{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T02:33:47Z","timestamp":1777948427021,"version":"3.51.4"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T00:00:00Z","timestamp":1520640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T00:00:00Z","timestamp":1520640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s10916-018-0921-x","type":"journal-article","created":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T05:44:52Z","timestamp":1520660692000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":196,"title":["Medical cyber-physical systems: A survey"],"prefix":"10.1007","volume":"42","author":[{"given":"Nilanjan","family":"Dey","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3217-6185","authenticated-orcid":false,"given":"Amira S.","family":"Ashour","sequence":"additional","affiliation":[]},{"given":"Fuqian","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Simon James","family":"Fong","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o Manuel R. S.","family":"Tavares","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"921_CR1","unstructured":"Voit H (2013) An Arbitrated Networked Control Systems Approach to Cyber-Physical Systems (PhD Thesis), M\u00fcnchen, Technische Universit\u00e4t M\u00fcnchen, Diss."},{"issue":"3","key":"921_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1111\/j.1540-5414.2006.00132.x","volume":"37","author":"MY Yi","year":"2006","unstructured":"Yi, M. Y., Fiedler, K. D., and Park, J. S., Understanding the role of individual innovativeness in the acceptance of it-based innovations: Comparative analyses of models and measures. Decis. Sci. 37(3):393\u2013426, 2006.","journal-title":"Decis. Sci."},{"key":"921_CR3","doi-asserted-by":"crossref","unstructured":"Raghupathi W, Raghupathi V, Big data analytics in healthcare: promise and potential. Health Information Science and Systems 2(1), 2014.","DOI":"10.1186\/2047-2501-2-3"},{"issue":"4","key":"921_CR4","doi-asserted-by":"publisher","first-page":"217415","DOI":"10.1155\/2014\/217415","volume":"10","author":"SA Haque","year":"2014","unstructured":"Haque, S. A., Aziz, S. M., and Rahman, M., Review of cyber-physical system in healthcare. Int. J. Distrib Sensor Netw. 10(4):217415, 2014.","journal-title":"Int. J. Distrib Sensor Netw."},{"key":"921_CR5","doi-asserted-by":"crossref","unstructured":"Hu L, Xie N, Kuang Z, Zhao K. Review of cyber-physical system architecture. InObject\/Component\/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW), 15th IEEE International Symposium. IEEE. 25\u201330, 2012.","DOI":"10.1109\/ISORCW.2012.15"},{"key":"921_CR6","unstructured":"Li T. On coordination of cyber-physical systems (Doctoral dissertation, The Hong Kong Polytechnic University)."},{"issue":"7","key":"921_CR7","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.tics.2013.04.010","volume":"17","author":"A Baronchelli","year":"2013","unstructured":"Baronchelli, A., Ferrer-i-Cancho, R., Pastor-Satorras, R., Chater, N., and Christiansen, M. H., Networks in cognitive science. Trends Cogn. Sci. 17(7):348\u2013360, 2013.","journal-title":"Trends Cogn. Sci."},{"issue":"4","key":"921_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MIS.2011.69","volume":"26","author":"Z Liu","year":"2011","unstructured":"Liu, Z., Yang, D. S., Wen, D., Zhang, W. M., and Mao, W., Cyber-physical-social systems for command and control. IEEE Intell. Syst. 26(4):92\u201396, 2011.","journal-title":"IEEE Intell. Syst."},{"key":"921_CR9","doi-asserted-by":"crossref","unstructured":"Rajkumar RR, Lee I, Sha L, Stankovic J. Cyber-physical systems: the next computing revolution. In Proceedings of the 47th Design Automation Conference. ACM. 731\u2013736, 2010.","DOI":"10.1145\/1837274.1837461"},{"issue":"7","key":"921_CR10","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M., Internet of Things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7):1645\u20131660, 2013.","journal-title":"Futur. Gener. Comput. Syst."