{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T05:44:32Z","timestamp":1770788672039,"version":"3.50.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T00:00:00Z","timestamp":1767571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T00:00:00Z","timestamp":1770076800000},"content-version":"vor","delay-in-days":29,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00279-2","type":"journal-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T12:03:17Z","timestamp":1767614597000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing cybersecurity gaps in medical device procurement using NLP and vulnerability databases"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0297-2617","authenticated-orcid":false,"given":"S.","family":"Pandey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8151-4673","authenticated-orcid":false,"given":"R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,5]]},"reference":[{"key":"279_CR1","unstructured":"Alam MT, Bhusal D, Park Y, Rastogi N. (2022). Cyner: A python library for cybersecurity named entity recognition. ArXiv Preprint arXiv:220405754."},{"issue":"4","key":"279_CR2","doi-asserted-by":"publisher","first-page":"615","DOI":"10.3390\/jcp1040031","volume":"1","author":"K Ameri","year":"2021","unstructured":"Ameri K, Hempel M, Sharif H, Lopez Jr J, Perumalla K. Cybert: cybersecurity claim classification by fine-tuning the Bert Language model. J Cybersecur Priv. 2021;1(4):615\u201337.","journal-title":"J Cybersecur Priv"},{"issue":"2","key":"279_CR3","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1177\/01655515211001661","volume":"49","author":"BS Anderson","year":"2023","unstructured":"Anderson BS. Using text mining to glean insights from COVID-19 literature. J Inform Sci. 2023;49(2):373\u201381.","journal-title":"J Inform Sci"},{"key":"279_CR4","first-page":"24","volume":"13","author":"S Askarifar","year":"2018","unstructured":"Askarifar S, Rahman NAA, Osman H. A review of latest wannacry ransomware: actions and preventions. J Eng Sci Technol. 2018;13:24\u201333.","journal-title":"J Eng Sci Technol"},{"key":"279_CR5","volume-title":"Natural Language processing with python: analyzing text with the natural Language toolkit","author":"S Bird","year":"2009","unstructured":"Bird S, Klein E, Loper E. Natural Language processing with python: analyzing text with the natural Language toolkit. O\u2019Reilly Media, Inc.; 2009."},{"issue":"1","key":"279_CR6","doi-asserted-by":"publisher","first-page":"19509","DOI":"10.1038\/s41598-023-45927-1","volume":"13","author":"L Bracciale","year":"2023","unstructured":"Bracciale L, Loreti P, Bianchi G. Cybersecurity vulnerability analysis of medical devices purchased by National health services. Sci Rep. 2023;13(1):19509.","journal-title":"Sci Rep"},{"issue":"7","key":"279_CR7","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1108\/IJQRM-03-2015-0033","volume":"34","author":"D Carnerud","year":"2017","unstructured":"Carnerud D. Exploring research on quality and reliability management through text mining methodology. Int J Qual Reliab Manage. 2017;34(7):975\u20131014.","journal-title":"Int J Qual Reliab Manage"},{"key":"279_CR8","unstructured":"Chakraborty G, Pagolu M, Garla S. Text mining and analysis: practical methods, examples, and case studies using SAS. SAS Institute; 2014."},{"key":"279_CR9","doi-asserted-by":"crossref","unstructured":"Chen J, Yuan P, Zhou X, Tang X. (2016, October). Performance comparison of TF* IDF, LDA and paragraph vector for document classification. In International Symposium on Knowledge and Systems Sciences (pp. 225\u2013235).","DOI":"10.1007\/978-981-10-2857-1_20"},{"issue":"1","key":"279_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10916-006-7405-0","volume":"30","author":"YB Choi","year":"2006","unstructured":"Choi YB, Capitan KE, Krause JS, Streeper MM. Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J Med Syst. 2006;30(1):57\u201364.","journal-title":"J Med Syst"},{"key":"279_CR11","doi-asserted-by":"publisher","first-page":"126585","DOI":"10.1016\/j.neucom.2023.126585","volume":"554","author":"F Clemente","year":"2023","unstructured":"Clemente F, Ribeiro GM, Quemy A, Santos MS, Pereira RC, Barros A. ydata-profiling: accelerating data-centric AI with high-quality data. Neurocomputing. 