Index case (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Index case" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
4th place
4th place
92nd place
72nd place
2nd place
2nd place
12th place
11th place
614th place
572nd place
36th place
33rd place
20th place
30th place
108th place
80th place
195th place
302nd place
741st place
577th place
218th place
212th place
11th place
8th place
1,053rd place
701st place
710th place
648th place
79th place
65th place
low place
low place
low place
low place
low place
low place
8th place
10th place
7,827th place
5,905th place
low place
low place
509th place
368th place
1,216th place
797th place
5,987th place
3,757th place
low place
low place
198th place
154th place
low place
low place
6,663rd place
5,792nd place
245th place
189th place
6th place
6th place
low place
7,293rd place
54th place
48th place
28th place
26th place

andrejkoymasky.com

archive.org

aspetjournals.org

molinterv.aspetjournals.org

avert.org

bbc.co.uk

news.bbc.co.uk

bbc.com

cbsnews.com

cdc.gov

cnn.com

collinsdictionary.com

doi.org

forbes.com

  • Savitz E (5 June 2012). "Finding Patient Zero: The Key To Responding To Malware Attacks". Forbes. Archived from the original on 31 March 2017. Retrieved 31 March 2017. In the physical world, the first thing researchers look for during an outbreak is patient zero. Where did the virus start and where are all of the places and who are all of the people it could have touched? In the cyber world this almost never happens. But it is just as fundamental.

foxla.com

independent.co.uk

infosecurity-magazine.com

  • "Search for patient zero: uncovering malware infection at the source". Infosecurity Magazine. 10 July 2012. Archived from the original on 31 March 2017. Retrieved 31 March 2017. Medical researchers look for patient zero to find out where a virus outbreak started and what places and people patient zero came into contact with in order to contain the outbreak and prevent further infections. Similarly, infosec researchers need to look for the user who first introduced the malware into the network, which application was carrying the malware, and the files that are causing it to spread in order to contain it, eliminate it, and prevent reinfection, explained Huger, vice president of development at Sourcefire's cloud technology group.

mirror.co.uk

nih.gov

pubmed.ncbi.nlm.nih.gov

science.education.nih.gov

  • "Diseases – Activity 1 – Glossary, page 3 of 5". science.education.nih.gov. Archived from the original on 10 November 2017. Retrieved 10 November 2017.

ncbi.nlm.nih.gov

npr.org

oxforddictionaries.com

en.oxforddictionaries.com

pbs.org

pharmaceutical-journal.com

  • Mohammadi D (15 January 2015). "Finding patient zero". The Pharmaceutical Journal. 294 (7845). Archived from the original on 24 January 2015. Retrieved 16 January 2015.

princeton.edu

wordnetweb.princeton.edu

scielosp.org

semanticscholar.org

api.semanticscholar.org

techworld.com

news.techworld.com

the-scientist.com

thefreedictionary.com

medical-dictionary.thefreedictionary.com

theguardian.com

theregister.co.uk

tv.com

  • "Patient Zero". TV.com. 20 March 2006. Archived from the original on 27 December 2011. Retrieved 3 November 2010.

web.archive.org

weeklystandard.com

who.int

who.int

whqlibdoc.who.int

wsj.com