{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:13:31Z","timestamp":1774628011926,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Consejo Nacional de Humanidades Ciencia y Tecnolog\u00eda (CONAHCYT) with CVU","award":["1116589"],"award-info":[{"award-number":["1116589"]}]},{"name":"CONAHCYT Project 882 \u201cDesarrollo de Sistemas de Seguridad para Aplicaci\u00f3n en la Industria Automotriz en el Edo de Tlaxcala.\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3480889","type":"journal-article","created":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T17:25:18Z","timestamp":1729013118000},"page":"153886-153897","source":"Crossref","is-referenced-by-count":13,"title":["Enhancing Machine Learning Approach Based on Nilsimsa Fingerprinting for Ransomware Detection in IoMT"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2162-4536","authenticated-orcid":false,"given":"Mireya","family":"Lucia Hernandez-Jaimes","sequence":"first","affiliation":[{"name":"Computer Sciences Department, Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica (INAOE), Puebla, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1968-0785","authenticated-orcid":false,"given":"Alfonso","family":"Mart\u00ednez-Cruz","sequence":"additional","affiliation":[{"name":"Computer Sciences Department, Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica (INAOE), Puebla, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8294-5926","authenticated-orcid":false,"given":"Kelsey","family":"Alejandra Ram\u00edrez-Guti\u00e9rrez","sequence":"additional","affiliation":[{"name":"Computer Sciences Department, Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica (INAOE), Puebla, Mexico"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2911-1957","authenticated-orcid":false,"given":"Elizabeth","family":"Guevara-Mart\u00ednez","sequence":"additional","affiliation":[{"name":"Engineering Department, Universidad An&#x00E1;huac M&#x00E9;xico, Huixquilucan de Degollado, Mexico"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103332"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.028"},{"key":"ref3","article-title":"Medical devices market size, share & industry analysis","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0752-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icc42927.2021.9500354"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3093905"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3172432"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10212562"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108439"},{"key":"ref11","volume-title":"Hundreds of Health Care Facilities Were Hit By Ransomware Last Year Amid Pandemic","year":"2020"},{"key":"ref12","volume-title":"Lock It Down and Piss People Off\u2019: How Quick Thinking Stopped a Ransomware Attack From Crippling a Florida Hospital","year":"2022"},{"key":"ref13","volume-title":"Attacks Targeting Healthcare Organizations Spike Globally As COVID-19 Cases Rise Again","year":"2021"},{"key":"ref14","volume-title":"If Healthcare Doesn\u2019t Strengthen Its Cybersecurity, It Could Soon Be in Critical Condition","author":"Duguin","year":"2021"},{"key":"ref15","volume-title":"2022 Sonicwall Cyber Threat Report","year":"2022"},{"key":"ref16","volume-title":"Internet Crime Report 2023","author":"Invest","year":"2023"},{"key":"ref17","volume-title":"Wannacrypt Ransomware Attack Should Make Us Wanna Cry","year":"2017"},{"key":"ref18","volume-title":"UHS Ransomware Attack Cost 67M in Lost Revenue, Recovery Efforts","year":"2021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100887"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s19051114"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3000421"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s21093025"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s22218280"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101351"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91424-0_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICICACS60521.2024.10498277"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121618"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100658"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-9518-9_27"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/engproc2023059139"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.91762"},{"issue":"2","key":"ref33","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10796-020-10017-4","article-title":"DeepRan: Attention-based BiLSTM and CRF for ransomware early detection and classification","volume":"23","author":"Roy","year":"2021","journal-title":"Inf. Syst. Frontiers"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322559"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2024.102159"},{"key":"ref36","volume-title":"Medical Devices and Medical Systems\u2014Essential Safety Requirements for Equipment Comprising the Patient-Centric Integrated Clinical Environment (ICE)\u2014Part 1: General Requirements and Conceptual Model","year":"2024"},{"key":"ref37","article-title":"Security and privacy of the integrated clinical environment part I","volume":"46","author":"Williams","year":"2019","journal-title":"J. Health Care Finance"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10718304.pdf?arnumber=10718304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:50:36Z","timestamp":1732668636000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10718304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3480889","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}