{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T07:12:03Z","timestamp":1766301123884,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon Europe Research and Innovation Programme","award":["101095448"],"award-info":[{"award-number":["101095448"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1145\/3652037.3663896","type":"proceedings-article","created":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T12:30:38Z","timestamp":1719405038000},"page":"687-693","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Semi-Automated Threat Vulnerability &amp; Risk Assessment (TVRA) for Medical Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2148-7896","authenticated-orcid":false,"given":"Nabil","family":"Moukafih","sequence":"first","affiliation":[{"name":"University of Warwick - WMG, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9419-6245","authenticated-orcid":false,"given":"Hongsen","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Warwick - WMG, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1054-6368","authenticated-orcid":false,"given":"Gregory","family":"Epiphaniou","sequence":"additional","affiliation":[{"name":"University of Warwick - WMG, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"University of Warwick - WMG, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9937-1762","authenticated-orcid":false,"given":"Steve","family":"Taylor","sequence":"additional","affiliation":[{"name":"University of Southampton, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9391-1310","authenticated-orcid":false,"given":"Laura","family":"Carmichael","sequence":"additional","affiliation":[{"name":"University of Southampton, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. ISO\/IEC 27001:2022 Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements. International Organization for Standardization. https:\/\/www.iso.org\/standard\/iso-iec-27001-2022-v1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2019.0066"},{"key":"e_1_3_2_1_3_1","unstructured":"M. Howard and S. Lipner. 2006. The security development lifecycle. Microsoft Press Redmond."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5068"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064682"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0598-x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2017.1366536"},{"key":"e_1_3_2_1_8_1","volume-title":"The Steering Committee of The World Congress in Computer Science. Computer Engineering and Applied Computing (WorldComp). https:\/\/csce. ucmss. com\/cr\/books\/2019\/LFS\/CSREA2019\/ICM2519","author":"McFarland RJ","year":"2019","unstructured":"RJ McFarland and SBO Olatunbosun. 2019. An exploratory study on the use of internet of medical things (iomt) in the healthcare industry and their associated cybersecurity risks. The Steering Committee of The World Congress in Computer Science. Computer Engineering and Applied Computing (WorldComp). https:\/\/csce. ucmss. com\/cr\/books\/2019\/LFS\/CSREA2019\/ICM2519. pdf (2019)."},{"key":"e_1_3_2_1_9_1","volume-title":"Automated knowledge-based cybersecurity risk assessment of cyber-physical systems. (Sept","author":"Phillips Stephen","year":"2023","unstructured":"Stephen Phillips, Steve Taylor, Michael Boniface, and Mike Surridge. 2023. Automated knowledge-based cybersecurity risk assessment of cyber-physical systems. (Sept. 2023)."},{"volume-title":"Financial cybersecurity risk management","author":"Rohmeyer Paul","key":"e_1_3_2_1_10_1","unstructured":"Paul Rohmeyer and Jennifer\u00a0L Bayuk. 2019. Financial cybersecurity risk management. Apress, Berkeley, CA."},{"key":"e_1_3_2_1_11_1","article-title":"The CIA strikes back: Redefining confidentiality, integrity and availability in security","volume":"10","author":"Samonas S.","year":"2014","unstructured":"S. Samonas and D. Coss. 2014. The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security 10, 3 (2014).","journal-title":"Journal of Information System Security"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2021.07.015"},{"volume-title":"Iot based real-time remote patient monitoring system. In 2020 16th IEEE international colloquium on signal processing & its applications (CSPA)","author":"Yew T.","key":"e_1_3_2_1_13_1","unstructured":"H.\u00a0T. Yew, M.\u00a0F. Ng, S.\u00a0Z. Ping, S.\u00a0K. Chung, A. Chekima, and J.\u00a0A. Dargham. 2020. Iot based real-time remote patient monitoring system. In 2020 16th IEEE international colloquium on signal processing & its applications (CSPA). IEEE, 176\u2013179."}],"event":{"name":"PETRA '24: The PErvasive Technologies Related to Assistive Environments Conference","acronym":"PETRA '24","location":"Crete Greece"},"container-title":["Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652037.3663896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652037.3663896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:41:27Z","timestamp":1755877287000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652037.3663896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":13,"alternative-id":["10.1145\/3652037.3663896","10.1145\/3652037"],"URL":"https:\/\/doi.org\/10.1145\/3652037.3663896","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]},"assertion":[{"value":"2024-06-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}