{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T15:32:52Z","timestamp":1777735972366,"version":"3.51.4"},"reference-count":143,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2950849","type":"journal-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T16:59:35Z","timestamp":1572541175000},"page":"168774-168797","source":"Crossref","is-referenced-by-count":69,"title":["Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-6871","authenticated-orcid":false,"given":"Abdul","family":"Razaque","sequence":"first","affiliation":[]},{"given":"Fathi","family":"Amsaad","sequence":"additional","affiliation":[]},{"given":"Meer","family":"Jaro Khan","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[]},{"given":"Shujing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Siting","sequence":"additional","affiliation":[]},{"given":"Xingchen","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317494"},{"key":"ref38","first-page":"27","article-title":"Approach to paralleling password cracking intrusion andcountermeasures to defending","volume":"2001","author":"bo","year":"2001","journal-title":"Comput Eng Appl"},{"key":"ref33","article-title":"Homology analysis of ransomware based on sequence alignment","author":"qi","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374130"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2017.8070759"},{"key":"ref30","article-title":"User key management for the secure shell (SSH)","author":"ylonen","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328710"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2017.8261228"},{"key":"ref34","article-title":"An approach to decrypting ransomware wannacry based on API hooking","volume":"9","author":"chun-sheng","year":"2018"},{"key":"ref28","year":"0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMICON.2017.8279028"},{"key":"ref29","article-title":"Connected medical devices: The Internet of Things-that-could-kill-you","author":"peterson","year":"2017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095207"},{"key":"ref22","article-title":"Information security countermeasures of hospital information system","author":"shunhua","year":"2006","journal-title":"Chin J Current Hospital Admin"},{"key":"ref21","article-title":"Risk analysis and security protection technology of Internet of Things attacks","author":"hui","year":"2015","journal-title":"China Academic Journal Electronic Publishing House"},{"key":"ref24","article-title":"Description of SA weak password&#x2019;s harm and solution in the SQL server system","volume":"29","author":"cao","year":"2012","journal-title":"J Journal of Xingtai Polytechnic College"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004903"},{"key":"ref101","article-title":"Research on information dissemination and privacy protection of residents health records based on SOA","author":"wenhua","year":"2013"},{"key":"ref26","article-title":"The analysis to database security vulnerabilities","author":"zhang","year":"2012"},{"key":"ref100","article-title":"Application of multi-layer architecture technology in information management system","author":"weifeng","year":"2007"},{"key":"ref25","first-page":"107","article-title":"Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute","volume":"25","author":"zhang","year":"2004","journal-title":"J China Inst Commun"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.12.006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.004"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.05.152"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.211"},{"key":"ref57","first-page":"2365","article-title":"A XSS defensive scheme based on behavior certification","volume":"241","author":"xu","year":"2013","journal-title":"Appl Mech Mater"},{"key":"ref56","article-title":"Cross-site request forgery: Attack and defense","author":"tatiana","year":"2010"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.01.04"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803191"},{"key":"ref53","first-page":"19","article-title":"A new server-side solution for detecting cross site scripting attack","volume":"3","author":"barhoom","year":"2011","journal-title":"Int J Comput Inform Syst"},{"key":"ref52","first-page":"7","article-title":"$\\text{S}^{2} \\times\\text{S}^{2}$\n: A server side approach to automatically detect XSS attacks","author":"shahriar","year":"2011","journal-title":"Proc 9th Int Conf Dependable Autom Secure Comput"},{"key":"ref40","article-title":"Design and implementation of kernel detecting based database vulnerability scanner","author":"xun","year":"2016","journal-title":"China Academic Journal Electronic Publishing House"},{"key":"ref4","first-page":"56","article-title":"Enhancing information privacy and data sharing in a healthcare IT firm: The case of Ricerro communications","volume":"8","author":"chung","year":"2014","journal-title":"J Inf Priv Secur"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/CGIJ-05-2015-0013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEM.2010.035624"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2017.8002498"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ITOEC.2017.8122403"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC.2017.8285104"},{"key":"ref7","article-title":"Description of SA weak password&#x2019;s harm and solution in the SQL server system","volume":"29","author":"cao","year":"2012","journal-title":"J Journal of Xingtai