2023;554:126585.","journal-title":"Neurocomputing"},{"key":"279_CR12","unstructured":"Cybersecurity and Infrastructure Security Agency. (2023). Advisories. U.S. Department of Homeland Security. https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories"},{"key":"279_CR13","unstructured":"Data Security Council of India. (2023). India cybersecurity domestic market 2023 report. https:\/\/www.dsci.in\/files\/content\/knowledge-centre\/2023\/India%20Cybersecurity%20Domestic%20Market%202023%20Report.pdf"},{"issue":"1","key":"279_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S0263-2373(02)00155-X","volume":"21","author":"A Davila","year":"2003","unstructured":"Davila A, Gupta M, Palmer R. Moving procurement systems to the internet: the adoption and use of e-procurement technology models. Eur Manag J. 2003;21(1):11\u201323.","journal-title":"Eur Manag J"},{"key":"279_CR15","doi-asserted-by":"crossref","unstructured":"Denning T, Borning A, Friedman B, Gill BT, Kohno T, Maisel WH. (2010, April). Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 917\u2013926).","DOI":"10.1145\/1753326.1753462"},{"key":"279_CR16","doi-asserted-by":"publisher","DOI":"10.3389\/fsoc.2022.886498","volume":"7","author":"R Egger","year":"2022","unstructured":"Egger R, Yu J. A topic modeling comparison between lda, nmf, top2vec, and bertopic to demystify twitter posts. Frontiers in sociology. 2022;7:886498.","journal-title":"Frontiers in sociology"},{"issue":"12","key":"279_CR17","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1016\/j.hrcr.2021.11.005","volume":"7","author":"MF El-Chami","year":"2021","unstructured":"El-Chami MF. Cardiac implantable device recalls: consequences, and management. HeartRhythm Case Rep. 2021;7(12):795\u20136.","journal-title":"HeartRhythm Case Rep"},{"issue":"34","key":"279_CR18","first-page":"5","volume":"56","author":"J Fan","year":"2012","unstructured":"Fan J, Kalyanpur A, Gondek DC, Ferrucci DA. Automatic knowledge extraction from documents. IBM J Res Dev. 2012;56(34):5\u20131.","journal-title":"IBM J Res Dev"},{"key":"279_CR19","doi-asserted-by":"crossref","unstructured":"Fayi SYA. (2018). What Petya\/NotPetya ransomware is and what its remediations are. In S. Latifi, editor, Information technology \u2013 new generations (Advances in Intelligent Systems and Computing, Vol. 738, pp. 203\u2013214).","DOI":"10.1007\/978-3-319-77028-4_15"},{"key":"279_CR20","unstructured":"Global Knowledge. (2025). Cybersecurity glossary of terms. OWASP (Open Web Application Security Project). https:\/\/www.globalknowledge.com\/us-en\/topics\/cybersecurity\/glossary-of-terms"},{"issue":"8","key":"279_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17082788","volume":"17","author":"X Han","year":"2020","unstructured":"Han X, Wang J, Zhang M, Wang X. Using social media to mine and analyze public opinion related to COVID-19 in China. Int J Environ Res Public Health. 2020;17(8):2788.","journal-title":"Int J Environ Res Public Health"},{"key":"279_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102552","volume":"66","author":"V Hassija","year":"2021","unstructured":"Hassija V, Chamola V, Bajpai BC, Zeadally S. Security issues in implantable medical devices: fact or fiction? Sustain Cities Soc. 2021;66:102552.","journal-title":"Sustain Cities Soc"},{"issue":"03","key":"279_CR23","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter JD. Matplotlib: a 2D graphics environment. Comput Sci Eng. 2007;9(03):90\u20135.","journal-title":"Comput Sci Eng"},{"key":"279_CR24","doi-asserted-by":"publisher","first-page":"860536","DOI":"10.3389\/fpubh.2022.860536","volume":"10","author":"I Khurshid","year":"2022","unstructured":"Khurshid I, Imtiaz S, Boulila W, Khan Z, Abbasi A, Javed AR, Jalil Z. Classification of non-functional requirements from Iot oriented healthcare requirement document. Front Public Health. 