{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T09:01:26Z","timestamp":1767085286712,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030914233"},{"type":"electronic","value":"9783030914240"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91424-0_1","type":"book-chapter","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T13:03:29Z","timestamp":1637067809000},"page":"3-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation"],"prefix":"10.1007","author":[{"given":"Chandra","family":"Thapa","sequence":"first","affiliation":[]},{"given":"Kallol Krishna","family":"Karmakar","sequence":"additional","affiliation":[]},{"given":"Alberto Huertas","family":"Celdran","sequence":"additional","affiliation":[]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"1_CR1","unstructured":"The hospital room of the future datasets. http:\/\/perception.inf.um.es\/ICE-datasets\/. Accessed 05 Feb 2021"},{"key":"1_CR2","unstructured":"NIST cybersecurity framework. https:\/\/www.nist.gov\/cyberframework\/risk-management-framework"},{"key":"1_CR3","unstructured":"Pytorch. https:\/\/pytorch.org\/"},{"key":"1_CR4","unstructured":"Ransomware: Past, present, and future. https:\/\/blog.talosintelligence.com\/2016\/04\/ransomware.html#ch3-portent"},{"key":"1_CR5","unstructured":"Tcpreplay. https:\/\/linux.die.net\/man\/1\/tcpreplay. Accessed 2 Apr 2021"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1515\/bmt-2017-0040","volume":"63","author":"D Arney","year":"2018","unstructured":"Arney, D., Plourde, J., Goldman, J.M.: OpenICE medical device interoperability platform overview and requirement analysis. Biomed. Tech. 63, 39\u201347 (2018)","journal-title":"Biomed. Tech."},{"key":"1_CR7","unstructured":"Brok, C.: Following ransomware attack Indiana hospital pays \\$55k to unlock data (2020). https:\/\/digitalguardian.com\/blog\/following-ransomware-attack-indiana-hospital-pays-55k-unlock-data#:~:text=A%20hospital%20in%20Indiana%20paid, stop%20the%20bleeding%20on%20Friday"},{"issue":"6","key":"1_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MNET.2016.1600110NM","volume":"30","author":"K Cabaj","year":"2016","unstructured":"Cabaj, K., Mazurczyk, W.: Using software-defined networking for ransomware mitigation: the case of CryptoWall. IEEE Netw. 30(6), 14\u201320 (2016)","journal-title":"IEEE Netw."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.compeleceng.2017.10.012","volume":"66","author":"K Cabaj","year":"2018","unstructured":"Cabaj, K., Gregorczyk, M., Mazurczyk, W.: Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics. Comput. Electr. Eng. 66, 353\u2013368 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-020-00957-8","volume":"14","author":"AH Celdran","year":"2021","unstructured":"Celdran, A.H., Karmakar, K.K., Marmol, F.G., Varadharajan, V.: Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments. Peer-to-Peer Netw. Appl. 14, 1\u201316 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"1_CR11","unstructured":"CheckPoint: Attacks targeting healthcare organizations spike globally as covid-19 cases rise again (2021). https:\/\/blog.checkpoint.com\/2021\/01\/05\/attacks-targeting-healthcare-organizations-spike-globally-as-covid-19-cases-rise-again\/"},{"issue":"3","key":"1_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.4258\/hir.2016.22.3.156","volume":"22","author":"DV Dimitrov","year":"2016","unstructured":"Dimitrov, D.V.: Medical internet of things and big data in healthcare. Healthc. Inform. Res. 22(3), 156\u2013163 (2016)","journal-title":"Healthc. Inform. Res."},{"key":"1_CR13","unstructured":"EU: Regulation (EU) 2016\/679 general data protection regulation. Off. J. Eur. Union (2016)"},{"key":"1_CR14","unstructured":"ASTM F2761: Medical devices and medical systems - essential safety requirements for equipment comprising the patient-centric integrated clinical environment (ICE) - part 1: General requirements and conceptual model. ASTM International (2013). https:\/\/www.astm.org\/Standards\/F2761.htm"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.3390\/s19051114","volume":"19","author":"L Fernandez Maimo","year":"2019","unstructured":"Fernandez Maimo, L., Huertas Celdran, A., Perales Gomez, L., Garcia Clemente, F.J., Weimer, J., Lee, I.: Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments. Sensors 19(5), 1114 (2019)","journal-title":"Sensors"},{"key":"1_CR16","unstructured":"Gallagher, R.: Bloomberg: Hackers \u2018without conscience\u2019 demand ransom from dozens of hospitals and labs working on coronavirus (2020). https:\/\/fortune.com\/2020\/04\/01\/hackers-ransomware-hospitals-labs-coronavirus\/"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"102526","DOI":"10.1016\/j.jnca.2019.102526","volume":"153","author":"D Gibert","year":"2020","unstructured":"Gibert, D., Mateu, C., Planes, J.: The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J. Netw. Comput. Appl. 153, 102526 (2020)","journal-title":"J. Netw. Comput. Appl."