TY - STD TI - Shaikh A, Memon M, Memon N, Misbahuddin M. The role of service oriented architecture in telemedicine healthcare system. In: International Conference on Complex, Intelligent and Software Intensive Systems. Fukuoka; 2009. p. 208–14. https://doi.org/10.1109/cisis.2009.181. ID - ref1 ER - TY - STD TI - Naked security by SOPHOS. Doctors disabled wireless in Dick Cheney’s pacemaker to thwart hacking. Available from: https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-in-dick-cheneys-pacemaker-to-thwart-hacking/. Accessed 5 Jan 2020. UR - https://nakedsecurity.sophos.com/2013/10/22/doctors-disabled-wireless-in-dick-cheneys-pacemaker-to-thwart-hacking/ ID - ref2 ER - TY - BOOK PY - 2016 DA - 2016// TI - Postmarket management of cybersecurity in medical devices PB - Food and Drug Administration CY - Silver Spring ID - ref3 ER - TY - JOUR AU - Paul, N. AU - Kohno, T. AU - Klonoff, D. C. PY - 2011 DA - 2011// TI - A review of the security of insulin pump infusion systems JO - J Diabetes Sci Technol VL - 5 UR - https://doi.org/10.1177/193229681100500632 DO - 10.1177/193229681100500632 ID - Paul2011 ER - TY - CHAP AU - Ray, I. AU - Poolsapassit, N. ED - Vimercati, S. C. ED - Syverson, P. ED - Gollmann, D. PY - 2005 DA - 2005// TI - Using attack trees to identify malicious attacks from authorized insiders BT - Computer security – ESORICS 2005. ESORICS 2005. Lecture notes in computer science PB - Springer CY - Berlin UR - https://doi.org/10.1007/11555827_14 DO - 10.1007/11555827_14 ID - Ray2005 ER - TY - JOUR AU - Abdo, H. AU - Kaouk, M. AU - Flaus, J. M. AU - Masse, F. PY - 2018 DA - 2018// TI - A safety/security risk analysis approach of industrial control systems: a cyber bowtie–combining new version of attack tree with bowtie analysis JO - Comput Secur. VL - 72 UR - https://doi.org/10.1016/j.cose.2017.09.004 DO - 10.1016/j.cose.2017.09.004 ID - Abdo2018 ER - TY - STD TI - Maciel R, Araujo J, Melo C, Dantas J, Maciel P. Impact assessment of multi-threats in computer systems using attack tree modeling. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Miyazaki; 2018. p. 2448–53. https://doi.org/10.1109/smc.2018.00420. ID - ref7 ER - TY - JOUR AU - Myagmar, S. AU - Lee, A. J. AU - Yurcik, W. PY - 2005 DA - 2005// TI - Threat modeling as a basis for security requirements JO - Symp Requir Eng Inf Secur VL - 1 ID - Myagmar2005 ER - TY - JOUR AU - Ten, C. W. AU - Manimaran, G. AU - Liu, C. C. PY - 2010 DA - 2010// TI - Cybersecurity for critical infrastructures: attack and defense modeling JO - IEEE Trans Syst Man Cybern Syst Hum VL - 40 UR - https://doi.org/10.1109/tsmca.2010.2048028 DO - 10.1109/tsmca.2010.2048028 ID - Ten2010 ER - TY - JOUR AU - Schneier, B. PY - 1999 DA - 1999// TI - Attack trees JO - Dr Dobbs J VL - 24 UR - https://doi.org/10.1002/9781119183631.ch21 DO - 10.1002/9781119183631.ch21 ID - Schneier1999 ER - TY - STD TI - Maji A, Mukhoty A, Majumdar A, Mukhopadhyay J, Sural S, Paul S, et al. Security analysis and implementation of web-based telemedicine services with a four-tier architecture. In: Proceedings of the Second International Conference on Pervasive Computing Technologies for Healthcare. Tampere; 2008. p. 46–54. https://doi.org/10.4108/icst.pervasivehealth2008.2518. ID - ref11 ER - TY - JOUR AU - She, H. AU - Lu, Z. AU - Jantsch, A. AU - Zheng, L. R. AU - Zhou, D. PY - 2007 DA - 2007// TI - A network-based system architecture for remote medical applications JO - Asia-Pac Adv Netw VL - 1 ID - She2007 ER - TY - JOUR AU - Park, C. Y. PY - 2012 DA - 2012// TI - Trend of u-healthcare standardization technology JO - Electron Telecommun Trends VL - 25 UR - https://doi.org/10.22648/ETRI.2010.J.250406 DO - 10.22648/ETRI.2010.J.250406 ID - Park2012 ER - TY - JOUR AU - Wu, Z. AU - McGoogan, J. M. PY - 2020 DA - 2020// TI - Characteristics of and important lessons from the coronavirus disease 2019 (COVID-19) outbreak in China: summary of a report of 72 314 cases from the Chinese Center for Disease Control and Prevention JO - JAMA. VL - 323 UR - https://doi.org/10.1001/jama.2020.2648 DO - 10.1001/jama.2020.2648 ID - Wu2020 ER - TY - STD TI - Hollander JE, Carr BG. Virtually perfect? Telemedicine for Covid-19. N Engl J Med. 2020. https://doi.org/10.1056/NEJMp2003539. ID - ref15 ER - TY - BOOK PY - 2003 DA - 2003// TI - Cumulative Number of Reported Probable Cases of Severe Acute Respiratory Syndrome (SARS) ID - ref16 ER - TY - JOUR AU - Groot, R. J. AU - Baker, S. C. AU - Baric, R. S. PY - 2013 DA - 2013// TI - Middle East respiratory syndrome coronavirus (MERS-CoV): announcement of the coronavirus study group JO - J Virol VL - 87 UR - https://doi.org/10.1128/JVI.01244-13 DO - 10.1128/JVI.01244-13 ID - Groot2013 ER - TY - JOUR AU - Oh, A. S. PY - 2015 DA - 2015// TI - A study on home healthcare convergence for IEEE 11073 standard JO - J Korea Inst Inf Commun Eng VL - 19 UR - https://doi.org/10.6109/jkiice.2015.19.2.422 DO - 10.6109/jkiice.2015.19.2.422 ID - Oh2015 ER - TY - BOOK PY - 2011 DA - 2011// TI - Information security risk management. (second edition). ISO/IEC 27005:2011 UR - https://doi.org/10.3403/30125022u DO - 10.3403/30125022u ID - ref19 ER - TY - BOOK AU - Zetter, K. PY - 2014 DA - 2014// TI - Hospital networks are leaking data, leaving critical devices vulnerable ID - Zetter2014 ER - TY - STD TI - Kim TY, Youm S, Jung JJ, Kim EJ. Multi-hop WBAN construction for healthcare IoT systems. In: 2015 International Conference on Platform Technology and Service. Jeju; 2015. p. 27–8. https://doi.org/10.1109/platcon.2015.20. ID - ref21 ER - TY - JOUR AU - Jeong, Y. S. PY - 2016 DA - 2016// TI - An efficient IoT healthcare service management model of location tracking sensor JO - J Digit Converg VL - 14 UR - https://doi.org/10.14400/jdc.2016.14.3.261 DO - 10.14400/jdc.2016.14.3.261 ID - Jeong2016 ER - TY - STD TI - Zhang B, Wang XW, Huang M. A data replica placement scheme for cloud storage under healthcare IoT environment. In: 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). Xiamen; 2014. p. 542–7. https://doi.org/10.1109/fskd.2014.6980892. ID - ref23 ER - TY - JOUR AU - Wehde, M. PY - 2019 DA - 2019// TI - Healthcare 4.0 JO - IEEE Eng Manag Rev VL - 47 UR - https://doi.org/10.1109/EMR.2019.2930702 DO - 10.1109/EMR.2019.2930702 ID - Wehde2019 ER - TY - CHAP AU - Mohamed, N. AU - Al-Jaroodi, J. PY - 2019 DA - 2019// TI - The impact of Industry 4.0 on healthcare system engineering BT - Proceedings of the 2019 IEEE Int Syst Conf UR - https://doi.org/10.1109/SYSCON.2019.8836715 