Security vulnerabilities in healthcare: an analysis of medical devices and software

被引:0
|
作者
Carlos M. Mejía-Granda
José L. Fernández-Alemán
Juan M. Carrillo-de-Gea
José A. García-Berná
机构
[1] University of Murcia,Department of Informatics and Systems, Faculty of Computer Science
关键词
Software security; Vulnerability databases; Descriptive study; Software vulnerabilities in health;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:257 / 273
页数:16
相关论文
共 50 条
  • [1] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Mejia-Granda, Carlos M.
    Fernandez-Aleman, Jose L.
    Carrillo-de-Gea, Juan M.
    Garcia-Berna, Jose A.
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (01) : 257 - 273
  • [2] Security Vulnerabilities on Implantable Medical Devices
    Longras, Ana
    Oliveira, Henrique
    Paiva, Sara
    2020 15TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2020), 2020,
  • [3] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [4] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [5] Poster Abstract: Analysis of Cyber-Security Vulnerabilities of Interconnected Medical Devices
    Xu, Yanchen
    Tran, Daniel
    Tian, Yuan
    Alemzadeh, Homa
    2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 23 - 24
  • [6] NFC Security Analysis and Vulnerabilities in Healthcare Applications
    Alzahrani, Ali
    Alqhtani, Abdullah
    Elmiligi, Haytham
    Gebali, Fayez
    Yasein, Mohamed S.
    2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 302 - 305
  • [7] Security and interconnection of medical devices to healthcare networks
    Seymour, DM
    McCall, KR
    DiPaola, L
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 131 - 134
  • [8] A software security assessment system based on analysis of vulnerabilities
    Sui, Chenmeng
    Liu, Yanzhao
    Liu, Yun
    Journal of Convergence Information Technology, 2012, 7 (06) : 211 - 219
  • [9] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [10] An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    Jiang, Xingbin
    Lora, Michele
    Chattopadhyay, Sudipta
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)