},{"key":"921_CR11","doi-asserted-by":"crossref","unstructured":"Alam S, Chowdhury MM, Noll J. Senaas: An event-driven sensor virtualization approach for internet of things cloud. InNetworked Embedded Systems for Enterprise Applications (NESEA). IEEE International Conference. IEEE. 1\u20136, 2010.","DOI":"10.1109\/NESEA.2010.5678060"},{"issue":"12","key":"921_CR12","doi-asserted-by":"publisher","first-page":"10837","DOI":"10.3390\/s101210837","volume":"10","author":"T Yilmaz","year":"2010","unstructured":"Yilmaz, T., Foster, R., and Hao, Y., Detecting vital signs with wearable wireless sensors. Sensors 10(12):10837\u201310862, 2010.","journal-title":"Sensors"},{"key":"921_CR13","doi-asserted-by":"crossref","unstructured":"Lee EA. Cyber physical systems: Design challenges. InObject oriented real-time distributed computing (isorc), 2008 11th ieee international symposium. . IEEE. 363\u2013369, 2008.","DOI":"10.1109\/ISORC.2008.25"},{"issue":"8","key":"921_CR14","doi-asserted-by":"publisher","first-page":"1834","DOI":"10.1109\/JPROC.2012.2235131","volume":"101","author":"K Sampigethaya","year":"2013","unstructured":"Sampigethaya, K., and Poovendran, R., Aviation cyber\u2013physical systems: Foundations for future aircraft and air transport. Proc. IEEE 101(8):1834\u20131855, 2013.","journal-title":"Proc. IEEE"},{"key":"921_CR15","unstructured":"Neuman C. Challenges in security for cyber-physical systems. In DHS Workshop on Future Directions in Cyber-Physical Systems Security. 22\u201324, 2009."},{"key":"921_CR16","first-page":"161","volume":"12","author":"R Baheti","year":"2011","unstructured":"Baheti, R., and Gill, H., Cyber-physical systems. Impact Control Technol. 12:161\u2013166, 2011.","journal-title":"Impact Control Technol."},{"issue":"1\u20132","key":"921_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJCC.2016.075101","volume":"5","author":"I Kocsis","year":"2016","unstructured":"Kocsis, I., T\u00f3th, \u00c1. R., Szatm\u00e1ri, Z., Dab\u00f3czi, T., Pataricza, A., and Guta, G., Towards cyber-physical system technologies over Apache VCL. Int. J. Cloud Comput. 5(1\u20132):91\u2013111, 2016.","journal-title":"Int. J. Cloud Comput."},{"issue":"3","key":"921_CR18","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.2298\/CSIS120326018W","volume":"10","author":"J Wan","year":"2013","unstructured":"Wan, J., Chen, M., Xia, F., Di, L., and Zhou, K., From machine-to-machine communications towards cyber-physical systems. Comput. Sc. Inform. Syst. 10(3):1105\u20131128, 2013.","journal-title":"Comput. Sc. Inform. Syst."},{"key":"921_CR19","doi-asserted-by":"crossref","unstructured":"Zhuge H. The Knowledge Grid: Toward Cyber-Physical Society. World Scientific, 2012.","DOI":"10.1142\/7567"},{"key":"921_CR20","unstructured":"Horvath I. Beyond advanced mechatronics: new design challenges of Social-Cyber-Physical systems. InProceedings of the 1st Workshop on Mechatronic Design, Linz (Austria). ACCM Austrian Center of Competence in Mechatronics. 2012."},{"key":"921_CR21","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-94-009-2442-0_22","volume":"31","author":"MZ Caplan","year":"1989","unstructured":"Caplan, M. Z., and Weissberg, R. P., Promoting social competence in early adolescence: Developmental considerations. Soc. Compet. Dev. Persp. 31:371\u2013385, 1989.","journal-title":"Soc. Compet. Dev. Persp."},{"issue":"1","key":"921_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1089\/tmj.2009.0153","volume":"16","author":"MJ Ackerman","year":"2010","unstructured":"Ackerman, M. J., Filart, R., Burgess, L. P., Lee, I., and Poropatich, R. K., Developing next-generation telehealth tools and technologies: patients, systems, and data perspectives. Telemed. e-Health. 16(1):93\u201395, 2010.","journal-title":"Telemed. e-Health."