A (Lack of) Review on Cyber-Security and Privacy Concerns in Hearing Aids
暂无分享,去创建一个
[1] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[2] Richard C. Hendriks,et al. Privacy-preserving distributed speech enhancement forwireless sensor networks by processing in the encrypted domain , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[3] Ken Munro. Bluetooth: Breaking into Bluetooth , 2008 .
[4] Andreea Bendovschi,et al. Cyber-Attacks – Trends, Patterns and Security Countermeasures☆ , 2015 .
[5] Mohammed Atiquzzaman,et al. Security threats in Bluetooth technology , 2018, Comput. Secur..
[6] P. Kitterick,et al. Hearing aids for mild to moderate hearing loss in adults. , 2017, The Cochrane database of systematic reviews.
[7] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[8] Jin Sook Kim,et al. A Review of Assistive Listening Device and Digital Wireless Technology for Hearing Instruments , 2014, Korean journal of audiology.
[9] D. Kotz,et al. Is Bluetooth the right technology for mHealth? , 2010 .
[10] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[11] Julian Jang,et al. A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..
[12] Abderrahim Beni Hssane,et al. Big data security and privacy in healthcare: A Review , 2017, EUSPN/ICTH.
[13] Filiep Vanpoucke,et al. Hearing Device Manufacturers Call for Interoperability and Standardization of Internet and Audiology. , 2016, American journal of audiology.
[14] Jan Larsen,et al. Personalizing the Fitting of Hearing Aids by Learning Contextual Preferences From Internet of Things Data , 2017, Comput..
[15] Jason Galster,et al. A Qualitative Case Study of Smartphone‐Connected Hearing Aids: Influences on Patients, Clinicians, and Patient‐Clinician Interactions , 2017, Journal of the American Academy of Audiology.
[16] Konstantin Hyppönen,et al. Comparative Analysis of Bluetooth Security Attacks , 2013 .
[17] Yan Huang,et al. Data Analytics and Decision Support in Cybersecurity: Trends, Methodologies and Applications , 2017 .
[18] Jakob Eg Larsen,et al. Rethinking Hearing Aid Fitting by Learning From Behavioral Patterns , 2017, CHI Extended Abstracts.
[19] United Arab Emirates,et al. BLUETOOTH SECURITY THREATS AND SOLUTIONS : A SURVEY , 2012 .