{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:29:00Z","timestamp":1771064940069,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819759361","type":"print"},{"value":"9789819759378","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5937-8_28","type":"book-chapter","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:02:36Z","timestamp":1723449756000},"page":"337-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Penetration Testing and\u00a0Security Assessment Methodology for\u00a0Biomedical Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9704-7110","authenticated-orcid":false,"given":"Maciej","family":"Kisielewicz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7764-1303","authenticated-orcid":false,"given":"Michal","family":"Kedziora","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2160-7077","authenticated-orcid":false,"given":"Ireneusz","family":"Jozwiak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"key":"28_CR1","unstructured":"Brightinsight platform. https:\/\/brightinsight.com\/brightinsight-platform. Accessed Nov 13 2022"},{"key":"28_CR2","unstructured":"Cybersecurity spending in medical device sector. https:\/\/www.globaldata.com\/media\/medical-devices\/cybersecurity-spending-medical-device-sector-will-reach-1-2-billion-2025-driven-escalating-health-data-breaches-says-globaldata\/. Accessed 24 Oct 2022"},{"key":"28_CR3","unstructured":"Healthcare cybersecurity report 2021-2022. https:\/\/www.herjavecgroup.com\/cybersecurity-healthcare-report-2021\/. Accessed 25 Oct 2022"},{"key":"28_CR4","unstructured":"Medtronic urgent medical device correction. https:\/\/www.medtronicdiabetes.com\/customer-support\/product-and-service-updates\/notice19-letter. Accessed 24 Oct 2022"},{"key":"28_CR5","unstructured":"Philips healthsuite. https:\/\/www.usa.philips.com\/healthcare\/innovation\/about-health-suite. Accessed 13 Nov 2022"},{"key":"28_CR6","unstructured":"Shared responsibility in the cloud. https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/shared-responsibility. Accessed 11 Nov 2022"},{"key":"28_CR7","unstructured":"WHO - medical device definition. https:\/\/www.who.int\/health-topics\/medical-devices. Accessed 24 Oct 2022"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Bour, G., Moe, M.E.G., Borgaonkar, R.: Experimental security analysis of connected pacemakers. In: BIODEVICES, pp. 35\u201345 (2022)","DOI":"10.5220\/0010816900003123"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Gruda, M., Kedziora, M.: Analyzing and improving tools for supporting fighting against Covid-19 based on prediction models and contact tracing. Bull. Polish Acad. Sci.: Tech. Sci. e137414\u2013e137414 (2021)","DOI":"10.24425\/bpasts.2021.137414"},{"issue":"2","key":"28_CR10","doi-asserted-by":"publisher","DOI":"10.2196\/12644","volume":"21","author":"MS Jalali","year":"2019","unstructured":"Jalali, M.S., Razak, S., Gordon, W., Perakslis, E., Madnick, S.: Health care and cybersecurity: bibliometric analysis of the literature. J. Med. Internet Res. 21(2), e12644 (2019)","journal-title":"J. Med. Internet Res."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Kesavadev, J., Srinivasan, S., Saboo, B., Krishna\u00a0B, M., Krishnan, G., et\u00a0al.: The do-it-yourself artificial pancreas: a comprehensive review. Diabetes Therap. 11(6), 1217\u20131235 (2020)","DOI":"10.1007\/s13300-020-00823-z"},{"issue":"2","key":"28_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1177\/1932296816677576","volume":"11","author":"M Khera","year":"2017","unstructured":"Khera, M.: Think like a hacker: insights on the latest attack vectors (and security controls) for medical device applications. J. Diabetes Sci. Technol. 11(2), 207\u2013212 (2017)","journal-title":"J. Diabetes Sci. Technol."},{"key":"28_CR13","doi-asserted-by":"publisher","unstructured":"Krolik, L., Kedziora, M., Mizera-Pietraszko, J., Jozwiak, I.: Detecting attacks on computer networks using artificial intelligence algorithms. In: Proceedings of the 14th International Conference on Management of Digital EcoSystems, pp. 110\u2013114. MEDES \u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3508397.3564830","DOI":"10.1145\/3508397.3564830"},{"key":"28_CR14","unstructured":"Madden, N.: API security in action. Manning Publications (2020)"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Newaz, A.I., Sikder, A.K., Babun, L., Uluagac, A.S.: Heka: A novel intrusion detection system for attacks to personal medical devices. In: 2020 IEEE Conference on Communications and Network Security (CNS), pp.\u00a01\u20139. IEEE (2020)","DOI":"10.1109\/CNS48642.2020.9162311"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MS.2017.4541031","volume":"35","author":"A Rao","year":"2017","unstructured":"Rao, A., Carre\u00f3n, N., Lysecky, R., Rozenblit, J.: Probabilistic threat detection for risk management in cyber-physical medical systems. IEEE Softw. 35(1), 38\u201343 (2017)","journal-title":"IEEE Softw."},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Riegler, M., Sametinger, J., Rozenblit, J.W.: Context-aware security modes for medical devices. In: 2022 Annual Modeling and Simulation Conference (ANNSIM), pp. 372\u2013382. IEEE (2022)","DOI":"10.23919\/ANNSIM55834.2022.9859283"},{"issue":"4","key":"28_CR18","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2667218","volume":"58","author":"J Sametinger","year":"2015","unstructured":"Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74\u201382 (2015)","journal-title":"Commun. ACM"},{"key":"28_CR19","unstructured":"for Standardization, I.O.: ISO\/IEC 25010:2011, systems and software engineering - systems and software quality requirements and evaluation (SQuaRE) - system and software quality models. Tech. rep., ISO (2011)"},{"key":"28_CR20","unstructured":"Wong, H., Luo, T.: Man-in-the-middle attacks on mqtt-based iot using bert based adversarial message generation. In: KDD 2020 AIoT Workshop (2020)"},{"issue":"4","key":"28_CR21","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/COMST.2019.2914094","volume":"21","author":"T Yaqoob","year":"2019","unstructured":"Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutorials 21(4), 3723\u20133768 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Communications in Computer and Information Science","Recent Challenges in Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5937-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:10:24Z","timestamp":1723450224000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5937-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819759361","9789819759378"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5937-8_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ras Al Khaimah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2024\/index.php#about","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}