"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text,
click here.
Year | Major Topic | Minor Topic | Total |
---|
1994 | 0 | 1 | 1 |
1996 | 1 | 0 | 1 |
1997 | 0 | 2 | 2 |
2006 | 1 | 1 | 2 |
2012 | 0 | 1 | 1 |
2014 | 1 | 0 | 1 |
2015 | 0 | 1 | 1 |
2016 | 0 | 1 | 1 |
2017 | 0 | 1 | 1 |
2019 | 1 | 0 | 1 |
2020 | 3 | 0 | 3 |
2021 | 0 | 1 | 1 |
To return to the timeline,
click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
The National COVID Cohort Collaborative (N3C): Rationale, design, infrastructure, and deployment. J Am Med Inform Assoc. 2021 03 01; 28(3):427-443.
-
Reply to "Malicious Adversarial Attacks on Medical Image Analysis". AJR Am J Roentgenol. 2020 11; 215(5):W56.
-
To Infinity and Beyond: The Past, Present, and Future of Tele-Anesthesia. Anesth Analg. 2020 02; 130(2):276-284.
-
Hacking and Ransomware: Challenges for Institutions Both Large and Small. AJR Am J Roentgenol. 2020 04; 214(4):736-737.
-
Are Requirements to Deposit Data in Research Repositories Compatible With the European Union's General Data Protection Regulation? Ann Intern Med. 2019 03 05; 170(5):332-334.
-
Choosing between responsive-design websites versus mobile apps for your mobile behavioral intervention: presenting four case studies. Transl Behav Med. 2017 06; 7(2):224-232.
-
Determining Barriers and Facilitators Associated With Willingness to Use a Personal Health Information Management System to Support Worksite Wellness Programs. Am J Health Promot. 2017 Jul; 31(4):310-317.
-
Adapting existing natural language processing resources for cardiovascular risk factors identification in clinical notes. J Biomed Inform. 2015 Dec; 58 Suppl:S128-S132.
-
Can physicians recognize their own patients in de-identified notes? Stud Health Technol Inform. 2014; 205:778-82.
-
Evaluating current automatic de-identification methods with Veteran's health administration clinical documents. BMC Med Res Methodol. 2012 Jul 27; 12:109.