{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:24:53Z","timestamp":1726057493392},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811513008"},{"type":"electronic","value":"9789811513015"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-1301-5_24","type":"book-chapter","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T05:18:45Z","timestamp":1572931125000},"page":"295-308","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing Smart Healthcare Systems from Vulnerability Exploitation"],"prefix":"10.1007","author":[{"given":"Gemini","family":"George","sequence":"first","affiliation":[]},{"given":"Sabu M.","family":"Thampi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,5]]},"reference":[{"key":"24_CR1","unstructured":"Cisco white paper, IoT threat environment, published on 2015. \n                    https:\/\/www.cisco.com\/c\/en_in\/solutions\/security\/iot-threat-defense\/index.html"},{"key":"24_CR2","unstructured":"Huawei technologies, IoT security white paper-evolving security architecture, published on 2018. \n                    https:\/\/www.huawei.com\/minisite\/iot\/img\/iot_security_white_paper_2018_v2_en.pdf"},{"key":"24_CR3","unstructured":"FDA, US food and drugs administration, medical device recalls, published on 2018. \n                    https:\/\/www.fda.gov\/MedicalDevices\/Safety\/ListofRecalls.html"},{"key":"24_CR4","unstructured":"Hipaa journal, pacific alliance medical center announces ransomware attack, published on 2017. \n                    https:\/\/www.hipaajournal.com\/pacific-alliance-medical-center-announces-ransomware-attack"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"43586","DOI":"10.1109\/ACCESS.2018.2863244","volume":"6","author":"G George","year":"2018","unstructured":"George, G., Thampi, S.M.: A graph-based security framework for securing industrial IoT networks from vulnerability exploitations. IEEE Access 6, 43586\u201343601 (2018)","journal-title":"IEEE Access"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Yu, T., Sekar, V., Seshan, S., Agarwal, Y., Xu, C.: Handling a trillion (unfixable) flaws on a billion devices: rethinking network security for the Internet-of-Things. In: Proceedings of the 14th ACM Workshop on Hot Topics in Networks, p. 5. ACM (2015)","DOI":"10.1145\/2834050.2834095"},{"key":"24_CR7","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SR Islam","year":"2015","unstructured":"Islam, S.R., Kwak, D., Kabir, M.H., Hossain, M., Kwak, K.-S.: The internet of things for health care: a comprehensive survey. IEEE Access 3, 678\u2013708 (2015)","journal-title":"IEEE Access"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Chiuchisan, I., Costin, H.-N., Geman, O.: Adopting the internet of things technologies in health care systems. In: 2014 International Conference and Exposition on Electrical and Power Engineering (EPE), pp. 532\u2013535. IEEE (2014)","DOI":"10.1109\/ICEPE.2014.6969965"},{"issue":"4","key":"24_CR9","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TII.2014.2307795","volume":"10","author":"G Yang","year":"2014","unstructured":"Yang, G., et al.: A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans. Ind. Inform. 10(4), 2180\u20132191 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922\u2013926. IEEE (2012)","DOI":"10.1109\/IMIS.2012.26"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Rohokale, V.M., Prasad, N.R., Prasad, R.: A cooperative internet of things (IoT) for rural healthcare monitoring and control. In: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940920"},{"issue":"6","key":"24_CR12","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","volume":"2","author":"L Catarinucci","year":"2015","unstructured":"Catarinucci, L., et al.: An iot-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515\u2013526 (2015)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"24_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/JIOT.2014.2329462","volume":"1","author":"Y Zhang","year":"2014","unstructured":"Zhang, Y., Sun, L., Song, H., Cao, X.: Ubiquitous wsn for healthcare: recent advances and future prospects. IEEE Internet Things J. 1(4), 311\u2013318 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TII.2014.2306382","volume":"10","author":"B Xu","year":"2014","unstructured":"Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., Bu, F., et al.: Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans. Ind. Inform. 10(2), 1578\u20131586 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MITP.2016.42","volume":"3","author":"PA Laplante","year":"2016","unstructured":"Laplante, P.A., Laplante, N.: The internet of things in healthcare: potential applications and challenges. IT Prof. 3, 2\u20134 (2016)","journal-title":"IT Prof."},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Tarouco, L.M.R., et al.: Internet of things in healthcare: Interoperatibility and security issues. In: 2012 IEEE International Conference on Communications (ICC), pp. 6121\u20136125. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364830"},{"issue":"5","key":"24_CR17","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368\u20131376 (2016)","journal-title":"IEEE Sens. J."},{"key":"24_CR18","first-page":"e2","volume":"4","author":"TH Anil Chacko","year":"2018","unstructured":"Anil Chacko, T.H.: Security and privacy issues with IoT in healthcare. EAI Endorsed Trans. Pervasive Health Technol. 4, e2 (2018)","journal-title":"EAI Endorsed Trans. Pervasive Health Technol."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Simpson, A.K., Roesner, F., Kohno, T.: Securing vulnerable home IoT devices with an in-hub security manager. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 551\u2013556. IEEE (2017)","DOI":"10.1109\/PERCOMW.2017.7917622"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2017.01.033","volume":"83","author":"M Ge","year":"2017","unstructured":"Ge, M., Hong, J.B., Guttmann, W., Kim, D.S.: A framework for automating security analysis of the Internet of Things. J. Netw. Comput. Appl. 83, 12\u201327 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"24_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-981-13-5826-5_1","volume-title":"Security in Computing and Communications","author":"G George","year":"2019","unstructured":"George, G., Thampi, S.M.: A graph-based decision support model for vulnerability analysis in IoT networks. In: Thampi, S.M., Madria, S., Wang, G., Rawat, D.B., Alcaraz Calero, J.M. (eds.) SSCC 2018. CCIS, vol. 969, pp. 1\u201323. Springer, Singapore (2019). \n                    https:\/\/doi.org\/10.1007\/978-981-13-5826-5_1"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Romero-Mariona, J., Hallman, R., Kline, M., San Miguel, J., Major, M., Kerr, L.: Security in the industrial internet of things-the C-SEC approach. In: Proceedings of the International Conference on Internet of Things and Big Data, vol. 1, pp. 421\u2013428 (2016)","DOI":"10.5220\/0005877904210428"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Noel, S., Kalapa, P., Albanese, M., Williams, J.: Cauldron mission-centric cyber situational awareness with defense in depth. In: MILCOM, pp. 1339\u20131344 (2011)","DOI":"10.1109\/MILCOM.2011.6127490"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Noel, S., Harley, E., Tam, K., Limiero, M., Share, M.: Cygraph: graph-based analytics and visualization for cybersecurity. In: Handbook of Statistics, vol. 35, pp. 117\u2013167. Elsevier (2016)","DOI":"10.1016\/bs.host.2016.07.001"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"George, G., Thampi, S.M.: Vulnerability-based risk assessment and mitigation strategies for edge devices in the internet of things. In: Pervasive and Mobile Computing, p. 101068 (2019)","DOI":"10.1016\/j.pmcj.2019.101068"},{"key":"24_CR26","unstructured":"Mell, P., Scarfone, K., Romanosky, S.: Common vulnerability scoring system (CVSS) (2011). \n                    http:\/\/www.first.org\/cvss\/cvss-guide.html"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217\u2013224. ACM (2002)","DOI":"10.1145\/586110.586140"}],"container-title":["Communications in Computer and Information Science","Smart City and Informatization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-1301-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T05:32:03Z","timestamp":1572931923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-1301-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811513008","9789811513015"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-1301-5_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iSCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart City and Informatization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isci12019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isci-conf.org\/iSCI2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}