{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:42:12Z","timestamp":1743079332480,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030276836"},{"type":"electronic","value":"9783030276843"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27684-3_13","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:03:04Z","timestamp":1566169384000},"page":"95-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Resilient Security of Medical Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Aakarsh","family":"Rao","sequence":"first","affiliation":[]},{"given":"Nadir","family":"Carre\u00f3n","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Lysecky","sequence":"additional","affiliation":[]},{"given":"Jerzy","family":"Rozenblit","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Sametinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,1]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Biro, M., Mashkoor, A., Sametinger, J., Seker, R. (eds.) Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24\u201329 (2018)","DOI":"10.1109\/MS.2017.4541050"},{"issue":"6","key":"13_CR2","doi-asserted-by":"publisher","first-page":"513","DOI":"10.3233\/JCS-2006-14602","volume":"14","author":"A Blyth","year":"2006","unstructured":"Blyth, A., Thomas, P.: Performing real-time threat assessment of security incidents using data fusion of IDS logs. J. Comput. Secur. 14(6), 513\u2013534 (2006)","journal-title":"J. Comput. Secur."},{"key":"13_CR3","unstructured":"Krishnamurthy, R., Sastry, A., Balakrishnan, B.: How the internet of things is transforming medical devices. Cognizant 20\u201320 Insights, Cognizant (2016)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/LES.2013.2276434","volume":"5","author":"C Li","year":"2013","unstructured":"Li, C., Raghunathan, A., Jha, N.K.: Improving the trustworthiness of medical device software with formal verification methods. IEEE Embed. Syst. Lett. 5, 50\u201353 (2013)","journal-title":"IEEE Embed. Syst. Lett."},{"key":"13_CR5","unstructured":"Lu, S., Seo, M., Lysecky, R.: Timing-based anomaly detection in embedded systems. In: Proceedings of the 20th Asia and South Pacific Design Automation Conference, pp. 809\u2013814 (2015)"},{"issue":"2","key":"13_CR6","first-page":"38:1","volume":"17","author":"S Lu","year":"2018","unstructured":"Lu, S., Lysecky, R.: Time and sequence integrated runtime anomaly detection for embedded systems. ACM Trans. Embed. Comput. Syst. 17(2), 38:1\u201338:27 (2018)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"13_CR7","unstructured":"National Institute of Standards and Technology: Guide for Conducting Risk Assessments. NIST Special Publication 800\u201330 Revision 1, September 2012"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Phan, L.T.X., Lee, I.: Towards a compositional multi-modal framework for adaptive cyber-physical systems. In: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 67\u201373 (2011)","DOI":"10.1109\/RTCSA.2011.82"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Phan, L.T.X., Chakraborty, S., Lee, I.: Timing analysis of mixed time\/event-triggered multi-mode systems. In: IEEE Real-Time Systems Symposium (RTSS), pp. 271\u2013280 (2009)","DOI":"10.1109\/RTSS.2009.24"},{"key":"13_CR10","unstructured":"Rao, A., Rozenblit, J., Lysecky, R., Sametinger, J.: Composite risk modeling for automated threat mitigation in medical devices. In: Proceedings of the Modeling and Simulation in Medicine Symposium, Virginia Beach, VA, USA, pp. 899\u2013908 (2017)"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MS.2017.4541031","volume":"35","author":"A Rao","year":"2018","unstructured":"Rao, A., Carreon Rascon, N., Lysecky, R., Rozenblit, J.W.: Probabilistic security threat detection for risk management in cyber-physical medical systems. IEEE Softw. 35(1), 38\u201343 (2018)","journal-title":"IEEE Softw."},{"key":"13_CR12","unstructured":"Rao, A., Rozenblit, J., Lysecky, R., Sametinger, J.: Trustworthy multi-modal framework for life-critical systems security. In: Annual Simulation Symposium, article no. 17, pp. 1\u20139 (2018)"},{"key":"13_CR13","unstructured":"Roberts, P.: Intel: New Approach Needed to Secure Connected Health Devices (2015). https:\/\/www.securityledger.com\/2015\/03\/intel-new-approach-needed-to-secure-connected-health-devices\/"},{"key":"13_CR14","unstructured":"Rose, K., Eldridge, S., Chapin, L.: The Internet of Things (IoT): An Overview-Understanding the Issues and Challenges of a More Connected World. Internet Society (2015)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Rostami, M., Juels, A., Koushanfar, F.: Heart-to-Heart (H2H): authentication for implanted medical devices. In: ACM SIGSAC Conference on Computer & Communications Security, pp. 1099\u20131112 (2013)","DOI":"10.1145\/2508859.2516658"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Sametinger, J., Steinwender, C.: Resilient context-aware medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), Las Vegas, NV, USA, pp. 1775\u20131778 (2017)","DOI":"10.1109\/CSCI.2017.310"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2667218","volume":"58","author":"J Sametinger","year":"2015","unstructured":"Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74\u201382 (2015)","journal-title":"Commun. ACM"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sametinger, J., Rozenblit, J.W.: Security scores for medical devices. In: Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016) - Volume 5: HEALTHINF, pp. 533\u2013541 (2016)","DOI":"10.5220\/0005838805330541"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Xu, F., Qin, Z., Tan, C.C., Wang, B., Li, Q.: IMDGuard: securing implantable medical devices with the external wearable guardian. In: IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5934987"}],"container-title":["Communications in Computer and Information Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27684-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:21:16Z","timestamp":1710354076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-27684-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030276836","9783030276843"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27684-3_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (Single-blind and Double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"157","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}