Security challenges in pervasive wireless medical systems and devices
暂无分享,去创建一个
[1] Shadi R. Masadeh,et al. A study of secure deployment of wireless technology in the medical fields , 2010, ISWSA '10.
[2] Christophe Veltsos. Mitigating the Blended Threat: Protecting Data and Educating Users , 2011 .
[3] M. Petkovic. Remote patient monitoring: Information reliability challenges , 2009, 2009 9th International Conference on Telecommunication in Modern Satellite, Cable, and Broadcasting Services.
[4] Ashraf Darwish,et al. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring , 2011, Sensors.
[5] Mehmet Rasit Yuce,et al. Wireless Body Area Networks: Technology, Implementation, and Applications , 2011 .
[6] T. Kohno,et al. Improving the security and privacy of implantable medical devices. , 2010, The New England journal of medicine.
[7] Kevin Fu,et al. Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.
[8] Vimla L. Patel,et al. Using usability heuristics to evaluate patient safety of medical devices , 2003, J. Biomed. Informatics.
[9] H. S. Ng,et al. Security issues of wireless sensor networks in healthcare applications , 2006 .
[10] Andrew Meneely,et al. Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected , 2010, SPIMACS '10.
[11] Kevin Fu,et al. Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance , 2012, PloS one.
[12] A. Sagahyroon,et al. Monitoring patients' signs wirelessly , 2011, 2011 1st Middle East Conference on Biomedical Engineering.
[13] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[14] Hein S. Venter,et al. A Forensic Readiness Model for Wireless Networks , 2010, IFIP Int. Conf. Digital Forensics.
[15] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[16] Bernard Segal,et al. A literature review of the safety of medical body area network devices in magnetic resonance imaging , 2011, 2011 5th International Symposium on Medical Information and Communication Technology.
[17] Azzedine Boukerche,et al. Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.
[18] Donald Witters,et al. Wireless medical systems: risks, challenges, and opportunities. , 2011, Biomedical instrumentation & technology.
[19] Franca Delmastro,et al. Pervasive communications in healthcare , 2012, Comput. Commun..
[20] Tadayoshi Kohno,et al. Neurosecurity: security and privacy for neural devices. , 2009, Neurosurgical focus.
[21] B. Cusack,et al. Managing wireless security risks in medical services , 2014 .
[22] Giovanni Calcagnini,et al. RFID in healthcare environment: electromagnetic compatibility regulatory issues , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[23] Kyung Sup Kwak,et al. Towards security issues and solutions in Wireless Body Area Networks , 2010, INC2010: 6th International Conference on Networked Computing.
[24] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[25] N. Jha,et al. Attacking and Defending a Diabetes Therapy System , 2014 .
[26] Allie Paquette. Design of a pragmatic test lab for evaluating and testing wireless medical devices , 2011, 2011 IEEE 37th Annual Northeast Bioengineering Conference (NEBEC).
[27] Jinhua Guo,et al. Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[28] Kevin Fu,et al. Recent Results in Computer Security for Medical Devices , 2011, MobiHealth.
[29] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[30] Lan Wang,et al. Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.
[31] Raimundas Matulevicius,et al. Towards transformation guidelines from secure tropos to misuse cases (position paper) , 2011, SESS '11.
[32] Jeremy A. Hansen,et al. A taxonomy of vulnerabilities in implantable medical devices , 2010, SPIMACS '10.
[33] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[34] A T Karygiannis,et al. Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .
[35] Nada Golmie,et al. Prevailing over wires in healthcare environments: benefits and challenges , 2006, IEEE Communications Magazine.
[36] Athanasios V. Vasilakos,et al. ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[37] Seoksoo Kim,et al. Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[38] Insup Lee,et al. Biomedical devices and systems security , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[39] Sujitha Juliet Devaraj,et al. Current trends and future challenges in wireless telemedicine system , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[40] N. Diksha,et al. Backdoor Intrusion in Wireless Networks- problems and solutions , 2006, 2006 International Conference on Communication Technology.
[41] Jill Schlabig Williams,et al. The top 10 medical device challenges. , 2011, Biomedical instrumentation & technology.
[42] Noureddine Boudriga,et al. Security of implantable medical devices: limits, requirements, and proposals , 2014, Secur. Commun. Networks.
[43] Steve Hanna,et al. Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices , 2011, HealthSec.
[44] Mihai Cretu,et al. System for remote patient monitoring and data collection with applicability on E-health applications , 2011, 2011 7TH INTERNATIONAL SYMPOSIUM ON ADVANCED TOPICS IN ELECTRICAL ENGINEERING (ATEE).
[45] V. Sridhar. Network Security , Administration and Management : Advancing Technology and Practice , 2012 .
[46] Ajit Singh,et al. A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .
[47] Kenji Yoshigoe,et al. Security and Attacks in Wireless Sensor Networks , 2012 .
[48] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.