DO - 10.1109/SYSCON.2019.8836715 ID - Mohamed2019 ER - TY - STD TI - Alloghani M, Al-Jumeily D, Hussain A, Aljaaf AJ, Mustafina J, Petrov E. Healthcare services innovations based on the state of the art technology trend Industry 4.0. In: 2018 11th Int Conf developments in n eSystems engineering (DeSE), vol. 2018. Cambridge. p. 64–70. https://doi.org/10.1109/DeSE.2018.00016. ID - ref26 ER - TY - CHAP AU - Hansen, J. A. AU - Hansen, N. M. PY - 2010 DA - 2010// TI - A taxonomy of vulnerabilities in implantable medical devices BT - Proceedings of the second annual workshop on security and privacy in medical and home-care systems PB - ACM CY - Chicago UR - https://doi.org/10.1145/1866914.1866917 DO - 10.1145/1866914.1866917 ID - Hansen2010 ER - TY - JOUR AU - Camara, C. AU - Peris-Lopez, P. AU - Tapiador, J. E. PY - 2015 DA - 2015// TI - Security and privacy issues in implantable medical devices: a comprehensive survey JO - J Biomed Inf VL - 55 UR - https://doi.org/10.1016/j.jbi.2015.04.007 DO - 10.1016/j.jbi.2015.04.007 ID - Camara2015 ER - TY - BOOK PY - 2017 DA - 2017// TI - Medical device safety ID - ref29 ER - TY - BOOK PY - 2007 DA - 2007// TI - Security standards: Technical safeguards ID - ref30 ER - TY - BOOK AU - Shivshankar, S. AU - Summerhayes, K. PY - 2007 DA - 2007// TI - The challenges of conducting medical device studies PB - Institute of Clinical Research CY - Boston ID - Shivshankar2007 ER - TY - JOUR AU - Fu, K. PY - 2009 DA - 2009// TI - Inside risks: reducing risks of implantable medical devices JO - Commun ACM VL - 52 UR - https://doi.org/10.1145/1516046.1516055 DO - 10.1145/1516046.1516055 ID - Fu2009 ER - TY - STD TI - Halperin D, Heydt-Benjamin TS, Ransford B, Clark SS, Defend B, Morgan W, et al. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In: Proceedings of the 29th Annual IEEE Symposium on Security and Privacy. Oakland; 2008. p. 129–42. https://doi.org/10.1109/sp.2008.31. ID - ref33 ER - TY - STD TI - Li C, Raghunathan A, Jha NK. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In: 13th IEEE International Conference on e-Health Networking Applications and Services. Columbia; 2011. p. 150–6. https://doi.org/10.1109/health.2011.6026732. ID - ref34 ER - TY - BOOK PY - 2015 DA - 2015// TI - Implantable pacemaker and defibrillator information ID - ref35 ER - TY - STD TI - Nagaraju V, Fiondella L, Wandji T. A survey of fault and attack tree modeling and analysis for cyber risk management. In: 2017 IEEE International Symposium on Technologies for Homeland Security (HST). Waltham; 2017. p. 1–6. https://doi.org/10.1109/ths.2017.7943455. ID - ref36 ER - TY - STD TI - Ekstedt M, Sommestad T. Enterprise architecture models for cyber security analysis, Power Systems Conference and Exposition. In, Seattle; 2009. p. 1–6. https://doi.org/10.1109/psce.2009.4840267. ID - ref37 ER - TY - JOUR AU - Kravitz, H. AU - Driessen, G. AU - Gomberg, R. AU - Korach, A. PY - 1969 DA - 1969// TI - Accidental falls from elevated surfaces in infants from birth to one year of age JO - Pediatrics. VL - 44 ID - Kravitz1969 ER - TY - BOOK AU - Roth, M. AU - Liggesmeyer, P. PY - 2013 DA - 2013// TI - Modeling and analysis of safety-critical cyber physical systems using state/event