Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain
暂无分享,去创建一个
[1] Holger Giese,et al. Combining Requirements, Use Case Maps and AADL Models for Safety-Critical Systems Design , 2016, 2016 42th Euromicro Conference on Software Engineering and Advanced Applications (SEAA).
[2] Paul A. Wortman,et al. Evolving authentication design considerations for the Internet of biometric things (IoBT) , 2016, 2016 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[3] Wlodek Kulesza,et al. Wirelessly interfacing objects and subjects of healthcare system - IoT approach , 2016 .
[4] Ann Gordon-Ross,et al. Microprocessor Optimizations for the Internet of Things: A Survey , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[5] Chih-Yao Chuang,et al. Scheduling Low-Utilized Real-Time Systems with End-to-End Timing Constraints , 2016, 2016 IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA).
[6] Ashutosh Shinde. Challenges in performance monitoring of hyper connected IoT systems , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).
[7] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[8] Grant Hernandez,et al. Smart Nest Thermostat A Smart Spy in Your Home , 2014 .
[9] Ann Gordon-Ross,et al. Microprocessor Optimizations for the Internet of Things , 2016, ArXiv.
[10] Julien Delange,et al. A Requirement Specification Language for AADL , 2016 .
[11] Myron Hecht,et al. Automated generation of failure modes and effects analysis for a medical device , 2015, 2015 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW).
[12] K. Natarajan. Smart Health Care System Using Internet of Things , 2016 .
[13] Lui Sha,et al. Model-Based Analysis of Wireless System Architectures for Real-Time Applications , 2013, IEEE Transactions on Mobile Computing.
[14] Yunwei Dong,et al. Hybrid annex: an AADL extension for continuous behavior and cyber-physical interaction modeling , 2014, HILT '14.
[15] Francisco Vasques,et al. A framework to support dependability evaluation of WSNs from AADL models , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).
[16] Bart Preneel,et al. On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them , 2016, ACSAC.
[17] William Bradley Glisson,et al. Compromising a Medical Mannequin , 2015, AMCIS.