Polytechnic College"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2016.7490529"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICAECCT.2016.7942601"},{"key":"ref45","first-page":"110","article-title":"An intrusion-tolerant password authentication system","author":"wang","year":"2013","journal-title":"Proc Ann Comput Secur Appl Conf (ACSAC)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8342983"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813926"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ITACT.2015.7492650"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RVSP.2011.59"},{"key":"ref44","first-page":"1153","article-title":"Research and implementation of SQL injection prevention method based on ISR","author":"ping","year":"2016","journal-title":"Proc 2nd IEEE Int Conf Comput Commun"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA-TICET.2017.8095285"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.04.031"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.09.034"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69155-8_13"},{"key":"ref124","first-page":"159","article-title":"The dynamic analysis of WannaCry ransomware","author":"kao","year":"2018","journal-title":"Proc 20th Int Conf Adv Commun Technol (ICACT)"},{"key":"ref73","article-title":"Construction of E-government cloud computing security system based on IATF model","author":"zang","year":"0"},{"key":"ref72","article-title":"The construction of intelligent medical system model under the Internet of Things framework","author":"hu","year":"2013"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.05.010"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2016.7518892"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.003"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502914"},{"key":"ref76","article-title":"Design and research of smart medical analysis system based on Hadoop","author":"pi","year":"0"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.05.045"},{"key":"ref77","first-page":"176","article-title":"Analysis of hospital integrated information system architecture","volume":"5","author":"wang","year":"2012","journal-title":"Silicon Valley"},{"key":"ref74","article-title":"Research and application of intelligent medical system based on Internet of Things Jilin","author":"sang","year":"0"},{"key":"ref75","article-title":"Research on hospital data disaster recovery system","author":"xu","year":"2006"},{"key":"ref133","year":"0"},{"key":"ref134","author":"morgan","year":"2017","journal-title":"Cybersecurity Business Report"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref78","first-page":"1513","article-title":"A PDRR based detection technique for blackhole attack in MANET","volume":"2","author":"saurabh","year":"2011","journal-title":"Int J Comput Sci Inf Technol"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2018.12.001"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.3390\/s150407172"},{"key":"ref136","first-page":"54","volume":"6","year":"2011","journal-title":"Open SSH"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-813314-9.00012-8"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.2196\/12644"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.384"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5815\/ijieeb.2014.05.02"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.4018\/IJCRE.2019070104"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516716"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/PAAP.2011.74"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2911708"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2011.6156002"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2011.6139694"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754984"},{"key":"ref142","first-page":"1","article-title":"Enhancing cybersecurity for the digital health marketplace","volume":"26","author":"tschider","year":"2017","journal-title":"Annals Health L"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2015.55"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"jang-jaccard","year":"2013","journal-title":"J Comput Syst Sci"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015701"},{"key":"ref2","first-page":"38","article-title":"Interpreting the impact of perceived privacy and security concerns in patients&#x2019; use of online health information systems","volume":"8","author":"ambrose","year":"2015","journal-title":"J Inf Priv Secur"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2549640"},{"key":"ref1","year":"0"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2016.11.001"},{"key":"ref95","article-title":"Design and implementation of symbol execution tool based on PAT tree","author":"jin","year":"2007"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"718","DOI":"10.3724\/SP.J.1001.2010.03610","article-title":"Efficient sequence similarity search algorithm based on reference set index","volume":"21","author":"dongbo","year":"2010","journal-title":"J Softw"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref93","first-page":"97","article-title":"Improved algorithm for fast similarity search of time series","volume":"30","author":"jing","year":"2003","journal-title":"Comput Sci"},{"key":"ref106","article-title":"Chinese journal of rehabilitation theory and practice, based on ICF&#x2019;s information architecture and data system of national function, disability and