"Computer Security" is a descriptor in the National Library of Medicine's controlled vocabulary thesaurus,
MeSH (Medical Subject Headings). Descriptors are arranged in a hierarchical structure,
which enables searching at various levels of specificity.
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data.
Descriptor ID |
D016494
|
MeSH Number(s) |
L01.224.134 N04.452.910.200
|
Concept/Terms |
Computer Security- Computer Security
- Security, Computer
- Cybersecurity
- Cyber Security
- Security, Cyber
Computer Worms- Computer Worms
- Computer Worm
- Worm, Computer
- Worms, Computer
Data Encryption- Data Encryption
- Data Encryptions
- Encryption, Data
- Encryptions, Data
Computer Hackers- Computer Hackers
- Computer Hacker
- Hacker, Computer
- Hackers, Computer
|
Below are MeSH descriptors whose meaning is more general than "Computer Security".
Below are MeSH descriptors whose meaning is more specific than "Computer Security".
This graph shows the total number of publications written about "Computer Security" by people in this website by year, and whether "Computer Security" was a major or minor topic of these publications.
To see the data from this visualization as text,
click here.
Year | Major Topic | Minor Topic | Total |
---|
2010 | 0 | 1 | 1 |
2012 | 0 | 1 | 1 |
2013 | 0 | 1 | 1 |
2015 | 1 | 1 | 2 |
2019 | 1 | 0 | 1 |
To return to the timeline,
click here.
Below are the most recent publications written about "Computer Security" by people in Profiles.
-
Roth CP, Coulter ID, Kraus LS, Ryan GW, Jacob G, Marks JS, Hurwitz EL, Vernon H, Shekelle PG, Herman PM. Researching the Appropriateness of Care in the Complementary and Integrative Health Professions Part 5: Using Patient Records: Selection, Protection, and Abstraction. J Manipulative Physiol Ther. 2019 06; 42(5):327-334.
-
Almunawar MN, Anshari M, Younis MZ, Kisa A. Electronic Health Object: Transforming Health Care Systems From Static to Interactive and Extensible. Inquiry. 2015; 52.
-
Mukherjee S, Jenders RA, Delta S. Designing an Innovative Data Architecture for the Los Angeles Data Resource (LADR). Stud Health Technol Inform. 2015; 216:1055.
-
Gonzalez MA, Lebrigio RF, Van Booven D, Ulloa RH, Powell E, Speziani F, Tekin M, Sch?le R, Z?chner S. GEnomes Management Application (GEM.app): a new software tool for large-scale collaborative genome analysis. Hum Mutat. 2013 Jun; 34(6):842-6.
-
Koong KS, Ngafeeson MN, Liu LC. Meaningful use and meaningful curricula: a survey of health informatics programmes in the USA. Int J Electron Healthc. 2012; 7(1):1-18.
-
Mujumdar S, Thongpithoonrat P, Gurkan D, McKneely PK, Chapman FM, Merchant F. Performance analysis of a proposed tightly-coupled medical instrument network based on CAN protocol. Annu Int Conf IEEE Eng Med Biol Soc. 2010; 2010:360-4.