1 |
TheVerge, Dick Cheney had the Wireless Disabled on his Pacemaker to Avoid Risk of Terrorist Tampering, 2013.
|
2 |
Y. S. Jeong, "Design of Prevention Model according to a Dysfunctional of Corporate Information,"Journal of Convergence Soceity for SMB, Vol. 6, No. 2, pp. 11-17, Jun. 2016.
DOI
|
3 |
J.A. Hansen, N.M. Hansen A taxonomy of vulnerabilities in implantable medical devices Proc. of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, SPIMACS '10, ACM, New York, USA, pp. 13-20, 2010.
|
4 |
Medtronic, Implantable pacemaker and defibrillator information. consulted on April 2015.
|
5 |
Indrajit Ray and Nayot Poolsapassit, "Using Attack TPees to Identify Malicious Attacks from Authorized Insiders", 10th European Symposium on Research in Computer Security, LNCS 3679, pp. 231-246, 2005.
|
6 |
D. Kim, J. Choi and K. Han, "Medical Device Safety Management Using Cybersecurity Risk Analysis," in IEEE Access, vol. 8, pp. 115370-115382, 2020, doi: 10.1109/ACCESS.2020.3003032.
DOI
|
7 |
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
|
8 |
Kim, Dw., Choi, Jy. & Han, Kh. Risk management-based security evaluation model for telemedicine systems. BMC Med Inform Decis Mak 20, 106 (2020). https://doi.org/10.1186/s12911-020-01145-7.
DOI
|
9 |
T. Y. Kim, S. K. Y. J. J. Jung and E. J. Kim, "Multi-Hop WBAN Construction for Healthcare IoT Systems", 2015 International Platform Technology and Service(PlatCon), pp. 27-28, Jan. 2015.
|
10 |
Y. S. Jeong, "An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor", Journal of Digital Convergence, Vol. 14, No. 3, pp. 261-267, Mar. 2016.
DOI
|
11 |
Y. S. Jeong, "Tracking Analysis of User Privacy Damage using Smartphone", Journal of Convergence Society for SMB, Vol. 4, No. 4, Dec. 2014.
|
12 |
U.S. Food and Drug Administration (FDA), Medical Device Safety. (consulted on November of 2013).
|
13 |
K. Fu Inside risks: reducing risks of implantable medical devices ACM Commun., 52 (6) (2009), pp. 25-27.
DOI
|
14 |
FDA, "Postmarket Management of Cybersecurity in Medical Devices", 2016.12.28.
|
15 |
N. Paul et al., "A Review of the Security of Insulin Pump Infusion Systems," Journal of Diabetes Science and Technology, 5(6):1557-62, November 2011.
DOI
|
16 |
Fennigkoh L and Smith B. Clinical equipment management.JCAHO PTSM Series 2:5-14. Cited on pages(24), January 1989.
|
17 |
International Medical Device Regulators Forum. "Software as a Medical Device": Possible Framework for Risk Categorization and Corresponding Considerations. IMDRF Software as a Medical Device (SaMD) Working Group; 2014, Accessed June 9, 2015.
|
18 |
S. Shivshankar, K. Summerhayes Challenges of conducting medical device studies Inst. Clin. Res, 2007.
|
19 |
Carmen Camara, Pedro Peris-Lopez, Juan E.Tapiador, "Security and privacy issues in implantable medical devices: A comprehensive survey", Journal of Biomedical Informatics, Volume 55, June 2015, Pages 272-289.
DOI
|
20 |
HIPPA, Security standards: technical safeguards 2(4) (2007) 1?17.
|
21 |
D. Halperin, T.S. Heydt-Benjamin, B. Ransford, S.S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, W.H. Maisel, Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses, in: Proc. of the 29th Annual IEEE Symposium on Security and Privacy, 2008, pp. 129?142.
|
22 |
IHE PCD Technical Committee, "Medical Equipment Management (MEM): Medical Device Cyber Security ?Best Practice Guide," IHE International, July1, 2015.
|
23 |
World Health Organizaiton, "Introduction to medical equipment inventory management," WHO Medical device technical series, June 2011
|
24 |
Ross RS, Johnson LA. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach; 2010.
|
25 |
Stine KM, Kissel RL, Barker WC, Lee A, Fahlsing J, Gulick J. Guide for Mapping Types of Information and Information Systems to Security Categories. NIST. 2008.
|
26 |
US Food and Drug Administration [homepage on the Internet] Is The Product A Medical Device? FDA; 2014.
|
27 |
Y. S. Jeong, "Design of Security Model for Service of Company Information," Journal of Convergence Soceity for SMB, Vol. 2, No. 2, pp. 43-49, Nov. 2012.
|
28 |
B. Zhang, X. W. Wang, M. Huang, "A data replica placement scheme for cloud storage under healthcare IoT environment", 2014 11th International Conferenceon Fuzzy Systems and Knowledge Discovery (FSKD), pp. 542-547, Aug. 2014.
|
29 |
S Taghipour, D Banjevic and AKS Jardine, "Prioritization of medical equipment for maintenance decisions,", Journal of the Operational Research Society, Volume 62, Issue 9, pp. 1666-1687, September 2011.
DOI
|
30 |
C. Li, A. Raghunathan, N.K. Jha, Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system, in: 13th IEEE International Conference on e-Health Networking Applications and Services (Healthcom), June 2011, pp. 150?156.
|