A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
暂无分享,去创建一个
[1] Dean F Sittig,et al. Measuring and improving patient safety through health information technology: The Health IT Safety Framework , 2015, BMJ Quality & Safety.
[2] Alexandre Gazet,et al. Comparative analysis of various ransomware virii , 2010, Journal in Computer Virology.
[3] Hardeep Singh,et al. Contingency planning for electronic health record-based care continuity: A survey of recommended practices , 2014, Int. J. Medical Informatics.
[4] Gregory A. Witte,et al. Framework for Improving Critical Infrastructure Cybersecurity | NIST , 2014 .
[5] Adam Sedgewick,et al. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 , 2014 .
[6] Dean F Sittig,et al. A new sociotechnical model for studying health information technology in complex adaptive healthcare systems , 2010, Quality and Safety in Health Care.
[7] Barack Obama,et al. Statement on the Release of the 'Framework for Improving Critical Infrastructure Cybersecurity' by the National Institute of Standards and Technology, February 12, 2014 , 2014 .
[8] Babu Nath Giri,et al. The Emergence of Ransomware , 2006 .
[9] Karen A. Scarfone,et al. Technical Guide to Information Security Testing and Assessment , 2008 .
[10] Monique Snoeck,et al. APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions , 2015, Decis. Support Syst..
[11] Dean F. Sittig,et al. Creating an Oversight Infrastructure for Electronic Health Record–Related Patient Safety Hazards , 2011, Journal of patient safety.
[12] Hardeep Singh,et al. Patient safety goals for the proposed Federal Health Information Technology Safety Center , 2015, J. Am. Medical Informatics Assoc..
[13] Dean F. Sittig,et al. Electronic health records and national patient-safety goals. , 2012, The New England journal of medicine.
[14] Dean F Sittig,et al. Security threat posed by USB-based personal health records. , 2007, Annals of internal medicine.
[15] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.