{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:17Z","timestamp":1742912477813,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031367564"},{"type":"electronic","value":"9783031367571"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36757-1_29","type":"book-chapter","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:01:40Z","timestamp":1688227300000},"page":"383-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Linking Computers to\u00a0the\u00a0Brain: Overview of\u00a0Cybersecurity Threats and\u00a0Possible Solutions"],"prefix":"10.1007","author":[{"given":"Tuomo","family":"Lahtinen","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,2]]},"reference":[{"key":"29_CR1","unstructured":"Cve-2022-25837 detail (2022). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-25837. Accessed 24 Apr 2023"},{"key":"29_CR2","unstructured":"Best TDCS devices of 2023 (2023). https:\/\/tdcs.com\/best-tdcs-devices\/. Accessed 18 Apr 2023"},{"key":"29_CR3","unstructured":"Layers of osi model (2023). https:\/\/www.geeksforgeeks.org\/layers-of-osi-model\/. Accessed 18 Apr 2023"},{"key":"29_CR4","unstructured":"What is transcranial direct current stimulation? (2023). https:\/\/neuromodec.org\/what-is-transcranial-direct-current-stimulation-tdcs\/. Accessed 24 Apr 2023"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Ajrawi, S., Rao, R., Sarkar, M.: Cybersecurity in brain-computer interfaces: RFID-based design-theoretical framework. Inform. Med. Unlocked 22, 100489 (2021)","DOI":"10.1016\/j.imu.2020.100489"},{"key":"29_CR6","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ Security 17), pp. 1093\u20131110 (2017)"},{"key":"29_CR7","doi-asserted-by":"publisher","first-page":"152204","DOI":"10.1109\/ACCESS.2020.3017394","volume":"8","author":"SL Bernal","year":"2020","unstructured":"Bernal, S.L., Celdran, A.H., Maimo, L.F., Barros, M.T., Balasubramaniam, S., Perez, G.M.: Cyberattacks on miniature brain implants to disrupt spontaneous neural signaling. IEEE Access 8, 152204\u2013152222 (2020)","journal-title":"IEEE Access"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Bernal, S.L., Celdr\u00e1n, A.H., P\u00e9rez, G.M.: Neuronal jamming cyberattack over invasive BCIS affecting the resolution of tasks requiring visual capabilities. Comput. Secur. 112, 102534 (2022)","DOI":"10.1016\/j.cose.2021.102534"},{"issue":"4","key":"29_CR9","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/3535509","volume":"66","author":"SL Bernal","year":"2023","unstructured":"Bernal, S.L., Celdr\u00e1n, A.H., P\u00e9rez, G.M.: Eight reasons to prioritize brain-computer interface cybersecurity. Commun. ACM 66(4), 68\u201378 (2023)","journal-title":"Commun. ACM"},{"key":"29_CR10","unstructured":"Bernal, S.L., Celdr\u00e1n, A.H., P\u00e9rez, G.M., Barros, M.T., Balasubramaniam, S.: Cybersecurity in brain-computer interfaces: State-of-the-art, opportunities, and future challenges. arXiv preprint arXiv:1908.03536 (2019)"},{"key":"29_CR11","unstructured":"Bernal, S.L., P\u00e9rez, M.Q., Beltr\u00e1n, E.T.M., P\u00e9rez, G.M., Celdr\u00e1n, A.H.: When brain-computer interfaces meet the metaverse: Landscape, demonstrator, trends, challenges, and concerns. arXiv preprint arXiv:2212.03169 (2022)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Boccard-Binet, S., Sen, A.: Safety of transcranial direct current stimulation in healthy participants. Epilepsy Behav. Rep. 15 (2021)","DOI":"10.1016\/j.ebr.2020.100414"},{"issue":"2","key":"29_CR13","first-page":"13","volume":"120","author":"N Briscoe","year":"2000","unstructured":"Briscoe, N.: Understanding the OSI 7-layer model. PC Netw. Advisor 120(2), 13\u201315 (2000)","journal-title":"PC Netw. Advisor"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.jbi.2015.04.007","volume":"55","author":"C Camara","year":"2015","unstructured":"Camara, C., Peris-Lopez, P., Tapiador, J.E.: Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inform. 55, 272\u2013289 (2015)","journal-title":"J. Biomed. Inform."},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"124884","DOI":"10.1109\/ACCESS.2022.3225098","volume":"10","author":"E Chiaramello","year":"2022","unstructured":"Chiaramello, E., et al.: Magnetoelectric nanoparticles: evaluating stimulation feasibility of the possible next generation approach for deep brain stimulation. IEEE Access 10, 124884\u2013124893 (2022)","journal-title":"IEEE Access"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Chicaiza, K.O., Benalc\u00e1zar, M.E.: A brain-computer interface for controlling IoT devices using EEG signals. In: 2021 IEEE Fifth Ecuador Technical Chapters Meeting (ETCM), pp. 1\u20136. IEEE (2021)","DOI":"10.1109\/ETCM53643.2021.9590711"},{"key":"29_CR17","unstructured":"Costin, A., Zaddach, J.: IoT malware: comprehensive survey, analysis framework and case studies. BlackHat USA 1(1), 1\u20139 (2018)"},{"key":"29_CR18","unstructured":"Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: 23rd $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 14), pp. 95\u2013110 (2014)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Costin, A., Zarras, A., Francillon, A.