Sametinger et al., 2015 - Google Patents
Security challenges for medical devicesSametinger et al., 2015
View PDF- Document ID
- 1004593291559297708
- Author
- Sametinger J
- Rozenblit J
- Lysecky R
- Ott P
- Publication year
- Publication venue
- Communications of the ACM
External Links
Snippet
Security challenges for medical devices Page 1 74 COMMUNICATIONS OF THE ACM | APRIL
2015 | VOL. 58 | NO. 4 review articles SECURITY AND SAFETY issues in the medical domain
take many different forms. Examples range from purposely contaminated medicine to recalls of …
- 230000001419 dependent 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sametinger et al. | Security challenges for medical devices | |
Newaz et al. | A survey on security and privacy issues in modern healthcare systems: Attacks and defenses | |
Hanna et al. | Take Two Software Updates and See Me in the Morning: The Case for Software Security Evaluations of Medical Devices. | |
Burleson et al. | Design challenges for secure implantable medical devices | |
Burns et al. | A brief chronology of medical device security | |
Zhang et al. | Trustworthiness of medical devices and body area networks | |
AlTawy et al. | Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices | |
Priyadarshini et al. | A new enhanced cyber security framework for medical cyber physical systems | |
Nausheen et al. | Healthcare IoT: Benefits, vulnerabilities and solutions | |
Williams et al. | Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem | |
Ayala | Cybersecurity for hospitals and healthcare facilities | |
Halperin et al. | Security and privacy for implantable medical devices | |
Arney et al. | Biomedical devices and systems security | |
Abomhara et al. | A stride-based threat model for telehealth systems | |
Chantzis et al. | Practical IoT hacking: the definitive guide to attacking the internet of things | |
Skierka | The governance of safety and security risks in connected healthcare | |
Zhang et al. | Towards trustworthy medical devices and body area networks | |
Ray et al. | Security assurance cases for medical cyber–physical systems | |
Taylor et al. | Understanding the security of interoperable medical devices using attack graphs | |
Yamout et al. | Beyond smart homes: An in-depth analysis of smart aging care system security | |
Jangid et al. | Security issues and challenges in Healthcare Automated Devices | |
Ransford et al. | Design challenges for secure implantable medical devices | |
Mahmud et al. | Trojan resilience in implantable and wearable medical devices with virtual biosensing | |
Lindvall et al. | Safety-focused security requirements elicitation for medical device software | |
Sametinger et al. | Resilient context-aware medical device security |