{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T04:36:05Z","timestamp":1767414965200,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/isi.2017.8004903","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T16:42:42Z","timestamp":1502383362000},"page":"176-178","source":"Crossref","is-referenced-by-count":44,"title":["Assessing medical device vulnerabilities on the Internet of Things"],"prefix":"10.1109","author":[{"given":"Emma","family":"McMahon","sequence":"first","affiliation":[]},{"given":"Ryan","family":"Williams","sequence":"additional","affiliation":[]},{"given":"Malaka","family":"El","sequence":"additional","affiliation":[]},{"given":"Sagar","family":"Samtani","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Patton","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FDA","article-title":"Content of Premarket Submissions for Management of Cybersecurity in Medical Devices Guidance for Industry and Food and","year":"2014","key":"ref10"},{"key":"ref11","article-title":"Black Hat: Insulin Pumps Can Be Hacked","author":"dan","year":"2011","journal-title":"SC Magazine US"},{"article-title":"The Use of Vulnerability Assessments A Survey","year":"2013","author":"lybrand","key":"ref12"},{"article-title":"Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques","year":"0","author":"sagar","key":"ref13"},{"key":"ref14","first-page":"232","article-title":"Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (loT)","author":"mark","year":"2014","journal-title":"Proceedings-2014 IEEE Joint Intelligence and Security Informatics Conference"},{"key":"ref15","article-title":"Penetration Testing: A Hands-on Introduction to Hacking","author":"georgia","year":"2014","journal-title":"N p No Starch"},{"article-title":"Web Penetration Testing Using Nessus and Metasploit Tool Web Penetration Testing Using Nessus and Metasploit Tool","year":"2016","author":"indraneel","key":"ref16"},{"journal-title":"American Hospital Association","article-title":"Cybersecurity","year":"2016","key":"ref4"},{"journal-title":"USA Today Gannett Satellite Information Network","article-title":"Cyber Breach Hits 10 Million Excellus Healthcare Customers","year":"2015","key":"ref3"},{"key":"ref6","article-title":"Implantable Medical Devices Can Be Hacked to Harm Patients","author":"peter","year":"2016","journal-title":"Computerworld IDG News Service"},{"key":"ref5","article-title":"Connected Medical Devices: The Internet of Things-that-could-kill-you","author":"andrea","year":"2015","journal-title":"The Washington Post"},{"key":"ref8","first-page":"1","article-title":"Security Challenges for Medical Devices","volume":"4","author":"johannes","year":"2015"},{"key":"ref7","first-page":"301","article-title":"Internet of Things: Architectural Framework for eHealth Security","volume":"3","author":"david","year":"2013"},{"journal-title":"The New York Times The New York Times","article-title":"Reuters Premera Blue Cross Says Data Breach Exposed Medical Data","year":"2015","key":"ref2"},{"key":"ref1","article-title":"Anthem Is Warning Consumers about Its Huge Data Breach. Here's a Translation","author":"michael","year":"2015","journal-title":"Los Angeles Times Los Angeles Times"},{"article-title":"Security and Privacy for Implantable Medical Devices","year":"2008","author":"daniel","key":"ref9"}],"event":{"name":"2017 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2017,7,22]]},"location":"Beijing, China","end":{"date-parts":[[2017,7,24]]}},"container-title":["2017 IEEE International Conference on Intelligence and Security Informatics (ISI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7999198\/8004858\/08004903.pdf?arnumber=8004903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T14:32:35Z","timestamp":1513175555000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8004903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isi.2017.8004903","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}