Security Analysis of a Patient Monitoring System for the Internet of Things in eHealth
暂无分享,去创建一个
[1] Jie Wu,et al. Security analysis of emerging remote obstetrics monitoring systems , 2012, 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom).
[2] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[3] Biswajit Nandy,et al. Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[4] Zuraini Ismail,et al. A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS , 2012, J. Information Security.
[5] Wan Haslina Hassan,et al. WIRELESS NETWORKS: DEVELOPMENTS, THREATS AND COUNTERMEASURES , 2013 .
[6] Dugki Min,et al. A situation aware framework for activity based risk analysis of patient monitoring system , 2011, 2011 3rd International Conference on Awareness Science and Technology (iCAST).
[7] Wolfgang Leister,et al. A Novel Authentication Framework Based on Biometric and Radio Fingerprinting for the IoT in eHealth , 2014 .
[8] Leo Marcus,et al. Introduction to Logical Foundations of an Adaptive Security Infrastructure , 2004 .
[9] David Kotz,et al. A threat taxonomy for mHealth privacy , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[10] Minho Shin. Secure Remote Health Monitoring with Unreliable Mobile Devices , 2012, Journal of biomedicine & biotechnology.
[11] Habtamu Abie,et al. Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.
[12] Ilangko Balasingham,et al. Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.
[13] Kyung Sup Kwak,et al. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.
[14] Tae Hwan Oh,et al. Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
[15] I. Maglogiannis,et al. Modeling Risk in Distributed Healthcare Information Systems , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[16] Wolfgang Leister,et al. An Evaluation Scenario for Adaptive Security in eHealth , 2013 .
[17] Habtamu Abie. Adaptive security and trust management for autonomic message-oriented middleware , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[18] I. Balasingham,et al. Threat Assessment of Wireless Patient Monitoring Systems , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[19] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[20] F. Kargl,et al. Security, Privacy and Legal Issues in Pervasive eHealth Monitoring Systems , 2008, 2008 7th International Conference on Mobile Business.
[21] Nicolae Tapus,et al. Adaptive Security Framework for Wireless Sensor Networks , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[22] ChengCheng Li,et al. A survey of the security and threats of the IMT-Advanced requirements for 4G standards , 2013, IEEE Conference Anthology.