},{"key":"921_CR23","doi-asserted-by":"crossref","unstructured":"Arney D, Pajic M, Goldman JM, Lee I, Mangharam R, Sokolsky O. Toward patient safety in closed-loop medical device systems. InProceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems. ACM. 139\u2013148, 2010.","DOI":"10.1145\/1795194.1795214"},{"key":"921_CR24","doi-asserted-by":"crossref","unstructured":"Qian, L., Luo, Z., Du, Y., and Guo, L., Cloud computing: An overview. Cloud Comput.:626\u2013631, 2009.","DOI":"10.1007\/978-3-642-10665-1_63"},{"issue":"2","key":"921_CR25","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/030919000409311","volume":"24","author":"K Alexander","year":"2000","unstructured":"Alexander, K., and Clarkson, P. J., Good design practice for medical devices and equipment, Part II: design for validation. J. Med. Eng. Technol. 24(2):53\u201362, 2000.","journal-title":"J. Med. Eng. Technol."},{"key":"921_CR26","first-page":"388","volume":"7","author":"S Goswami","year":"2016","unstructured":"Goswami, S., Roy, P., Dey, N., and Chakraborty, S., Wireless body area networks combined with mobile cloud computing in healthcare: a survey. Class. Clust. Biomed. Sign. Proc. 7:388, 2016.","journal-title":"Class. Clust. Biomed. Sign. Proc."},{"key":"921_CR27","doi-asserted-by":"crossref","unstructured":"Lee I, Sokolsky O. Medical cyber physical systems. InDesign Automation Conference (DAC), 2010 47th ACM\/IEEE. IEEE. 743\u2013748, 2010.","DOI":"10.1145\/1837274.1837463"},{"issue":"13","key":"921_CR28","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1016\/j.comcom.2006.02.011","volume":"29","author":"A Milenkovi\u0107","year":"2006","unstructured":"Milenkovi\u0107, A., Otto, C., and Jovanov, E., Wireless sensor networks for personal health monitoring: Issues and an implementation. Comput. Commun. 29(13):2521\u20132533, 2006.","journal-title":"Comput. Commun."},{"issue":"1","key":"921_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TPDS.2013.30","volume":"25","author":"G Hackmann","year":"2014","unstructured":"Hackmann, G., Guo, W., Yan, G., Sun, Z., Lu, C., and Dyke, S., Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(1):63\u201372, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"921_CR30","unstructured":"Wang J, Abid H, Lee S, Shu L, Xia F. A secured health care application architecture for cyber-physical systems. arXiv preprint arXiv:1201.0213. 2011."},{"key":"921_CR31","doi-asserted-by":"crossref","unstructured":"Banerjee A, Gupta SK, Fainekos G, Varsamopoulos G. Towards modeling and analysis of cyber-physical medical systems. InProceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies. ACM. 154, 2011.","DOI":"10.1145\/2093698.2093852"},{"issue":"4","key":"921_CR32","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.pmcj.2011.03.003","volume":"7","author":"FJ Wu","year":"2011","unstructured":"Wu, F. J., Kao, Y. F., and Tseng, Y. C., From wireless sensor networks towards cyber physical systems. Pervasive Mob. Comput. 7(4):397\u2013413, 2011.","journal-title":"Pervasive Mob. Comput."},{"key":"921_CR33","doi-asserted-by":"crossref","unstructured":"Taleb T, Bottazzi D, Guizani M, Nait-Charif H. Angelah: a framework for assisting elders at home. IEEE Journal on Selected Areas in Communications. 27(4), 2009.","DOI":"10.1109\/JSAC.2009.090511"},{"issue":"1","key":"921_CR34","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JPROC.2011.2165270","volume":"100","author":"I Lee","year":"2012","unstructured":"Lee, I., Sokolsky, O., Chen, S., Hatcliff, J., Jee, E., Kim, B., King, A., Mullen-Fortino, M., Park, S., Roederer, A., and Venkatasubramanian, K. K., Challenges and research directions in medical cyber\u2013physical systems. Proc. IEEE 100(1):75\u201390, 2012.","journal-title":"Proc. IEEE"},{"key":"921_CR35","unstructured":"Kammer D, Lunsford EM, inventors; Palmsource, Inc., assignee. Power-conserving intuitive device discovery technique in a bluetooth environment. United States patent US 6,950,645. 2005."},{"key":"921_CR36","first-page":"1","volume":"1","author":"RC Fox","year":"1980","unstructured":"Fox, R. C., The evolution of medical uncertainty. The Milbank Memorial Fund Quarterly. Health Soc. 1:1\u201349, 1980.","journal-title":"Health Soc."