health","author":"qinyan","year":"0"},{"key":"ref92","first-page":"41","article-title":"Application of data mining technology in regional health information platform","volume":"38","author":"yansheng","year":"2011","journal-title":"Electron Technol"},{"key":"ref105","article-title":"IHE technical framework and medical workflow integration","author":"xudong","year":"2004","journal-title":"China Medical Device Information"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1021\/nl301147h"},{"key":"ref104","article-title":"ESB principle, architecture, implementation and application, computer engineering and applications","author":"wenying","year":"2008"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1021\/nn202351j"},{"key":"ref103","article-title":"Analysis of concept analysis and standardization of electronic health archive","author":"guanhua","year":"2015","journal-title":"J Med Inform"},{"key":"ref102","article-title":"Application framework design and application prospect of enterprise information system based on cloud computing and SOA","author":"chin","year":"2013"},{"key":"ref111","first-page":"25","article-title":"A survey on security of IoT in the context of eHealth and clouds","author":"ida","year":"2016","journal-title":"Proc 11th Int Design Test Symp (IDT)"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004903"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5183475"},{"key":"ref98","article-title":"Research and implementation of the integrated application of search engine Nutch in digital library","author":"zhirong","year":"2010"},{"key":"ref99","article-title":"Design and implementation of data exchange platform of HIS system and healthcare system","author":"yan","year":"2014"},{"key":"ref96","article-title":"Personal electronic health medical system architecture based on WCDMA","author":"wenfeng","year":"2009"},{"key":"ref97","article-title":"WCDMA system power control research","author":"mei","year":"2003","journal-title":"J Univ Electron Sci Technol China"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2016.0066"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2017.8088261"},{"key":"ref12","article-title":"Anthem is warning consumers about its huge data breach. Here&#x2019;sa translation","author":"hiltzik","year":"2017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.002"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1487-8"},{"key":"ref16","first-page":"124","article-title":"Internet of Things (IoT) healthcare market by component (implantable sensor devices, wearable sensor devices, system and software), application (patient monitoring, clinical operation and workflow optimization, clinical imaging, fitness and wellness measurement)&#x2014;Global opportunity analysis and industry forecast, 2014&#x2013;2021","author":"malik","year":"2016"},{"key":"ref82","first-page":"47","article-title":"The purpose and effect of hospital information system integration platform construction","volume":"9","author":"zhang","year":"2012","journal-title":"Chin J Health Inf Manage"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3233\/THC-161263"},{"key":"ref17","first-page":"17","author":"pollard","year":"2015","journal-title":"The Healthcare Internet of Things Rewards and Risks"},{"key":"ref81","article-title":"The design of intelligent medical system based on Zigbee","author":"wang","year":"0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2014.49"},{"key":"ref84","article-title":"Research on electronic medical record system and access control strategy based on cloud storage","author":"zhou","year":"2011"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2257052"},{"key":"ref19","year":"0","journal-title":"Classify Your Device"},{"key":"ref83","first-page":"81-3","article-title":"Application of P2DR model in security of HIS","volume":"1674","author":"han","year":"2013","journal-title":"Sci Manage"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409099"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.003"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2708042"},{"key":"ref80","first-page":"91","article-title":"Application of database firewall in hospital information system","volume":"10","author":"pan","year":"2015","journal-title":"China Digital Medicine"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2013.6625493"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004903"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320036"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(17)30111-3"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.012"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004903"},{"key":"ref85","article-title":"Research on hospital data disaster recovery system","author":"xu","year":"2006"},{"key":"ref86","first-page":"60","article-title":"Application of medical information system integration based on HL7","volume":"23","author":"wu","year":"2014","journal-title":"Chin J Med Libr Inf Sci"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2093698.2093852"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2010.01658"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08888271.pdf?arnumber=8888271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:32:22Z","timestamp":1641987142000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":143,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2950849","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}