2022;10:860536.","journal-title":"Front Public Health"},{"issue":"5","key":"279_CR25","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1177\/1932296819865655","volume":"13","author":"D Klonoff","year":"2019","unstructured":"Klonoff D, Han J. The first recall of a diabetes device because of cybersecurity risks. J Diabetes Sci Technol. 2019;13(5):817\u201320.","journal-title":"J Diabetes Sci Technol"},{"key":"279_CR26","unstructured":"Li C, Raghunathan A, Jha NK. (2011, June). Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system. In 2011 IEEE 13th international conference on e-health networking, applications and services (pp. 150\u2013156)."},{"key":"279_CR27","doi-asserted-by":"publisher","first-page":"S86","DOI":"10.1016\/j.jbi.2011.11.001","volume":"44","author":"S Luther","year":"2011","unstructured":"Luther S, Berndt D, Finch D, Richardson M, Hickling E, Hickam D. Using statistical text mining to supplement the development of an ontology. J Biomed Inform. 2011;44:S86\u201393.","journal-title":"J Biomed Inform"},{"issue":"2","key":"279_CR28","doi-asserted-by":"publisher","first-page":"68","DOI":"10.56578\/ataiml010201","volume":"1","author":"PM Mah","year":"2022","unstructured":"Mah PM. Analysis of artificial intelligence and natural language processing significance as expert systems support for e-health using pre-train deep learning models. Acadlore Trans AI Mach Learn. 2022;1(2):68\u201380.","journal-title":"Acadlore Trans AI Mach Learn"},{"key":"279_CR29","doi-asserted-by":"crossref","unstructured":"Marin E, Singel\u00e9e D, Garcia FD, Chothia T, Willems R, Preneel B. (2016, December). On the (in) security of the latest generation implantable cardiac defibrillators and how to secure them. In Proceedings of the 32nd annual conference on computer security applications (pp. 226\u2013236).","DOI":"10.1145\/2991079.2991094"},{"key":"279_CR30","doi-asserted-by":"crossref","unstructured":"Marin E, Singel\u00e9e D, Yang B, Verbauwhede I, Preneel B. (2016, March). On the feasibility of cryptography for a wireless insulin pump system. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy (pp. 113\u2013120).","DOI":"10.1145\/2857705.2857746"},{"issue":"1","key":"279_CR31","first-page":"51","volume":"445","author":"W McKinney","year":"2010","unstructured":"McKinney W. Data structures for statistical computing in Python. scipy. 2010;445(1):51\u20136.","journal-title":"scipy"},{"key":"279_CR32","unstructured":"mrcodeScholar. (2025). Cybersecurity of health care devices [Computer software]. GitHub. https:\/\/github.com\/mrcodeScholar\/Cybersecurity-of-Health-care-devices"},{"key":"279_CR33","doi-asserted-by":"crossref","unstructured":"Navarro-Almanza R, Ju\u00e1rez-Ram\u00edrez R, Licea G, Castro JR. (2020). Automated ontology extraction from unstructured texts using deep learning. In Intuitionistic and Type-2 fuzzy logic enhancements in neural and optimization algorithms: Theory and applications (pp. 727\u2013755).","DOI":"10.1007\/978-3-030-35445-9_50"},{"key":"279_CR34","doi-asserted-by":"crossref","unstructured":"Pani AK, Agrahari A, editors. E-Procurement in emerging economies: theory and cases: theory and cases. Igi Global; 2007.","DOI":"10.4018\/978-1-59904-153-7"},{"key":"279_CR35","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay \u00c9. Scikit-learn: machine learning in python. J Mach Learn Res. 2011;12:2825\u201330.","journal-title":"J Mach Learn Res"},{"key":"279_CR36","unstructured":"Python Software Foundation. (2025). Python language reference (Version 3.12.3). https:\/\/www.python.org"},{"issue":"1","key":"279_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph18010334","volume":"18","author":"A Raghavan","year":"2021","unstructured":"Raghavan A, Demircioglu MA, Taeihagh A. Public health innovation through cloud adoption: a comparative analysis of drivers and barriers in Japan, South Korea, and Singapore. Int J Environ Res Public Health. 2021;18(1):334.","journal-title":"Int J Environ Res Public Health"},{"key":"279_CR38","unstructured":"Reitz K, Choi T. (2024). Requests: HTTP for humans. Python Package Index. https:\/\/docs.python-requests.org\/"},{"key":"279_CR39","unstructured":"Richardson L. (2024). Beautiful Soup documentation. Crummy.com. https:\/\/www.crummy.com\/software\/BeautifulSoup\/"},{"issue":"2","key":"279_CR40","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.pursup.2010.03.013","volume":"16","author":"S Ronchi","year":"2010","unstructured":"Ronchi S, Brun A, Golini R, Fan X. What is the value of an IT e-procurement system? J Purch Supply Manag. 