},{"issue":"7272","key":"921_CR37","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1038\/nature08601","volume":"462","author":"N Huebsch","year":"2009","unstructured":"Huebsch, N., and Mooney, D. J., Inspiration and application in the evolution of biomaterials. Nature 462(7272):426\u2013432, 2009.","journal-title":"Nature"},{"issue":"4","key":"921_CR38","first-page":"71","volume":"4","author":"SA Idowu","year":"2015","unstructured":"Idowu, S. A., Omotosho, O. J., Ojesanmi, O. A., and Maitanmi, S. O., Cyber-Physical Systems: A Framework for Prediction of Error in Smart Medical Devices. Am. J. Soft. Eng. Appl. 4(4):71\u201379, 2015.","journal-title":"Am. J. Soft. Eng. Appl."},{"issue":"2","key":"921_CR39","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/MAP.2002.1003651","volume":"44","author":"CS Pattichis","year":"2002","unstructured":"Pattichis, C. S., Kyriacou, E., Voskarides, S., Pattichis, M. S., Istepanian, R., and Schizas, C. N., Wireless telemedicine systems: an overview. IEEE Ant. Propagation Mag. 44(2):143\u2013153, 2002 Apr.","journal-title":"IEEE Ant. Propagation Mag."},{"issue":"1","key":"921_CR40","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/89.817450","volume":"8","author":"E Levin","year":"2000","unstructured":"Levin, E., Pieraccini, R., and Eckert, W., A stochastic model of human-machine interaction for learning dialog strategies. IEEE Trans Speech Audio Proc. 8(1):11\u201323, 2000.","journal-title":"IEEE Trans Speech Audio Proc."},{"issue":"1","key":"921_CR41","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/JPROC.2011.2161241","volume":"100","author":"Z Jiang","year":"2012","unstructured":"Jiang, Z., Pajic, M., and Mangharam, R., Cyber\u2013physical modeling of implantable cardiac medical devices. Proc. IEEE 100(1):122\u2013137, 2012.","journal-title":"Proc. IEEE"},{"issue":"4","key":"921_CR42","first-page":"307","volume":"1","author":"C Otto","year":"2006","unstructured":"Otto, C., Milenkovic, A., Sanders, C., and Jovanov, E., System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob Mult. 1(4):307\u2013326, 2006.","journal-title":"J. Mob Mult."},{"issue":"4","key":"921_CR43","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TCSS.2016.2627811","volume":"3","author":"GA Tong","year":"2016","unstructured":"Tong, G. A., Li, S., Wu, W., and Du, D. Z., Effector Detection in Social Networks. IEEE Trans. Comput. Soc. Syst. 3(4):151\u2013163, 2016.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"3","key":"921_CR44","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/TCSS.2016.2618998","volume":"3","author":"M Nasim","year":"2016","unstructured":"Nasim, M., Charbey, R., Prieur, C., and Brandes, U., Investigating Link Inference in Partially Observable Networks: Friendship Ties and Interaction. IEEE Trans. Comput. Soc. Syst. 3(3):113\u2013119, 2016.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"921_CR45","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TCSS.2014.2307438","volume":"1","author":"E Shmueli","year":"2014","unstructured":"Shmueli, E., Singh, V. K., Lepri, B., and Pentland, A., Sensing, understanding, and shaping social behavior. IEEE Trans. Comput. Soc. Syst. 1(1):22\u201334, 2014.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"2","key":"921_CR46","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/TCSS.2016.2613563","volume":"3","author":"A Farasat","year":"2016","unstructured":"Farasat, A., Gross, G., Nagi, R., and Nikolaev, A. G., Social network analysis with data fusion. IEEE Trans. Comput. Soc. Syst. 3(2):88\u201399, 2016.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"921_CR47","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TCSS.2014.2307451","volume":"1","author":"JD Guzman","year":"2014","unstructured":"Guzman, J. D., Deckro, R. F., Robbins, M. J., Morris, J. F., and Ballester, N. A., An analytical comparison of social network measures. IEEE Trans. Comput. Soc. Syst. 1(1):35\u201345, 2014.","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"921_CR48","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJACI.2018010102","volume":"9","author":"M Yamin","year":"2018","unstructured":"Yamin, M., and Sen, A. A., Improving Privacy and Security of User Data in Location Based Services. In. J. Ambient Comput. Intel. (IJACI). 