fault trees PB - International Conference on Computer Safety, Reliability and Security CY - Toulouse ID - Roth2013 ER - TY - JOUR AU - Bernstein, S. PY - 1927 DA - 1927// TI - Sur l’extension du théoréme limite du calcul des probabilités aux sommes de quantités dépendantes [On the extension of the limit theorem of calculating probabilities to sums of dependent quantities] JO - Math Ann VL - 97 UR - https://doi.org/10.1007/BF01447859 DO - 10.1007/BF01447859 ID - Bernstein1927 ER - TY - JOUR AU - Lee, C. PY - 1959 DA - 1959// TI - Representation of switching circuits by binary-decision programs JO - Bell Syst Tech J VL - 38 UR - https://doi.org/10.1002/j.1538-7305.1959.tb01585.x DO - 10.1002/j.1538-7305.1959.tb01585.x ID - Lee1959 ER - TY - BOOK AU - Watson, H. PY - 1961 DA - 1961// TI - Bell telephone laboratories launch control safety study. In: bell telephone laboratories PB - Murray Hill CY - Nature UR - https://doi.org/10.1038/183220d0 DO - 10.1038/183220d0 ID - Watson1961 ER - TY - BOOK AU - Vesely, W. AU - Goldberg, F. AU - Roberts, N. AU - Haasl, D. PY - 1981 DA - 1981// TI - Fault Tree Handbook PB - Systems and Reliability Research, Office of Nuclear Regulatory Research CY - Washington ID - Vesely1981 ER - TY - BOOK PY - 2015 DA - 2015// TI - Health informatics - Information security management in health using ISO/IEC 27002. ISO/DIS 27799:2014(E) UR - https://doi.org/10.3403/30304351 DO - 10.3403/30304351 ID - ref44 ER - TY - STD TI - Arney D, Venkatasubramanian KK, Sokolsky O, Lee I. Biomedical devices and systems security. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Boston; 2011. p. 2376–9. https://doi.org/10.1109/IEMBS.2011.6090663. ID - ref45 ER - TY - BOOK PY - 2010 DA - 2010// TI - Medical devices operating in the 401–406 MHz frequency band ID - ref46 ER - TY - STD TI - Denning T, Borning A, Friedman B, Gill BT, Kohno T, Maisel WH. Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Atlanta; 2010. p. 917–26. https://doi.org/10.1145/1753326.1753462. ID - ref47 ER - TY - JOUR AU - Bao, S. D. AU - Poon, C. C. Y. AU - Yuan-Ting, Z. AU - Shen, L. F. PY - 2008 DA - 2008// TI - Using the timing information of heartbeats as an entity identifier to secure body sensor network JO - IEEE Trans Inf Technol Biomed VL - 12 UR - https://doi.org/10.1109/titb.2008.926434 DO - 10.1109/titb.2008.926434 ID - Bao2008 ER - TY - STD TI - Partala J, Keräneny N, Särestöniemi M, Hämäläinen M, Iinatti J, Jämsä T, Reponen J, Seppänen T. Security threats against the transmission chain of a medical health monitoring system. In: IEEE 15th International Conference on e-Health Networking, Applications and Services. Lisbon; 2013. p. 243–8. https://doi.org/10.1109/healthcom.2013.6720675. ID - ref49 ER - TY - BOOK PY - 2018 DA - 2018// TI - Risk management. ISO 31000:2018 UR - https://doi.org/10.3403/30246105u DO - 10.3403/30246105u ID - ref50 ER - TY - BOOK PY - 2009 DA - 2009// TI - Information technology – Security techniques – Evaluation criteria for IT security Part 1: Introduction and general model. ISO/IEC 15408–1:2009 UR - https://doi.org/10.3403/bsisoiec15408 DO - 10.3403/bsisoiec15408 ID - ref51 ER - TY - BOOK PY - 2015 DA - 2015// TI - Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045. ISO/IEC 