2010;16(2):131\u201340.","journal-title":"J Purch Supply Manag"},{"key":"279_CR41","unstructured":"Segall RS, Zhang Q, Cao M. (2009). Web-based text mining of hotel customer comments using SAS\u00ae text miner and megaputer polyanalyst\u00ae. SWDSI 2009, 141\u2013152."},{"issue":"12","key":"279_CR42","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1016\/j.healthpol.2022.09.012","volume":"126","author":"K Shatrov","year":"2022","unstructured":"Shatrov K, Blankart CR. After the four-year transition period: is the European union\u2019s medical device regulation of 2017 likely to achieve its main goals? Health Policy. 2022;126(12):1233\u201340.","journal-title":"Health Policy"},{"issue":"6","key":"279_CR43","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2018-025374","volume":"9","author":"AD Stern","year":"2019","unstructured":"Stern AD, Gordon WJ, Landman AB, Kramer DB. Cybersecurity features of digital medical devices: an analysis of FDA product summaries. BMJ Open. 2019;9(6):e025374.","journal-title":"BMJ Open"},{"issue":"4","key":"279_CR44","doi-asserted-by":"publisher","first-page":"797","DOI":"10.2214\/AJR.15.15283","volume":"206","author":"M Stites","year":"2016","unstructured":"Stites M, Pianykh OS. How secure is your radiology department? Mapping digital radiology adoption and security worldwide. AJR Am J Roentgenol. 2016;206(4):797\u2013804.","journal-title":"AJR Am J Roentgenol"},{"issue":"2","key":"279_CR45","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TEM.2009.2033046","volume":"57","author":"P Trkman","year":"2009","unstructured":"Trkman P, McCormack K. Estimating the benefits and risks of implementing e-procurement. IEEE Trans Eng Manag. 2009;57(2):338\u201349.","journal-title":"IEEE Trans Eng Manag"},{"issue":"2","key":"279_CR46","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCSE.2011.37","volume":"13","author":"S Van Der Walt","year":"2011","unstructured":"Van Der Walt S, Colbert SC, Varoquaux G. The NumPy array: a structure for efficient numerical computation. Comput Sci Eng. 2011;13(2):22\u201330.","journal-title":"Comput Sci Eng"},{"key":"279_CR47","volume-title":"Natural language processing with Python and spaCy: A practical introduction","author":"Y Vasiliev","year":"2020","unstructured":"Vasiliev Y. Natural language processing with Python and spaCy: A practical introduction. No Starch Press; 2020."},{"issue":"60","key":"279_CR48","doi-asserted-by":"publisher","DOI":"10.21105\/joss.03021","volume":"6","author":"ML Waskom","year":"2021","unstructured":"Waskom ML. Seaborn: statistical data visualization. J Open Source Softw. 2021;6(60):3021.","journal-title":"J Open Source Softw"},{"key":"279_CR49","unstructured":"Wells N. FDA regulation of cosmetics and personal care products under the modernization of cosmetics regulation act of 2022 (MoCRA). Congressional research service (CRS) reports and issue briefs. NA-NA; 2023."},{"key":"279_CR50","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.datak.2017.06.006","volume":"111","author":"Y Zhu","year":"2017","unstructured":"Zhu Y, Yan E, Song IY. A natural language interface to a graph-based bibliographic information retrieval system. Data Knowl Eng. 2017;111:73\u201389.","journal-title":"Data Knowl Eng"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00279-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00279-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00279-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T12:38:10Z","timestamp":1770122290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00279-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,5]]},"references-count":50,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["279"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00279-2","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,5]]},"assertion":[{"value":"21 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}