9(1):19\u201342, 2018.","journal-title":"In. J. Ambient Comput. Intel. (IJACI)."},{"issue":"1","key":"921_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJACI.2017010101","volume":"8","author":"K Belgharb","year":"2017","unstructured":"Belgharb, K., and Boufaida, M., Using Event B to Specify Context Awareness for Service Discovery in Pervasive Environments. In. J. Ambient Comput. Intel. (IJACI). 8(1):1\u201322, 2017.","journal-title":"In. J. Ambient Comput. Intel. (IJACI)."},{"issue":"2","key":"921_CR50","doi-asserted-by":"publisher","first-page":"78","DOI":"10.4018\/IJSE.2016070105","volume":"7","author":"AP Sawlikar","year":"2016","unstructured":"Sawlikar, A. P., Khan, Z. J., and Akojwar, S. G., Efficient energy saving cryptographic techniques with software solution in wireless network. Int. J. Synth. Emotions (IJSE). 7(2):78\u201396, 2016.","journal-title":"Int. J. Synth. Emotions (IJSE)."},{"issue":"2","key":"921_CR51","doi-asserted-by":"publisher","first-page":"62","DOI":"10.4018\/IJSE.2017070105","volume":"8","author":"N Athavale","year":"2017","unstructured":"Athavale, N., Deshpande, S., Chaudhary, V., Chavan, J., and Barde, S. S., Framework for Threat Analysis and Attack Modelling of Network Security Protocols. Int. J. Synth. Emotions (IJSE). 8(2):62\u201375, 2017.","journal-title":"Int. J. Synth. Emotions (IJSE)."},{"issue":"2","key":"921_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJACI.2017040101","volume":"8","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Qi, Q., and Deng, J., Building Intelligent Transportation Cloud Data Center Based on SOA. In. J. Ambient Comput. Intel. (IJACI). 8(2):1\u20131, 2017.","journal-title":"In. J. Ambient Comput. Intel. (IJACI)."},{"issue":"4","key":"921_CR53","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJACI.2017100102","volume":"8","author":"A Jain","year":"2017","unstructured":"Jain, A., and Bhatnagar, V., Concoction of Ambient Intelligence and Big Data for Better Patient Ministration Services. In. J. Ambient Comput. Intel. (IJACI). 8(4):19\u201330, 2017.","journal-title":"In. J. Ambient Comput. Intel. (IJACI)."},{"key":"921_CR54","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Chatterjee S, Dey N, Ashour AS, Hassanien AE. Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. InIntelligent techniques in signal processing for multimedia security. Springer, Cham. 133\u2013149, 2017.","DOI":"10.1007\/978-3-319-44790-2_7"},{"key":"921_CR55","doi-asserted-by":"crossref","unstructured":"Rajeswari P, Raju SV, Ashour AS, Dey N. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing. InIntelligent techniques in signal processing for multimedia security. . Springer, Cham. 469\u2013485, 2017.","DOI":"10.1007\/978-3-319-44790-2_21"},{"issue":"1","key":"921_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJACI.2018010101","volume":"9","author":"D Koukopoulos","year":"2018","unstructured":"Koukopoulos, D., and Koukoulis, K., A Trustworthy System with Mobile Services Facilitating the Everyday Life of a Museum. In. J. Ambient Comput. Intel. (IJACI). 9(1):1\u20138, 2018.","journal-title":"In. J. Ambient Comput. Intel. (IJACI)."},{"key":"921_CR57","doi-asserted-by":"crossref","unstructured":"Roy P, Patra N, Mukherjee A, Ashour AS, Dey N, Biswas SP. Intelligent traffic monitoring system through auto and manual controlling using PC and Android Application. InApplied video processing in surveillance and monitoring systems. IGI Global. 244\u2013262, 2017.","DOI":"10.4018\/978-1-5225-1022-2.ch011"},{"issue":"1","key":"921_CR58","doi-asserted-by":"publisher","first-page":"27","DOI":"10.14311\/NNW.2017.27.002","volume":"27","author":"S Kamal","year":"2017","unstructured":"Kamal, S., Dey, N., Ashour, A. S., Ripon, S., Balas, V. E., and Kaysar, M. S., FbMapping: An automated system for monitoring Facebook data. Neural Netw. World. 27(1):27, 2017.","journal-title":"Neural Netw. World."},{"issue":"5","key":"921_CR59","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1109\/JSEN.2016.2641501","volume":"17","author":"D Wang","year":"2017","unstructured":"Wang, D., Li, Z., Cao, L., Balas, V. E., Dey, N., Ashour, A. S., McCauley, P., Dimitra, S. P., and Shi, F., Image fusion incorporating parameter estimation optimized Gaussian mixture model and fuzzy weighted evaluation system: A case study in time-series plantar pressure data set. IEEE Sensors J. 17(5):1407\u20131420, 2017.","journal-title":"IEEE Sensors J."},{"issue":"3","key":"921_CR60","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1166\/jmihi.2017.2082","volume":"7","author":"Z Li","year":"2017","unstructured":"Li, Z., Dey, N., Ashour, A. S., Cao, L., Wang, Y., Wang, D., McCauley, P., Balas, V. E., Shi, K., and Shi, F., Convolutional Neural Network Based Clustering and Manifold Learning Method for Diabetic Plantar Pressure Imaging Dataset. J. Med. Imaging Health Inform. 7(3):639\u2013652, 2017.","journal-title":"J. Med. Imaging Health Inform."},{"key":"921_CR61","doi-asserted-by":"crossref","unstructured":"Wang C, Li Z, Dey N, Ashour A, Fong S, Sherratt RS, Wu L, Shi F. Histogram of oriented gradient based plantar pressure image feature extraction and classification employing fuzzy support vector machine. Journal of Medical Imaging and Health Informatics. 2017.","DOI":"10.1166\/jmihi.2018.2310"},{"issue":"1","key":"921_CR62","first-page":"59","volume":"9","author":"MS Kamal","year":"2017","unstructured":"Kamal, M. S., Parvin, S., Ashour, A. S., Shi, F., and Dey, N., De-Bruijn graph with MapReduce framework towards metagenomic data classification. Int. J. Inf. Technol. 9(1):59\u201375, 2017.","journal-title":"Int. J. Inf. Technol."},{"issue":"4","key":"921_CR63","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s00521-016-2513-3","volume":"29","author":"S Kamal","year":"2018","unstructured":"Kamal, S., Dey, N., Nimmy, S. F., Ripon, S. H., Ali, N. Y., Ashour, A. S., Karaa, W. B., Nguyen, G. N., and Shi, F., Evolutionary framework for coding area selection from cancer data. Neural Comput. & Applic. 29(4):1015\u20131037, 2018.","journal-title":"Neural Comput. & Applic."},{"key":"921_CR64","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.compbiolchem.2017.04.003","volume":"68","author":"MS Kamal","year":"2017","unstructured":"Kamal, M. S., Chowdhury, L., Khan, M. I., Ashour, A. S., Tavares, J. M., and Dey, N., Hidden Markov model and Chapman Kolmogrov for protein structures prediction from images. Comput. Biol. Chem. 68:231\u2013244, 2017.","journal-title":"Comput. Biol. Chem."},{"key":"921_CR65","doi-asserted-by":"crossref","unstructured":"Dey N, Dey G, Chakraborty S, Chaudhuri SS. Feature analysis of blind watermarked electromyogram signal in wireless telemonitoring. InConcepts and trends in healthcare information systems. Springer, Cham. 205\u2013229, 2014.","DOI":"10.1007\/978-3-319-06844-2_13"},{"key":"921_CR66","doi-asserted-by":"crossref","unstructured":"Dey N, Ashour AS, Chakraborty S, Banerjee S, Gospodinova E, Gospodinov M, Hassanien AE. Watermarking in Biomedical Signal Processing. InIntelligent Techniques in Signal Processing for Multimedia Security. Springer, Cham. 345\u2013369, 2017.","DOI":"10.1007\/978-3-319-44790-2_16"},{"key":"921_CR67","doi-asserted-by":"crossref","unstructured":"Li W, Meng W, Su C, Kwok LF. Towards False Alarm Reduction using Fuzzy If-Then Rules for Medical Cyber Physical Systems. IEEE Access. 2018.","DOI":"10.1109\/ACCESS.2018.2794685"},{"key":"921_CR68","doi-asserted-by":"crossref","unstructured":"Fu Z, Guo C, Ren S, Ou Y, Sha L. Modeling and Integrating Human Interaction Assumptions in Medical Cyber-Physical System Design. In2017 I.E. 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE. 373\u2013378, 2017.","DOI":"10.1109\/CBMS.2017.50"},{"issue":"4","key":"921_CR69","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.1109\/TII.2016.2573762","volume":"13","author":"Y Jiang","year":"2017","unstructured":"Jiang, Y., Song, H., Wang, R., Gu, M., Sun, J., and Sha, L., Data-centered runtime verification of wireless medical cyber-physical system. IEEETtrans. Ind. Info. 13(4):1900\u20131909, 2017.","journal-title":"IEEETtrans. Ind. Info."