• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4646951)   Today's Articles (2592)   Subscriber (50684)
For: Zhang M, Raghunathan A, Jha NK. MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 2013;7:871-881. [PMID: 24473551 DOI: 10.1109/tbcas.2013.2245664] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
Number Cited by Other Article(s)
1
Jiang X, Fan J, Zhu Z, Wang Z, Guo Y, Liu X, Jia F, Dai C. Cybersecurity in neural interfaces: Survey and future trends. Comput Biol Med 2023;167:107604. [PMID: 37883851 DOI: 10.1016/j.compbiomed.2023.107604] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2023] [Revised: 09/23/2023] [Accepted: 10/17/2023] [Indexed: 10/28/2023]
2
Farady I, Kuo CC, Ng HF, Lin CY. Hierarchical Image Transformation and Multi-Level Features for Anomaly Defect Detection. SENSORS (BASEL, SWITZERLAND) 2023;23:988. [PMID: 36679785 PMCID: PMC9861680 DOI: 10.3390/s23020988] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/27/2022] [Revised: 11/22/2022] [Accepted: 01/12/2023] [Indexed: 06/17/2023]
3
Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms. J Biomed Inform 2022;132:104129. [PMID: 35781036 DOI: 10.1016/j.jbi.2022.104129] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/27/2021] [Revised: 05/16/2022] [Accepted: 06/21/2022] [Indexed: 11/20/2022]
4
Ou X, Wu M, Pu Y, Tu B, Zhang G, Xu Z. Cuckoo search algorithm with fuzzy logic and Gauss-Cauchy for minimizing localization error of WSN. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.109211] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
5
Mijatovic G, Kljajic D, Kasas-Lazetic K, Milutinov M, Stivala S, Busacca A, Cino AC, Stramaglia S, Faes L. Information Dynamics of Electric Field Intensity before and during the COVID-19 Pandemic. ENTROPY 2022;24:e24050726. [PMID: 35626609 PMCID: PMC9140641 DOI: 10.3390/e24050726] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/16/2022] [Revised: 05/08/2022] [Accepted: 05/17/2022] [Indexed: 11/25/2022]
6
Mahler T, Shalom E, Elovici Y, Shahar Y. A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices. Artif Intell Med 2022;123:102229. [PMID: 34998518 DOI: 10.1016/j.artmed.2021.102229] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/15/2021] [Revised: 08/04/2021] [Accepted: 11/30/2021] [Indexed: 11/25/2022]
7
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog. SENSORS 2021;21:s21248289. [PMID: 34960384 PMCID: PMC8708644 DOI: 10.3390/s21248289] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/11/2021] [Revised: 11/29/2021] [Accepted: 12/02/2021] [Indexed: 11/16/2022]
8
Hameed SS, Hassan WH, Abdul Latiff L, Ghabban F. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput Sci 2021;7:e414. [PMID: 33834100 PMCID: PMC8022640 DOI: 10.7717/peerj-cs.414] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/16/2020] [Accepted: 02/04/2021] [Indexed: 05/27/2023]
9
Dahmen J, Cook DJ. Indirectly-Supervised Anomaly Detection of Clinically-Meaningful Health Events from Smart Home Data. ACM T INTEL SYST TEC 2021;12:1-18. [PMID: 34336375 PMCID: PMC8323613 DOI: 10.1145/3439870] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2019] [Accepted: 11/01/2020] [Indexed: 10/22/2022]
10
Intelligent automated drug administration and therapy: future of healthcare. Drug Deliv Transl Res 2021;11:1878-1902. [PMID: 33447941 DOI: 10.1007/s13346-020-00876-4] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 11/09/2020] [Indexed: 12/13/2022]
11
Fritz RL, Dermody G. Interpreting Health Events in Big Data Using Qualitative Traditions. INTERNATIONAL JOURNAL OF QUALITATIVE METHODS 2020;19:10.1177/1609406920976453. [PMID: 33790703 PMCID: PMC8009495 DOI: 10.1177/1609406920976453] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
12
Awan MF, Bose P, Khaleghi A, Kansanen K, Balasingham I. Evaluation of Secrecy Capacity for Next-Generation Leadless Cardiac Pacemakers. IEEE Trans Biomed Eng 2019;67:2297-2308. [PMID: 31831404 DOI: 10.1109/tbme.2019.2958748] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/11/2022]
13
Kintzlinger M, Nissim N. Keep an eye on your personal belongings! The security of personal medical devices and their ecosystems. J Biomed Inform 2019;95:103233. [PMID: 31201966 DOI: 10.1016/j.jbi.2019.103233] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2018] [Revised: 04/12/2019] [Accepted: 06/11/2019] [Indexed: 12/27/2022]
14
Camara C, Martín H, Peris-Lopez P, Aldalaien M. Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2019;19:E2033. [PMID: 31052275 PMCID: PMC6540050 DOI: 10.3390/s19092033] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2019] [Revised: 04/21/2019] [Accepted: 04/23/2019] [Indexed: 11/17/2022]
15
Awan MF, Perez-Simbor S, Garcia-Pardo C, Kansanen K, Cardona N. Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers. SENSORS 2018;18:s18124327. [PMID: 30544594 PMCID: PMC6308590 DOI: 10.3390/s18124327] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/31/2018] [Revised: 11/28/2018] [Accepted: 12/05/2018] [Indexed: 11/16/2022]
16
Multi-layer security scheme for implantable medical devices. Neural Comput Appl 2018. [DOI: 10.1007/s00521-018-3819-0] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
17
Zheng G, Yang W, Valli C, Qiao L, Shankaran R, Orgun MA, Mukhopadhyay SC. Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE J Biomed Health Inform 2018;23:1546-1557. [PMID: 30106744 DOI: 10.1109/jbhi.2018.2864796] [Citation(s) in RCA: 26] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
18
Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems. JOURNAL OF SENSOR AND ACTUATOR NETWORKS 2018. [DOI: 10.3390/jsan7020021] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
19
Security Belt for Wireless Implantable Medical Devices. J Med Syst 2017;41:172. [PMID: 28929373 DOI: 10.1007/s10916-017-0813-5] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/10/2017] [Accepted: 08/29/2017] [Indexed: 10/18/2022]
20
Security and privacy issues in implantable medical devices: A comprehensive survey. J Biomed Inform 2015;55:272-89. [DOI: 10.1016/j.jbi.2015.04.007] [Citation(s) in RCA: 165] [Impact Index Per Article: 18.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/21/2014] [Revised: 03/19/2015] [Accepted: 04/17/2015] [Indexed: 11/24/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA