{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:53:31Z","timestamp":1749099211756},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10001605","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T17:24:18Z","timestamp":1673457858000},"page":"1404-1410","source":"Crossref","is-referenced-by-count":2,"title":["Systematic Threat Analysis of Modern Unified Healthcare Communication Systems"],"prefix":"10.1109","author":[{"given":"Akm Iqtidar","family":"Newaz","sequence":"first","affiliation":[{"name":"Florida International University,Cyber-Physical Systems Security Lab,Miami,Florida,USA"}]},{"given":"Ahmet","family":"Aris","sequence":"additional","affiliation":[{"name":"Florida International University,Cyber-Physical Systems Security Lab,Miami,Florida,USA"}]},{"given":"Amit Kumar","family":"Sikder","sequence":"additional","affiliation":[{"name":"Florida International University,Cyber-Physical Systems Security Lab,Miami,Florida,USA"}]},{"given":"A. Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Florida International University,Cyber-Physical Systems Security Lab,Miami,Florida,USA"}]}],"member":"263","reference":[{"journal-title":"Schneier on Security","year":"1999","key":"ref13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s20164404"},{"key":"ref12","article-title":"Pestilential protocol: How unsecure hl7 messages threaten patient lives","author":"dameff","year":"2018","journal-title":"BlackHat"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48393-1_24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48683-6_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exs029"},{"key":"ref31","article-title":"A methodology for systematic attack trees generation for imds","author":"xu","year":"2016","journal-title":"IEEE SysCon"},{"key":"ref30","first-page":"32","article-title":"Attack-tree-based threat modeling of medical implants","author":"siddiqi","year":"2018","journal-title":"PROOFS CHES"},{"journal-title":"FHIR security","year":"0","key":"ref11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2941345"},{"key":"ref10","article-title":"Beyond 2014: Formal methods for attack tree-based security modeling","author":"widel","year":"2019","journal-title":"ACM Comput Surv"},{"key":"ref32","article-title":"Formal modeling with humans in infrastructures for iot healthcare","author":"kamm\u00fcller","year":"2017","journal-title":"Conf on Information Security and Privacy"},{"key":"ref2","article-title":"How connected medical devices are transforming healthcare","author":"ronte","year":"2018","journal-title":"Tech Rep"},{"journal-title":"Global medical devices market trajectory","year":"2021","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40196-1_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-014-0361-y"},{"journal-title":"Rest api security","year":"2020","key":"ref19"},{"journal-title":"Denial-of-service attacks on healthcare","year":"2017","key":"ref18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00093"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"journal-title":"Common Vulnerability Scoring System Version 3 1 Calculator","year":"0","key":"ref26"},{"key":"ref25","article-title":"Make redirection evil again: Url parser issues in oauth","author":"wang","year":"2019","journal-title":"BlackHat Asia 2019"},{"journal-title":"How to prevent dns attacks","year":"2017","key":"ref20"},{"journal-title":"OAuth 2 0 Security Best Current Practice","year":"0","key":"ref22"},{"journal-title":"Rest api security","year":"0","key":"ref21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3277593.3277596"},{"key":"ref27","article-title":"Effective analysis of attack trees","author":"kumar","year":"2018","journal-title":"Fundamental- Approaches- To- Software Engineering"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36537-0_5"},{"key":"ref8","article-title":"Healthguard: A ml-based security framework for shs","author":"newaz","year":"2019","journal-title":"IEEE SNAMS"},{"key":"ref7","article-title":"Heka: A novel ids for attacks to personal medical devices","author":"newaz","year":"2020","journal-title":"IEEE CNS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819045-6.00006-6"},{"journal-title":"H17 international","year":"0","key":"ref4"},{"journal-title":"Ieee 11073 personal health devices","year":"0","key":"ref3"},{"journal-title":"HL7 Data Interfaces in Medical Environments Attacking and Defending Healthcare","year":"2017","author":"haselhorst","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4258\/hir.2018.24.1.46"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","start":{"date-parts":[[2022,12,4]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10001605.pdf?arnumber=10001605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T14:21:42Z","timestamp":1675779702000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10001605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10001605","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}