References
- Dogaru, D. I., & Dumitrache, I. (2017). Cyber security in healthcare networks. 2017 E-Health and Bioengineering Conference, EHB 2017, 414-417. https://doi.org/10.1109/EHB.2017.7995449
- Priya, R., Sivasankaran, S., Ravisasthiri, P., & Sivachandiran, S. (2018). A survey on security attacks in electronic healthcare systems. Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017, 2018-January, 691-694. https://doi.org/10.1109/ICCSP.2017.8286448
- Newaz, A. I., Sikder, A. K., Rahman, M. A., & Selcuk Uluagac, A. (2020). A Survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ArXiv, 1(1), 1-40.
- Dogaru, D. I., & Dumitrache, I. (2016). Cyber-physical systems in healthcare networks. 2015 E-Health and Bioengineering Conference, EHB 2015, 15-18. https://doi.org/10.1109/EHB.2015.7391368
- Nair, M. M., Tyagi, A. K., & Goyal, R. (2019). Medical Cyber Physical Systems and Its Issues. Procedia Computer Science, 165, 647-655. https://doi.org/10.1016/j.procs.2020.01.059
- Sun, Y., Lo, F. P. W., & Lo, B. (2019). Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey. IEEE Access, 7, 183339-183355. https://doi.org/10.1109/ACCESS.2019.2960617
- Saleem, K., Zeb, K., Derhab, A., Abbas, H., Al-Muhtadi, J., Orgun, M. A., & Gawanmeh, A. (2016). Survey on cybersecurity issues in wireless mesh networks based eHealthcare. 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services, Healthcom 2016. https://doi.org/10.1109/HealthCom.2016.7749423
- Chen, Q., Lambright, J., & Abdelwahed, S. (2016). Towards Autonomic Security Management of Healthcare Information Systems. Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016, 113-118. https://doi.org/10.1109/CHASE.2016.58
- Mohsin, A. H., Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Albahri, A. S., Alsalem, M. A., & Mohammed, K. I. (2019). Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard. Journal of Medical Systems, 43(7). https://doi.org/10.1007/s10916-019-1264-y
- Bahkali, S., Almaiman, A., Almadani, W., Househ, M., & El Metwally, A. (2014). The state public health informatics in Saudi Arabia. Studies in Health Technology and Informatics, 202, 257-260. https://doi.org/10.3233/978-1-61499-423-7-257
- Kwon, J., & Johnson, M. E. (2015). Protecting Patient Data - The Economic Perspective of Healthcare Security. IEEE Security and Privacy, 13(5), 90-95. https://doi.org/10.1109/MSP.2015.113