{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:30:01Z","timestamp":1743013801165,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_38","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"387-397","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System"],"prefix":"10.1007","author":[{"given":"Raj kamal","family":"Kaur","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lalit Kumar","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Babita","family":"Pandey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aditya","family":"Khamparia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"unstructured":"Yan, Y., Dittmann, L.: Security challenges and solutions for telemedicine over EPON. In: Sixth International Conference on eHealth, Telemedicine, and Social Medicine eTELEMED, pp. 22\u201327 (2014)","key":"38_CR1"},{"issue":"1","key":"38_CR2","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3390\/electronics2010041","volume":"2","author":"A Kornecki","year":"2013","unstructured":"Kornecki, A., Liu, M.: Fault tree analysis for safety\/security verification in aviation software. Electronics 2(1), 41\u201356 (2013)","journal-title":"Electronics"},{"doi-asserted-by":"crossref","unstructured":"Babeshko, E., Kharchenko, V., Gorbenko, A.: Applying F (I) MEA-technique for SCADA-based industrial control systems dependability assessment and ensuring. In: IEEE Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, pp. 309\u2013315. IEEE (2008)","key":"38_CR3","DOI":"10.1109\/DepCoS-RELCOMEX.2008.23"},{"unstructured":"Pendergrass, J.C., Heart, K., Ranganathan, C., Venkatakrishnan, V.N.: A threat table based approach to telemedicine security. In: Transactions of the International Conference on Health Information Technology Advancement, Western Michigan University, vol. 2, no. 1, pp. 104\u2013111 (2013)","key":"38_CR4"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10550-007-0013-9","volume":"25","author":"F Braber","year":"2007","unstructured":"Braber, F., Hogganvik, I., Lund, M.S., St\u00f8len, K., Vraalsen, F.: Model-based security analysis in seven steps\u2014a guided tour to the CORAS method. BT Technol. J. 25(1), 101\u2013117 (2007)","journal-title":"BT Technol. J."},{"doi-asserted-by":"crossref","unstructured":"Ding, J., Zhang, D.: An approach for modeling and analyzing the communication protocols in a telemedicine system. In: 6th IEEE International Conference on Biomedical Engineering and Informatics, pp. 699\u2013704. IEEE (2013)","key":"38_CR6","DOI":"10.1109\/BMEI.2013.6747029"},{"issue":"1","key":"38_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11334-013-0197-8","volume":"11","author":"J Liu","year":"2015","unstructured":"Liu, J., Xiong, X., Ding, Z., He, J.: Modeling and analysis of interactive telemedicine systems. Innov. Syst. Softw. Eng. 11(1), 55\u201369 (2015)","journal-title":"Innov. Syst. Softw. Eng."},{"unstructured":"Jo\u00fdo, M., Savaris, A., von Wangenheim, C.G., Wangenheim, A.: Software quality evaluation of the laboratory information system used in the Santa Catarina state integrated telemedicine and telehealth system. In: 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS), pp. 76\u201381 (2016)","key":"38_CR8"},{"issue":"4","key":"38_CR9","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: Properties, analysis and applications. Proc. IEEE 77(4), 541\u2013580 (1989)","journal-title":"Proc. IEEE"},{"issue":"4","key":"38_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1109\/TSE.2006.40","volume":"32","author":"D Xu","year":"2006","unstructured":"Xu, D., Nygard, K.E.: Threat-driven modeling and verification of secure software using aspect-oriented Petri nets. IEEE Trans. Software Eng. 32(4), 265\u2013278 (2006)","journal-title":"IEEE Trans. Software Eng."},{"unstructured":"Abo-Zahhad, M., Ahmed, S.M., Elnahas, O.: A wireless emergency telemedicine system for patients monitoring and diagnosis. Int. J. Telemed. Appl. 2014, 1\u201312 (2014)","key":"38_CR11"},{"doi-asserted-by":"crossref","unstructured":"Venkataraman, R., Ramakrishnan, N.: Safety and quality metrics for ICU telemedicine: measuring success. Telemedicine in the ICU Springer, pp. 145\u2013154. Springer, Cham (2019)","key":"38_CR12","DOI":"10.1007\/978-3-030-11569-2_8"},{"key":"38_CR13","doi-asserted-by":"publisher","first-page":"50630","DOI":"10.1109\/ACCESS.2019.2908932","volume":"7","author":"G Guo","year":"2019","unstructured":"Guo, G., Sun, G., Bin, S., Shao, F.: Design and analysis of field telemedicine information communication protocol based on wireless sensor network. IEEE Access 7, 50630\u201350635 (2019)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Abaimov, S., Martellini, M.: Selected issues of cyber security practices in CBRNeCy critical infrastructure. In: Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges, pp. 11\u201334. Springer, Cham ( (2017))","key":"38_CR14","DOI":"10.1007\/978-3-319-62108-1_2"},{"issue":"9","key":"38_CR15","doi-asserted-by":"publisher","first-page":"8738","DOI":"10.1109\/TVT.2018.2845744","volume":"67","author":"J Lin","year":"2018","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Ge, L.: Data integrity attacks against dynamic route guidance in transportation-based cyber-physical systems: Modeling, analysis, and defense. IEEE Trans. Veh. Technol. 67(9), 8738\u20138753 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"38_CR16","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1002\/qre.2340","volume":"35","author":"P Kumar","year":"2019","unstructured":"Kumar, P., Singh, L.K., Kumar, C.: An optimized technique for reliability analysis of safety-critical systems: a case study of nuclear power plant. Qual. Reliab. Eng. Int. 35(1), 461\u2013469 (2019)","journal-title":"Qual. Reliab. Eng. Int."},{"issue":"11","key":"38_CR17","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1016\/j.comcom.2011.11.015","volume":"35","author":"G Tartarisco","year":"2012","unstructured":"Tartarisco, G., Baldus, G., Corda, D., Raso, R., Arnao, A., Ferro, M., Gaggioli, A., Pioggia, G.: Personal health system architecture for stress monitoring and support to clinical decisions. Comput. Commun. 35(11), 1296\u20131305 (2012). Elsevier","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"Wen, C., Yeh, M.F., Chang, K.C., Lee, R.G.: Real-time ECG telemonitoring system design with mobile phone platform. Measurement 41(4), 463\u2013470 (2008). Elsevier","key":"38_CR18","DOI":"10.1016\/j.measurement.2006.12.006"}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T02:04:05Z","timestamp":1597284245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}