},{"issue":"1","key":"921_CR70","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TETC.2015.2508382","volume":"5","author":"L Gu","year":"2017","unstructured":"Gu, L., Zeng, D., Guo, S., Barnawi, A., and Xiang, Y., Cost efficient resource management in fog computing supported medical cyber-physical system. IEEE Trans. Emerg. Topics Comput. 5(1):108\u2013119, 2017.","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"921_CR71","doi-asserted-by":"crossref","unstructured":"Fu Z, Guo C, Ren S, Jiang Y, Sha L. Modeling and integrating physical environment assumptions in medical cyber-physical system design. InProceedings of the Conference on Design, Automation & Test in Europe. European Design and Automation Association. 1619\u20131622, 2017.","DOI":"10.23919\/DATE.2017.7927249"},{"issue":"3","key":"921_CR72","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/TCBB.2016.2520933","volume":"13","author":"O Kocabas","year":"2016","unstructured":"Kocabas, O., Soyata, T., and Aktas, M. K., Emerging security mechanisms for medical cyber physical systems. IEEE\/ACM Trans. Comput Biol. Bioinform. 13(3):401\u2013416, 2016.","journal-title":"IEEE\/ACM Trans. Comput Biol. Bioinform."},{"issue":"1","key":"921_CR73","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TDSC.2014.2312327","volume":"12","author":"R Mitchell","year":"2015","unstructured":"Mitchell, R., and Chen, R., Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. IEEE Trans. Depend. Secure Comput. 12(1):16\u201330, 2015.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"921_CR74","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MS.2017.4541031","volume":"35","author":"A Rao","year":"2018","unstructured":"Rao, A., Carre\u00f3n, N., Lysecky, R., and Rozenblit, J., Probabilistic Threat Detection for Risk Management in Cyber-physical Medical Systems. IEEE Softw. 35(1):38\u201343, 2018.","journal-title":"IEEE Softw."},{"issue":"5","key":"921_CR75","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MDAT.2015.2464813","volume":"32","author":"BR Larson","year":"2015","unstructured":"Larson, B. R., Zhang, Y., Barrett, S. C., Hatcliff, J., and Jones, P. L., Enabling safe interoperation by medical device virtual integration. IEEE Des. Test. 32(5):74\u201388, 2015.","journal-title":"IEEE Des. Test."},{"issue":"5","key":"921_CR76","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MDAT.2015.2468222","volume":"32","author":"A Ray","year":"2015","unstructured":"Ray, A., and Cleaveland, R., Security Assurance Cases for Medical Cyber\u2013Physical Systems. IEEE Des. Test. 32(5):56\u201365, 2015.","journal-title":"IEEE Des. Test."},{"issue":"6","key":"921_CR77","doi-asserted-by":"publisher","first-page":"1924","DOI":"10.1109\/JIOT.2017.2684221","volume":"4","author":"Q Xu","year":"2017","unstructured":"Xu, Q., Ren, P., Song, H., and Du, Q., Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Int. Things J. 4(6):1924\u20131933, 2017.","journal-title":"IEEE Int. Things J."},{"key":"921_CR78","doi-asserted-by":"crossref","unstructured":"Bernardeschi C, Domenici A, Masci P. A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems. IEEE Transactions on Software Engineering. 14, 2017.","DOI":"10.1109\/TSE.2017.2694423"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10916-018-0921-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0921-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-0921-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T05:01:10Z","timestamp":1744174870000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10916-018-0921-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,10]]},"references-count":78,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["921"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-0921-x","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,10]]},"assertion":[{"value":"21 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"We are the authors confirm that no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"74"}}