Cyber-attacks on health-care systems

被引:3
|
作者
Devi, Sharmila
机构
来源
LANCET ONCOLOGY | 2023年 / 24卷 / 04期
关键词
D O I
10.1016/S1470-2045(23)00119-5
中图分类号
R73 [肿瘤学];
学科分类号
100214 ;
摘要
[No abstract available]
引用
收藏
页码:148 / 148
页数:1
相关论文
共 50 条
  • [1] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    [J]. IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [2] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    [J]. PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [3] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [4] Modeling Network Systems Under Simultaneous Cyber-Attacks
    Da, Gaofeng
    Xu, Maochao
    Zhao, Peng
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 971 - 984
  • [5] Detection and Prevention of Cyber-Attacks in Networked Control Systems
    Li, Yike
    Tong, Yin
    Giua, Alessandro
    [J]. IFAC PAPERSONLINE, 2020, 53 (04): : 7 - 13
  • [6] On Resilient Design of Cooperative Systems in Presence of Cyber-Attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    [J]. 2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 946 - 951
  • [7] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [8] A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems
    Leite Junior, Walmor Cristino
    de Moraes, Claudio Coreixas
    de Albuquerque, Carlos E. P.
    Machado, Raphael Carlos Santos
    de Sa, Alan Oliveira
    [J]. SENSORS, 2021, 21 (09)
  • [9] Robust H∞ cyber-attacks estimation for control systems
    Li Yumei
    Holger, Voos
    Mohamed, Daroijach
    [J]. 2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 3124 - 3129
  • [10] A model of deception during cyber-attacks on information systems
    Rowe, NC
    [J]. 2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30