18045 UR - https://doi.org/10.3403/30325408 DO - 10.3403/30325408 ID - ref52 ER - TY - BOOK PY - 2010 DA - 2010// TI - Guide for applying the risk management framework to federal information systems: A security life cycle approach. NIST SP800–37 Rev. 1 UR - https://doi.org/10.6028/nist.sp.800-37r1 DO - 10.6028/nist.sp.800-37r1 ID - ref53 ER - TY - BOOK AU - Stine, K. M. AU - Kissel, R. L. AU - Barker, W. C. AU - Lee, A. AU - Fahlsing, J. AU - Gulick, J. PY - 2008 DA - 2008// TI - Guide for mapping types of information and information systems to security categories. NIST SP800–64 Rev. 4 ID - Stine2008 ER - TY - BOOK PY - 2007 DA - 2007// TI - Failure mode, effects and criticality analysis. FMECA MIL-P-1629 UR - https://doi.org/10.1002/9781118312575.ch12 DO - 10.1002/9781118312575.ch12 ID - ref55 ER - TY - JOUR AU - Lee, S. M. AU - Lee, D. PY - 2020 DA - 2020// TI - “Untact”: a new customer service strategy in the digital age JO - Serv Bus VL - 14 UR - https://doi.org/10.1007/s11628-019-00408-2 DO - 10.1007/s11628-019-00408-2 ID - Lee2020 ER - TY - JOUR AU - Al-Janabi, S. AU - Alkaim, A. F. PY - 2020 DA - 2020// TI - A nifty collaborative analysis to predicting a novel tool (DRFLLS) for missing values estimation JO - Soft Comput VL - 24 UR - https://doi.org/10.1007/s00500-019-03972-x DO - 10.1007/s00500-019-03972-x ID - Al-Janabi2020 ER - TY - JOUR AU - Al-Janabi, S. AU - Mahdi, M. PY - 2019 DA - 2019// TI - Evaluation prediction techniques to achievement an optimal biomedical analysis JO - Int J Grid Utility Comput VL - 10 UR - https://doi.org/10.1504/IJGUC.2019.102021 DO - 10.1504/IJGUC.2019.102021 ID - Al-Janabi2019 ER - TY - STD TI - Al-Janabi S, Mohammad M, Al-Sultan A. A new method for prediction of air pollution based on intelligent computation. Soft Comput. 2019. https://doi.org/10.1007/s00500-019-04495-1. ID - ref59 ER - TY - JOUR AU - Patel, A. AU - Al-Janabi, S. AU - AlShourbaji, I. AU - Pedersen, J. PY - 2014 DA - 2014// TI - A novel methodology towards a trusted environment in mashup web applications JO - Comput Secur VL - 49 UR - https://doi.org/10.1016/j.cose.2014.10.009 DO - 10.1016/j.cose.2014.10.009 ID - Patel2014 ER - TY - JOUR AU - Al-Janabi, S. AU - AlShourbaji, I. PY - 2016 DA - 2016// TI - A study of cyber security awareness in educational environment in the Middle East JO - J Inf Knowl Manag VL - 15 UR - https://doi.org/10.1142/S0219649216500076 DO - 10.1142/S0219649216500076 ID - Al-Janabi2016 ER - TY - STD TI - Al-Janabi S, Rawat S, Patel A, AlShourbaji I. Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers. Int J Electr Power Energy Syst. 2015;67. https://doi.org/10.1016/j.ijepes.2014.12.005. ID - ref62 ER - TY - STD TI - Kalajdzic K, Al-Janabi S, Patel A. Rapid lossless compression of short text messages. Comput Standards Interfaces. 2014. https://doi.org/10.1016/j.csi.2014.05.005. ID - ref63 ER - TY - CHAP AU - Mahdi, M. AU - Al-Janabi, S. PY - 2019 DA - 2019// TI - A novel software to improve healthcare base on predictive analytics and mobile services for cloud data centers BT - International conference on big data and networks technologies PB - Springer CY - Cham UR - https://doi.org/10.1007/978-3-030-23672-4_23 DO - 10.1007/978-3-030-23672-4_23 ID - Mahdi2019 ER -