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In: 11th ACM on Asia Conference on Computer and Communications Security, pp. 437\u2013448 (2016)","DOI":"10.1145\/2897845.2897900"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Devasia, D., Roshini, T., Jacob, N.S., Jose, S.M., Joseph, S.: Assistance for quadriplegic with BCI enabled wheelchair and IoT. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 1220\u20131226. IEEE (2020)","DOI":"10.1109\/ICISS49785.2020.9315992"},{"issue":"2","key":"29_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1177\/1550059414540647","volume":"46","author":"B Ekici","year":"2015","unstructured":"Ekici, B.: Transcranial direct current stimulation-induced seizure: analysis of a case. Clin. EEG Neurosci. 46(2), 169 (2015)","journal-title":"Clin. EEG Neurosci."},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Elijah, O., et al.: A survey on industry 4.0 for the oil and gas industry: upstream sector. IEEE Access 9, vol. 144438\u2013144468 (2021)","DOI":"10.1109\/ACCESS.2021.3121302"},{"key":"29_CR23","doi-asserted-by":"publisher","first-page":"100294","DOI":"10.1109\/ACCESS.2021.3093391","volume":"9","author":"AR Elshenaway","year":"2021","unstructured":"Elshenaway, A.R., Guirguis, S.K.: Adaptive thresholds of EEG brain signals for IoT devices authentication. IEEE Access 9, 100294\u2013100307 (2021)","journal-title":"IEEE Access"},{"key":"29_CR24","unstructured":"Foundation, M.J.F.: Currently available deep brain stimulation devices. https:\/\/www.michaeljfox.org\/news\/currently-available-deep-brain-stimulation-devices. Accessed 18 Apr 2023"},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/B978-0-12-801560-5.00023-9","volume-title":"Network Neuroscience","author":"F Fr\u00f6hlich","year":"2016","unstructured":"Fr\u00f6hlich, F.: Chapter 23 - parkinson\u2019s disease. In: Fr\u00f6hlich, F. (ed.) Network Neuroscience, pp. 291\u2013296. Academic Press, San Diego (2016)"},{"key":"29_CR26","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s11517-010-0633-y","volume":"48","author":"S Hemm","year":"2010","unstructured":"Hemm, S., W\u00e5rdell, K.: Stereotactic implantation of deep brain stimulation electrodes: a review of technical systems, methods and emerging tools. Med. Biolog. Eng. Comput. 48, 611\u2013624 (2010)","journal-title":"Med. Biolog. Eng. Comput."},{"key":"29_CR27","unstructured":"Jackson Jr, G.W., Rahman, S.: Exploring challenges and opportunities in cybersecurity risk and threat communications related to the medical Internet of Things (miot). arXiv preprint arXiv:1908.00666 (2019)"},{"key":"29_CR28","unstructured":"Kapitonova, M., Kellmeyer, P., Vogt, S., Ball, T.: A framework for preserving privacy and cybersecurity in brain-computer interfacing applications. arXiv preprint arXiv:2209.09653 (2022)"},{"issue":"1","key":"29_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372043","volume":"53","author":"O Landau","year":"2020","unstructured":"Landau, O., Puzis, R., Nissim, N.: Mind your mind: EEG-based brain-computer interfaces and their security in cyber space. ACM Comput. Surv. (CSUR) 53(1), 1\u201338 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"29_CR30","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TCIAIG.2013.2263555","volume":"5","author":"D Marshall","year":"2013","unstructured":"Marshall, D., Coyle, D., Wilson, S., Callaghan, M.: Games, gameplay, and BCI: the state of the art. IEEE Trans. Comput. Intell. AI Games 5(2), 82\u201399 (2013)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"key":"29_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.dss.2018.02.007","volume":"108","author":"A McLeod","year":"2018","unstructured":"McLeod, A., Dolezel, D.: Cyber-analytics: modeling factors associated with healthcare data breaches. Decis. Supp. Syst. 108, 57\u201368 (2018)","journal-title":"Decis. Supp. Syst."