{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:29:23Z","timestamp":1768411763124,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3487824","type":"journal-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:33:41Z","timestamp":1730223221000},"page":"160506-160515","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach to Medical Device IT Security Landscape Analysis Leveraging Manufacturer Disclosure Statements"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7403-1158","authenticated-orcid":false,"given":"Stefan","family":"Stein","sequence":"first","affiliation":[{"name":"Department of Computer Science and Media, Brandenburg University of Applied Sciences, Brandenburg an der Havel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1846-2727","authenticated-orcid":false,"given":"Simon","family":"Weber","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Heinrich Heine University D&#x00FC;sseldorf, D&#x00FC;sseldorf, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1129-437X","authenticated-orcid":false,"given":"Michael","family":"Pilgermann","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Media, Brandenburg University of Applied Sciences, Brandenburg an der Havel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7954-6791","authenticated-orcid":false,"given":"Thomas","family":"Schrader","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Media, Brandenburg University of Applied Sciences, Brandenburg an der Havel, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9888-8460","authenticated-orcid":false,"given":"Martin","family":"Sedlmayr","sequence":"additional","affiliation":[{"name":"Institute for Medical Informatics and Biometry, Dresden University of Technology, Dresden, Germany"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Attacks on Healthcare Worldwide 2023","year":"2024"},{"key":"ref2","volume-title":"Die Lage Der IT-Sicherheit in Deutschland 2023","year":"2021"},{"key":"ref3","volume-title":"ENISA Threat Landscape 2021","year":"2021"},{"key":"ref4","volume-title":"Health Threat Landscape\u2014ENISA","year":"2023"},{"key":"ref5","volume-title":"Healthcare Sector Cybersecurity","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2018-025374"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-45927-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11517-023-02912-0"},{"key":"ref9","volume-title":"Sicherheit Von Medizinprodukten\u2014Leitfaden Zur Nutzung Des MDS2 Aus 2019","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162769"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR56254.2022.9995984"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2914094"},{"key":"ref13","volume-title":"IEC\/TR 80001-2-2:2012","year":"2012"},{"key":"ref14","article-title":"Security and privacy controls for information systems and organizations","author":"Force","year":"2020"},{"key":"ref15","volume-title":"Information Security, Cybersecurity and Privacy Protection\u2014Information Security Controls","year":"2022"},{"key":"ref16","volume-title":"Require Strong Passwords | CISA","year":"2024"},{"key":"ref17","volume-title":"Cyber Attacks in Healthcare Sector Worldwide by Type 2022","year":"2024"},{"key":"ref18","volume-title":"Causes of U.S. Healthcare Data Breaches in 2022","year":"2024"},{"key":"ref19","volume-title":"Infographic: Security Risk Software","author":"Brandt","year":"2024"},{"key":"ref20","volume-title":"NVD\u2014CPE","year":"2024"},{"key":"ref21","volume-title":"Vulnerable Software by Product: Windows","year":"2024"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-128","article-title":"Guide for security-focused configuration management of information systems","author":"Johnson","year":"2019"},{"key":"ref23","volume-title":"ISO Central Secretariat","year":"2022"},{"key":"ref24","volume-title":"Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions","year":"2024"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-92r1.ipd","volume-title":"Cybersecurity log management planning guide","author":"Scarfone","year":"2023"},{"key":"ref26","article-title":"Cybersecurity supply chain risk management practices for systems and organizations","author":"Boyens","year":"2022"},{"key":"ref27","volume-title":"Improving the Nation\u2019s Cybersecurity","year":"2021"},{"key":"ref28","volume-title":"Principles and Practices for Software Bill of Materials for Medical Device Cybersecurity"},{"key":"ref29","article-title":"Common platform enumeration: Naming specification version 2.3","author":"Cheikes","year":"7695"},{"key":"ref30","volume-title":"Security Content Automation Protocol | CSRC | CSR","year":"2024"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"41796","DOI":"10.1109\/ACCESS.2023.3270225","article-title":"Attack detection for medical cyber-physical systems\u2014A systematic literature review","volume":"11","author":"Weber","year":"2023","journal-title":"IEEE Access"},{"key":"ref32","volume-title":"Common Security Advisory Framework (CSAF)","year":"2024"},{"key":"ref33","volume-title":"CSAF 2.0 JSON Schema Viewer","year":"2024"},{"key":"ref34","volume-title":"Secvisogram CSAF 2.0 Editor","year":"2024"},{"key":"ref35","volume-title":"Manufacturers Disclosure Statement for Medical Device\u2014Himss","year":"2024"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.3389\/fpubh.2022.989320","article-title":"How to calculate the life cycle of high-risk medical devices for patient safety","volume":"10","author":"Seo","year":"2022","journal-title":"Frontiers Public Health"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10737332.pdf?arnumber=10737332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T03:43:05Z","timestamp":1732678985000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10737332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3487824","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}