Yaqoob et al., 2019 - Google Patents
Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A reviewYaqoob et al., 2019
- Document ID
- 14652293496488984941
- Author
- Yaqoob T
- Abbas H
- Atiquzzaman M
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Over the last few years, healthcare administrations have been digitizing their provision of care that led to an increased number of networked medical devices and medical telemetry. Due to such digitization, medical devices have made phenomenal strides in the course of …
- 230000033228 biological regulation 0 title abstract description 39
Classifications
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/18—Applying electric currents by contact electrodes
- A61N1/32—Applying electric currents by contact electrodes alternating or intermittent currents
- A61N1/36—Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
- A61N1/3605—Implantable neurostimulators for stimulating central or peripheral nerve system
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/18—Applying electric currents by contact electrodes
- A61N1/32—Applying electric currents by contact electrodes alternating or intermittent currents
- A61N1/36—Applying electric currents by contact electrodes alternating or intermittent currents for stimulation, e.g. heart pace-makers
- A61N1/372—Arrangements in connection with the implantation of stimulators
- A61N1/37211—Means for communicating with stimulators
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N5/00—Radiation therapy
- A61N5/06—Radiation therapy using light
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N1/00—Electrotherapy; Circuits therefor
- A61N1/02—Details
-
- A—HUMAN NECESSITIES
- A61—MEDICAL OR VETERINARY SCIENCE; HYGIENE
- A61N—ELECTROTHERAPY; MAGNETOTHERAPY; RADIATION THERAPY; ULTRASOUND THERAPY
- A61N5/00—Radiation therapy
- A61N5/10—X-ray therapy; Gamma-ray therapy; Particle-irradiation therapy
- A61N2005/1085—X-ray therapy; Gamma-ray therapy; Particle-irradiation therapy characterised by the type of particles applied to the patient
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yaqoob et al. | Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices—A review | |
Newaz et al. | A survey on security and privacy issues in modern healthcare systems: Attacks and defenses | |
López Martínez et al. | A comprehensive review of the state-of-the-art on security and privacy issues in healthcare | |
Sun et al. | Security and privacy for the internet of medical things enabled healthcare systems: A survey | |
Kotz | A threat taxonomy for mHealth privacy | |
Sawand et al. | Toward energy-efficient and trustworthy eHealth monitoring system | |
Avancha et al. | Privacy in mobile technology for personal healthcare | |
AlTawy et al. | Security tradeoffs in cyber physical systems: A case study survey on implantable medical devices | |
Zhang et al. | Trustworthiness of medical devices and body area networks | |
Cagnazzo et al. | Threat modeling for mobile health systems | |
Altamimi | Security and privacy issues in eHealthcare systems: Towards trusted services | |
Gorbach et al. | A Review of Data Privacy Techniques for Wireless Body Area Networks in Telemedicine | |
Anand et al. | Data security and privacy functions in fog computing for healthcare 4.0 | |
Fazeldehkordi et al. | Security and privacy in IoT systems: a case study of healthcare products | |
Ellouze et al. | Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform | |
Awotunde et al. | AIoMT enabling real-time monitoring of healthcare systems: security and privacy considerations | |
Habib et al. | Threats identification for the smart internet of things in ehealth and adaptive security countermeasures | |
Li et al. | A review of security issues and solutions for precision health in Internet-of-Medical-Things systems | |
Soni et al. | New directions for security attacks, privacy, and malware detection in WBAN | |
Makina et al. | Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions | |
Aijaz et al. | Classification of Security Attacks in Healthcare and associated Cyber-harms | |
Oladimeji | An intrusion detection system for internet of medical things | |
Bikos et al. | The future of privacy and trust on the internet of Things (IoT) for healthcare: Concepts, Challenges, and Security Threat Mitigations | |
Saif et al. | IoT-Based Secure Health Care: Challenges, Requirements and Case Study | |
Tikkha et al. | Cryptographic Measures in IoMT: Security Threats and Measurement |