},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Moioli, R.C., et al.: Neurosciences and wireless networks: the potential of brain-type communications and their applications. IEEE Commun. Surv. Tutorials 1599\u20131621 (2021)","DOI":"10.1109\/COMST.2021.3090778"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Parui, S., Samanta, D., Chakravorty, N.: An advanced healthcare system where internet of things meets brain-computer interface using event-related potential. In: 24th International Conference on Distributed Computing and Networking, pp. 438\u2013443 (2023)","DOI":"10.1145\/3571306.3571449"},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Prasath, M., Naveen, R., Sivaraj, G.: Mind-controlled unmanned aerial vehicle (UAV) using brain-computer interface (BCI). Unmanned Aerial Veh. Internet Things (IoT) Concepts Tech. Appl. 231\u2013246 (2021)","DOI":"10.1002\/9781119769170.ch13"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.wneu.2016.05.010","volume":"92","author":"L Pycroft","year":"2016","unstructured":"Pycroft, L., et al.: Brainjacking: implant security issues in invasive neuromodulation. World Neurosurg. 92, 454\u2013462 (2016)","journal-title":"World Neurosurg."},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Rosca, S., Leba, M., Ionica, A., Gamulescu, O.: Quadcopter control using a BCI. In: IOP Conference Series: Materials Science and Engineering, vol. 294, p. 012048. IOP Publishing (2018)","DOI":"10.1088\/1757-899X\/294\/1\/012048"},{"key":"29_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-319-59147-6_41","volume-title":"Advances in Computational Intelligence","author":"A Saboor","year":"2017","unstructured":"Saboor, A., et al.: SSVEP-based BCI in a smart home scenario. In: Rojas, I., Joya, G., Catala, A. (eds.) IWANN 2017. LNCS, vol. 10306, pp. 474\u2013485. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59147-6_41"},{"key":"29_CR38","doi-asserted-by":"crossref","unstructured":"Seh, A.H., et al.: Healthcare data breaches: insights and implications. In: Healthcare, vol. 8, p. 133. MDPI (2020)","DOI":"10.3390\/healthcare8020133"},{"key":"29_CR39","doi-asserted-by":"crossref","unstructured":"Takabi, H., Bhalotiya, A., Alohaly, M.: Brain computer interface (BCI) applications: Privacy threats and countermeasures. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 102\u2013111. IEEE (2016)","DOI":"10.1109\/CIC.2016.026"},{"key":"29_CR40","unstructured":"Teles, A., Cagy, M., Silva, F., Endler, M., Bastos, V., Teixeira, S.: Using brain-computer interface and internet of things to improve healthcare for wheelchair users. In: 11th International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (UBICOMM), vol. 1, pp. 92\u201394 (2017)"},{"key":"29_CR41","unstructured":"Uppal, R.: Brain-computer interfaces (BCI) are vulnerable to cyber attacks and need security and safety measures (2023), https:\/\/idstch.com\/cyber\/brain-computer-interfaces-BCI-vulnerable-cyber-attacks-need-security-safety-measures\/. Accessed 24 Apr 2023"},{"issue":"9","key":"29_CR42","doi-asserted-by":"publisher","first-page":"3331","DOI":"10.3390\/s22093331","volume":"22","author":"K V\u00e4rbu","year":"2022","unstructured":"V\u00e4rbu, K., Muhammad, N., Muhammad, Y.: Past, present, and future of EEG-based BCI applications. Sensors 22(9), 3331 (2022)","journal-title":"Sensors"},{"issue":"1","key":"29_CR43","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1146\/annurev.bb.02.060173.001105","volume":"2","author":"JJ Vidal","year":"1973","unstructured":"Vidal, J.J.: Toward direct brain-computer communication. Ann. Rev. Biophys. Bioeng. 2(1), 157\u2013180 (1973)","journal-title":"Ann. Rev. Biophys. Bioeng."},{"issue":"3","key":"29_CR44","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1080\/10447318.2018.1445068","volume":"35","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Yu, Y., Xu, M., Liu, Y., Yin, E., Zhou, Z.: Towards a hybrid BCI gaming paradigm based on motor imagery and SSVEP. Int. J. Hum.-Comput. Inter. 35(3), 197\u2013205 (2019)","journal-title":"Int. J. Hum.-Comput. Inter."},{"key":"29_CR45","unstructured":"Wikina, S.B.: What caused the breach? an examination of use of information technology and health data breaches. Perspect. Health Inf. Manag. 11(Fall) (2014)"},{"key":"29_CR46","doi-asserted-by":"crossref","unstructured":"Yoh, M.S., Kwon, J., Kim, S.: Neurowander: a BCI game in the form of interactive fairy tale. In: 12th ACM International Conference Adjunct Papers on Ubiquitous computing-Adjunct, pp. 389\u2013390 (2010)","DOI":"10.1145\/1864431.1864450"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36757-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:04:46Z","timestamp":1688227486000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36757-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031367564","9783031367571"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36757-1_29","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}