Security Defense Strategy for Intelligent Medical Diagnosis Systems (IMDS)
暂无分享,去创建一个
Ying He | Helge Janicke | Cunjin Luo | Hasan Soygazi | Ying He | Cunjin Luo | H. Janicke | Hasan Soygazi
[1] Karen A. Scarfone,et al. Technical Guide to Information Security Testing and Assessment , 2008 .
[2] Laura Moy,et al. Killed by Code: Software Transparency in Implantable Medical Devices , 2010 .
[3] Axel Wirth. Cybercrimes pose growing threat to medical devices. , 2011, Biomedical instrumentation & technology.
[4] Kevin Fu,et al. Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance , 2012, PloS one.
[5] Meng Zhang,et al. Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.
[6] Shelby David Kobes. Security implications of implantable medical devices , 2014 .
[7] S. Kumari,et al. Comparison of AES and DES Algorithm , 2015 .
[8] Roman L. Lysecky,et al. Security challenges for medical devices , 2015, Commun. ACM.
[9] Mehmet A. Orgun,et al. Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.
[10] Hsinchun Chen,et al. Assessing medical device vulnerabilities on the Internet of Things , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).
[11] Zainab S. Alwan,et al. Detection and Prevention of SQL Injection Attack: A Survey , 2017 .
[12] Oliver Kullmann,et al. The science of brute force , 2017, Commun. ACM.
[13] Jay G Ronquillo,et al. Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information , 2018, JAMIA open.
[14] Masoumeh Haghpanahi,et al. Cardiologist-level arrhythmia detection and classification in ambulatory electrocardiograms using a deep neural network , 2019, Nature Medicine.