},{"issue":"20","key":"1_CR18","first-page":"1","volume":"2","author":"A Khraisat","year":"2019","unstructured":"Khraisat, A., Gonda, I., Vamplew, P., Kamruzzaman, J.: Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity 2(20), 1\u201322 (2019)","journal-title":"Cybersecurity"},{"key":"1_CR19","unstructured":"Konecn\u00fd, J., McMahan, B., Ramage, D.: Federated optimization: distributed optimization beyond the datacenter. arxiv (2015). https:\/\/arxiv.org\/pdf\/1511.03575.pdf"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"K\u00f6ksal, \u00d6., Tekinerdogan, B.: Obstacles in data distribution service middleware: a systematic review. Future Gener. Comput. Syst. 68, 191\u2013210 (2017)","DOI":"10.1016\/j.future.2016.09.020"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Lin, K.Y., Huang, W.R.: Using federated learning on malware classification. In: Proceedings of the ICACT, pp. 585\u2013589 (2020)","DOI":"10.23919\/ICACT48636.2020.9061261"},{"key":"1_CR22","unstructured":"Mathews, L.: Ransomware attacks on the healthcare sector are skyrocketing (2021). https:\/\/www.forbes.com\/sites\/leemathews\/2021\/01\/08\/ransomware-attacks-on-the-healthcare-sector-are-skyrocketing\/?sh=2c5aa87d2d25"},{"key":"1_CR23","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the AISTATS, pp. 1273\u20131282 (2017)"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 115, 619\u2013640 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Acharya, B., et al.: Cloud-based secure logger for medical devices. In: Proceedings of the IEEE CHASE, pp. 89\u201394 (2016)","DOI":"10.1109\/CHASE.2016.48"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Nguyen, T.D., Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., Sadeghi, A.R.: DIoT: a federated self-learning anomaly detection system for IoT. In: Proceedings of the ICDCS, pp. 756\u2013767 (2019)","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"1_CR27","unstructured":"O\u2019Neill, P.H.: A patient has died after ransomware hackers hit a German hospital (2020). https:\/\/www.technologyreview.com\/2020\/09\/18\/1008582\/a-patient-has-died-after-ransomware-hackers-hit-a-german-hospital\/"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Riboni, D., Villani, A., Vitali, D., Bettini, C., Mancini, L.V.: Obfuscation of sensitive data in network flows. In: 2012 Proceedings of the IEEE INFOCOM, pp. 2372\u20132380 (2012)","DOI":"10.1109\/INFCOM.2012.6195626"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"12598","DOI":"10.1038\/s41598-020-69250-1","volume":"10","author":"MJ Sheller","year":"2020","unstructured":"Sheller, M.J., Edwards, B., Reina, G.A., et al.: Federated learning in medicine: facilitating multi-institutional collaborations without sharing patient data. Sci. Rep. 10, 12598 (2020). https:\/\/doi.org\/10.1038\/s41598-020-69250-1","journal-title":"Sci. Rep."},{"key":"1_CR30","unstructured":"Sherpa.ai: Federated learning framework. https:\/\/github.com\/sherpaai\/Sherpa.ai-Federated-Learning-Framework"},{"issue":"1","key":"1_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2899006","volume":"1","author":"JA Stankovic","year":"2016","unstructured":"Stankovic, J.A.: Research directions for cyber physical systems in wireless and mobile healthcare. ACM Trans. Cyber-Phys. Syst. 1(1), 1\u201312 (2016)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Taheri, R., Shojafar, M., Alazab, M., Tafazolli, R.: FED-IIoT: a robust federated malware detection architecture in industrial IoT. IEEE TII (2020)","DOI":"10.1109\/TII.2020.3043458"},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy. Comput. Biol. Med. 129, 1\u201323 (2021)","journal-title":"Comput. Biol. Med."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Verizon: DBIR 2020 data breach investigation report (2020). https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf","DOI":"10.1016\/S1361-3723(20)30059-2"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Vogelsang, A., Borg, M.: Requirements engineering for machine learning: perspectives from data scientists. In: Proceedings of the IEEE 27th International Requirements Engineering Conference Workshops (REW) (2019)","DOI":"10.1109\/REW.2019.00050"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Wang, L., Dyer, K.P., Akella, A., Ristenpart, T., Shrimpton, T.E.: Seeing through network-protocol obfuscation. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS 2015), pp. 57\u201369 (2015)","DOI":"10.1145\/2810103.2813715"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Chen, J., Wu, D., Teng, J., Yu, S.: Multi-task network anomaly detection using federated learning. In: Proceedings of the SoICT, pp. 273\u2013279 (2019)","DOI":"10.1145\/3368926.3369705"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality, Reliability, Security and Robustness in Heterogeneous Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91424-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,3]],"date-time":"2022-01-03T08:08:01Z","timestamp":1641197281000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91424-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030914233","9783030914240"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91424-0_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QShine","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"qshine2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/qshine.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EAI Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}