Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles
暂无分享,去创建一个
Vaidehi Vijayakumar | Steven Walczak | Sibi Chakkaravarthy Sethuraman | S. C. Sethuraman | Vaidehi Vijayakumar | S. Walczak
[1] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[2] David C Klonoff,et al. Cybersecurity for Connected Diabetes Devices , 2015, Journal of diabetes science and technology.
[3] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[4] Wenyuan Xu,et al. WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).
[5] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[6] Eric J Topol,et al. Can mobile health technologies transform health care? , 2013, JAMA.
[7] Selwyn Piramuthu,et al. Internet of Things (IoT) in high-risk Environment, Health and Safety (EHS) industries: A comprehensive review , 2018, Decis. Support Syst..
[8] George Loukas,et al. A Review of Cyber Threats and Defence Approaches in Emergency Management , 2013, Future Internet.
[9] Wenyuan Xu,et al. Risks of trusting the physics of sensors , 2018, Commun. ACM.
[10] Danilo De Donno,et al. An IoT-Aware Architecture for Smart Healthcare Systems , 2015, IEEE Internet of Things Journal.
[11] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[12] Judy E. Scott,et al. Models for Drone Delivery of Medications and Other Healthcare Items , 2018, Int. J. Heal. Inf. Syst. Informatics.
[13] Nir Nissim,et al. Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems , 2019, J. Biomed. Informatics.
[14] Mehmet A. Orgun,et al. Ideas and Challenges for Securing Wireless Implantable Medical Devices: A Review , 2017, IEEE Sensors Journal.
[15] Juan E. Tapiador,et al. Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.
[16] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[17] Sebastian Magierowski,et al. Vehicle Routing Problems for Drone Delivery , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[18] Ingrid Moerman,et al. A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.
[19] Robert C. Wolpert,et al. A Review of the , 1985 .
[20] Alan Borning,et al. Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices , 2010, CHI.
[21] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[22] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[23] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[24] Neal Leavitt,et al. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers , 2010, Computer.
[25] C. Gandhi,et al. Packet Sniffer – A Comparative Study , 2014 .
[26] L. Piwek,et al. The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.
[27] Michael Hanspach,et al. On Covert Acoustical Mesh Networks in Air , 2014, J. Commun..
[28] T. Kohno,et al. Improving the security and privacy of implantable medical devices. , 2010, The New England journal of medicine.
[29] Roman L. Lysecky,et al. Security challenges for medical devices , 2015, Commun. ACM.
[30] Peter C. Salmon,et al. Mobile Bot Swarms: They're closer than you might think! , 2015, IEEE Consumer Electronics Magazine.
[31] Geng Yang,et al. Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .
[32] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[33] Misha Pavel,et al. Advancing the Science of mHealth , 2012, Journal of health communication.
[34] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[35] Yang Lu,et al. Smart Hospital based on Internet of Things , 2012, J. Networks.
[36] Akhilesh Tyagi,et al. Using Power Clues to Hack IoT Devices: The power side channel provides for instruction-level disassembly. , 2017, IEEE Consumer Electronics Magazine.
[37] Aleksandar Milenkovic,et al. System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .
[38] Ahmad Roshidi Amran,et al. WarBox: Portable wardriving over Raspberry PI , 2016, 2016 International Conference on Information and Communication Technology (ICICTM).
[39] Ralf Philipsen,et al. Droning on About Drones—Acceptance of and Perceived Barriers to Drones in Civil Usage Contexts , 2017 .