Computer Security
"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text, click here.
Year | Major Topic | Minor Topic | Total |
---|
2003 | 1 | 0 | 1 | 2004 | 0 | 1 | 1 | 2005 | 0 | 1 | 1 | 2012 | 1 | 1 | 2 | 2013 | 0 | 1 | 1 | 2014 | 1 | 0 | 1 | 2015 | 1 | 0 | 1 | 2017 | 2 | 0 | 2 | 2019 | 4 | 0 | 4 | 2021 | 0 | 2 | 2 |
To return to the timeline, click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
Patel AU, Williams CL, Hart SN, Garcia CA, Durant TJS, Cornish TC, McClintock DS. Cybersecurity and Information Assurance for the Clinical Laboratory. J Appl Lab Med. 2023 01 04; 8(1):145-161.
-
Fraiche AM, Matlock DD, Gabriel W, Rapley FA, Kramer DB. Patient and Provider Perspectives on Remote Monitoring of Pacemakers and Implantable Cardioverter-Defibrillators. Am J Cardiol. 2021 06 15; 149:42-46.
-
Haendel MA, Chute CG, Bennett TD, Eichmann DA, Guinney J, Kibbe WA, Payne PRO, Pfaff ER, Robinson PN, Saltz JH, Spratt H, Suver C, Wilbanks J, Wilcox AB, Williams AE, Wu C, Blacketer C, Bradford RL, Cimino JJ, Clark M, Colmenares EW, Francis PA, Gabriel D, Graves A, Hemadri R, Hong SS, Hripscak G, Jiao D, Klann JG, Kostka K, Lee AM, Lehmann HP, Lingrey L, Miller RT, Morris M, Murphy SN, Natarajan K, Palchuk MB, Sheikh U, Solbrig H, Visweswaran S, Walden A, Walters KM, Weber GM, Zhang XT, Zhu RL, Amor B, Girvin AT, Manna A, Qureshi N, Kurilla MG, Michael SG, Portilla LM, Rutter JL, Austin CP, Gersing KR. The National COVID Cohort Collaborative (N3C): Rationale, design, infrastructure, and deployment. J Am Med Inform Assoc. 2021 03 01; 28(3):427-443.
-
Cohen KB, Hunter LE, Pressman PS. P-Hacking Lexical Richness Through Definitions of "Type" and "Token". Stud Health Technol Inform. 2019 Aug 21; 264:1433-1434.
-
Beaulieu-Jones BK, Wu ZS, Williams C, Lee R, Bhavnani SP, Byrd JB, Greene CS. Privacy-Preserving Generative Deep Neural Networks Support Clinical Data Sharing. Circ Cardiovasc Qual Outcomes. 2019 07; 12(7):e005122.
-
Cool A. Impossible, unknowable, accountable: Dramas and dilemmas of data law. Soc Stud Sci. 2019 08; 49(4):503-530.
-
Grundy Q, Chiu K, Held F, Continella A, Bero L, Holz R. Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis. BMJ. 2019 03 20; 364:l920.
-
Shimada SL, Petrakis BA, Rothendler JA, Zirkle M, Zhao S, Feng H, Fix GM, Ozkaynak M, Martin T, Johnson SA, Tulu B, Gordon HS, Simon SR, Woods SS. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging. J Am Med Inform Assoc. 2017 Sep 01; 24(5):942-949.
-
Gavett BE, Zhao R, John SE, Bussell CA, Roberts JR, Yue C. Phishing suspiciousness in older and younger adults: The role of executive functioning. PLoS One. 2017; 12(2):e0171620.
-
Bennett TD, Dean JM, Keenan HT, McGlincy MH, Thomas AM, Cook LJ. Linked Records of Children with Traumatic Brain Injury. Probabilistic Linkage without Use of Protected Health Information. Methods Inf Med. 2015; 54(4):328-37.
|
People People who have written about this concept. _
Similar Concepts
People who have written about this concept.
_
Top Journals
Top journals in which articles about this concept have been published.
|