hosting IoT applications in cloud servers. However, one major security issue of this method is that if a container image contains software with security vulnerabilities, the associated micro …
Containers and microservices have become the most popular method for hosting IoT applications in cloud servers. However, one major securi
An analysis of security vulnerabilities in container images for scientific data analysis.
Kaur B, Dugré M, Hanna A, Glatard T. Kaur B, et al. Gigascience. 2021 Jun 3;10(6):giab025. doi: 10.1093/gigascience/giab025. Gigascience. 2021. PMID: 34080631 Free PMC article.
BACKGROUND: Software containers greatly facilitate the deployment and reproducibility of scientific data analyses in various platforms. However, container images often contain outdated or unnecessary software packages, which increases the number of security v …
BACKGROUND: Software containers greatly facilitate the deployment and reproducibility of scientific data analyses in various platform …
Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.
Caruso RD. Caruso RD. Radiographics. 2003 Sep-Oct;23(5):1329-37. doi: 10.1148/rg.235035021. Radiographics. 2003. PMID: 12975519
Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. ...An Internet security suite yields additional safety. Regular updating of the security features of installed program
Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be
7,322 results