{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:17:35Z","timestamp":1775470655574,"version":"3.50.1"},"reference-count":86,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/ismict.2019.8744003","type":"proceedings-article","created":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T18:57:48Z","timestamp":1561489068000},"page":"1-9","source":"Crossref","is-referenced-by-count":23,"title":["Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems"],"prefix":"10.1109","author":[{"given":"Yussuf","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Syed","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Josephs","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.procs.2015.07.458","article-title":"Vulnerability assessment & penetration testing as a cyber defence technology","volume":"57","author":"goel","year":"2015","journal-title":"Procedia Computer Science"},{"key":"ref72","year":"2019","journal-title":"Attackiq intelligent security decissions"},{"key":"ref71","first-page":"364","article-title":"Simulated penetration testing: From","author":"hoffmann","year":"2015","journal-title":"dijkstra\" to\" turing test++\" \" in ICAPS"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206744"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.12.193"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1057\/9781137455550_10"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(18)30097-6"},{"key":"ref39","year":"2018","journal-title":"Nhs digital appoints first chief information security officer"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991111"},{"key":"ref38","author":"thimbleby","year":"2014","journal-title":"Addressing Systems Safety Challenges Proc 22nd Safety-Critical Systems Symp"},{"key":"ref78","article-title":"Mean time between failure: Explanation and standards","volume":"78","author":"torell","year":"2004","journal-title":"White Paper"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.90"},{"key":"ref33","first-page":"2014","article-title":"Fda safety communication: cybersecurity for medical devices and hospital networks","volume":"1","author":"food","year":"2013","journal-title":"Retrieved May"},{"key":"ref32","article-title":"Postmarket management of cyber-security in medical devices","author":"food","year":"2016"},{"key":"ref31","article-title":"Cybersecurity of network- connected medical devices in the netherlands 2015","year":"2015","journal-title":"Deloitte Report"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-52.2.103"},{"key":"ref37","first-page":"139","article-title":"Cyberattacks on medical devices and hospital networks: Legal gaps and regulatory solutions","volume":"30","author":"wellington","year":"2013","journal-title":"Santa Clara Computer & High Tech LJ"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2017.11.9.07"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2667218"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.10.001"},{"key":"ref60","year":"2017","journal-title":"Indicators associated with wannacry ransomware"},{"key":"ref62","year":"2018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.09.001"},{"key":"ref63","year":"2019","journal-title":"Ioc-bucket"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487458"},{"key":"ref64","year":"2019","journal-title":"Ioc editor"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2767561"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883056"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.016"},{"key":"ref29","first-page":"305","article-title":"Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem","volume":"8","author":"williams","year":"2015","journal-title":"Medical devices (Auckland NZ)"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2465934"},{"key":"ref68","article-title":"Cyber threat intelligence exchange: A growing requirement","author":"veerasamy","year":"2017"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2994475.2994476"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.maturitas.2018.04.008"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1097\/HAP.0000000000000039"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2017.2737201"},{"key":"ref22","author":"davies","year":"2018","journal-title":"The 10 biggest u s healthcare data breaches of 2018"},{"key":"ref21","author":"padmanabhan","year":"2017","journal-title":"The nhs ransomware event and security challenges for the u s healthcare system"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2018.04.006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(18)30068-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2018.022021660"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCTAM.2012.6488073"},{"key":"ref50","author":"hayden","year":"2010","journal-title":"IT Security Metrics A Practical Framework for Measuring Security and Protecting Data"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1132-1_15"},{"key":"ref59","first-page":"43","article-title":"From cyber security information sharing to threat management","author":"brown","year":"2015","journal-title":"Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security"},{"key":"ref58","article-title":"2018 cost of a data breach study: Global overview","year":"2018","journal-title":"Report"},{"key":"ref57","author":"micro","year":"2018","journal-title":"Indicator of compromise"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2016.7575045"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2012.250235"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/HealthCom.2015.7454496"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.20533\/ijds.2040.2570.2010.0029"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3241403.3241458"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.j3179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2017.8286448"},{"key":"ref40","year":"2017","journal-title":"Nhs workers warned about consequences of snooping into patients&#x2019; medical records"},{"key":"ref12","author":"biddle","year":"2017","journal-title":"Securing wi-fi access for healthcare"},{"key":"ref13","first-page":"258","article-title":"Ransomware software: Case of wannacry","volume":"3","author":"mago","year":"2018","journal-title":"Engineering and Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30096-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-119"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2016.29"},{"key":"ref16","year":"2019","journal-title":"Ransomware corrupts 24 000 patient records of california specialist"},{"key":"ref81","article-title":"Threat intelligence: What is it,and how can it protect you from today&#x2019;s advanced cyber-attacks?","year":"2014","journal-title":"Web Technology Report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.39"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2017.20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30086-1"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2663876.2663883"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335061"},{"key":"ref3","first-page":"215","article-title":"Workarounds to computer access in healthcare organizations: you want my password or a dead patient?","author":"koppel","year":"2015","journal-title":"Booktitle"},{"key":"ref6","article-title":"The securityscorecard healthcare report","year":"2018","journal-title":"Securi-tyScorecard Report"},{"key":"ref5","article-title":"Verizon data breach investigations report","year":"2018","journal-title":"Verizon Report"},{"key":"ref85","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/THC-161263"},{"key":"ref86","first-page":"2018","article-title":"Who&#x2019;s using cyberthreat intelligence and how?","volume":"24","author":"shackleford","year":"2015","journal-title":"SANS Institute Retrieved January"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2196\/10059"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314266"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1056\/NEJMp1404358","article-title":"Cybersecurity in health care","volume":"371","author":"perakslis","year":"2014","journal-title":"N Engl J Med"},{"key":"ref46","author":"jansen","year":"2010","journal-title":"Directions in Security Metrics Research"},{"key":"ref45","author":"campbell","year":"2014","journal-title":"Measures and metrics in corporate security"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-55r1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1201\/b14047"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1136\/medethics-2016-103887"},{"key":"ref41","article-title":"National data guardian for health and care","author":"caldicott","year":"2016","journal-title":"Review of data security consent and opt-outs"},{"key":"ref44","article-title":"State of cybersecurity metrics annual report","year":"2017","journal-title":"Thycotic Report"},{"key":"ref43","article-title":"An ontology for a hipaa compliant cloud service","author":"joshi","year":"2016","journal-title":"4th International IBM Cloud Academy Conference ICACON 2016"}],"event":{"name":"2019 13th International Symposium on Medical Information and Communication Technology (ISMICT)","location":"Oslo, Norway","start":{"date-parts":[[2019,5,8]]},"end":{"date-parts":[[2019,5,10]]}},"container-title":["2019 13th International Symposium on Medical Information and Communication Technology (ISMICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8741513\/8743656\/08744003.pdf?arnumber=8744003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:27Z","timestamp":1658155947000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8744003\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":86,"URL":"https:\/\/doi.org\/10.1109\/ismict.2019.8744003","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}