{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T16:53:02Z","timestamp":1773161582271,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/uemcon47517.2019.8992922","type":"proceedings-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T08:36:46Z","timestamp":1581669406000},"page":"0145-0148","source":"Crossref","is-referenced-by-count":10,"title":["Mitigating Implanted Medical Device Cybersecurity Risks"],"prefix":"10.1109","author":[{"given":"Chuek","family":"Easttom","sequence":"first","affiliation":[]},{"given":"Nagi","family":"Mei","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"greer","year":"2018","journal-title":"Cybersecurity For Healthcare Medical Devices"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2019.00051"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3314527.3314536"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326298"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00258"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/1932296816678264"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacc.2018.01.023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1932296815583334"},{"key":"ref18","first-page":"637","article-title":"If your heart skips a beat, it may have been hacked: Cybersecurity concerns with implanted medical devices","volume":"67","author":"browning","year":"2015","journal-title":"SCL Rev"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1089\/dia.2014.0328"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacc.2018.01.023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/pace.13102"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.05.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/17434440.2019.1614440"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2890488"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-8897-9.ch075"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-804659-3.00025-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9783527800599"},{"key":"ref9","article-title":"Cybersecurity threats targeting networked critical medical devices","author":"gaukstern","year":"0","journal-title":"ASEE IL\/IN Section Conference"},{"key":"ref20","first-page":"419","article-title":"Cardiac defibrillators need to have a bulletproof vest: The national security risk posed by the lack of cybersecurity in implantable medical devices","volume":"41","author":"woods","year":"2016","journal-title":"Nova Law Review"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jacc.2018.01.023"},{"key":"ref21","article-title":"Are implanted electronic devices hackable?","author":"alexander","year":"2018","journal-title":"Trends in Cardiovascular Medicine"},{"key":"ref24","author":"amchislavsky","year":"2015","journal-title":"Transmission of multiple protocol data elements via an interface utilizing a data tunnel"},{"key":"ref23","article-title":"Mobile computing device with data cognition software","author":"todeschini","year":"2016","journal-title":"Hand Held Products Inc"}],"event":{"name":"2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","location":"New York City, NY, USA","start":{"date-parts":[[2019,10,10]]},"end":{"date-parts":[[2019,10,12]]}},"container-title":["2019 IEEE 10th Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8966519\/8992916\/08992922.pdf?arnumber=8992922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:19:44Z","timestamp":1658261984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8992922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/uemcon47517.2019.8992922","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}