-
3
-
-
85164896483
-
-
Medtronics, Inc. www.medtronic.com/your-health/bradycardia/device/.
-
-
-
-
4
-
-
85164899801
-
-
BodyMedia. http://www.bodymedia.com/.
-
-
-
-
5
-
-
23944466429
-
Safety issues involving medical devices
-
Aug.
-
W. H. Maisel, "Safety issues involving medical devices," Journal of the American Medical Association, vol. 294, pp: 955-958, Aug. 2005.
-
(2005)
Journal of the American Medical Association
, vol.294
, pp. 955-958
-
-
Maisel, W.H.1
-
7
-
-
40649108378
-
Emerging technologies: Wireless communication systems for implantable medical devices
-
Mar.-Apr.
-
D. Panescu, "Emerging technologies: wireless communication systems for implantable medical devices," Engineering in Medicine and Biology Magazine, vol. 27, pp: 96-101, Mar.-Apr. 2008.
-
(2008)
Engineering in Medicine and Biology Magazine
, vol.27
, pp. 96-101
-
-
Panescu, D.1
-
8
-
-
67449084060
-
Inside risks: Reducing risks of implantable medical devices
-
Jun.
-
K. Fu, "Inside risks: reducing risks of implantable medical devices," Communications of the ACM,vol. 52, pp: 25-27, Jun. 2009.
-
(2009)
Communications of the ACM
, vol.52
, pp. 25-27
-
-
Fu, K.1
-
9
-
-
68949178835
-
Securing wireless implantable devices for healthcare: Ideas and challenges
-
Jul.
-
K. Malasri and L. Wang, "Securing wireless implantable devices for healthcare: ideas and challenges," IEEE Communications, vol. 47, pp: 74-80, Jul. 2009.
-
(2009)
IEEE Communications
, vol.47
, pp. 74-80
-
-
Malasri, K.1
Wang, L.2
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
Feb.
-
A. Juels, "RFID security and privacy: a research survey," IEEE JSAC, vol. 24, pp: 381-394, Feb. 2006.
-
(2006)
IEEE JSAC
, vol.24
, pp. 381-394
-
-
Juels, A.1
-
11
-
-
38349154579
-
Denial-of-service in wireless sensor networks: Attacks and defenses
-
Jan.-Mar.
-
D. Raymond and S. Midkiff, "Denial-of-service in wireless sensor networks: attacks and defenses," IEEE Pervasive Computering, vol.7, pp: 74-81, Jan.-Mar. 2008.
-
(2008)
IEEE Pervasive Computering
, vol.7
, pp. 74-81
-
-
Raymond, D.1
Midkiff, S.2
-
12
-
-
33845958392
-
Effects of denial of sleep attacks on wireless sensor network MAC protocols
-
D. Raymond , "Effects of denial of sleep attacks on wireless sensor network MAC protocols," in Proc. of the 7th Ann. IEEE Systems, Man, and Cybernetics, Information Assurance Workshop, pp: 297-304, 2006.
-
(2006)
Proc. of the 7th Ann. IEEE Systems, Man, and Cybernetics, Information Assurance Workshop
, pp. 297-304
-
-
Raymond, D.1
-
13
-
-
38349178199
-
Security and privacy for implantable medical devices
-
Jan.-Mar.
-
D. Halperin et al., "Security and privacy for implantable medical devices," IEEE Pervasive Computing, vol. 7, pp: 30-39, Jan.-Mar. 2008.
-
(2008)
IEEE Pervasive Computing
, vol.7
, pp. 30-39
-
-
Halperin, D.1
-
14
-
-
85164895018
-
-
Mica2 mote sensor, Crossbow Technology, http://www.xbow.com.
-
Mica2 Mote Sensor
-
-
-
16
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: new directions for implantable medical device security," in Proc. of Hot Topics in Security, pp: 1-7, 2008.
-
(2008)
Proc. of Hot Topics in Security
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
17
-
-
48949118124
-
Practical techniques for limiting disclosure of RF-equipped medical devices
-
E. Freudenthal, R. Spring, and L. Estevez, "Practical techniques for limiting disclosure of RF-equipped medical devices," in Proc. of Engineering in Medicine and Biology Workshop, pp: 82-85, 2007.
-
(2007)
Proc. of Engineering in Medicine and Biology Workshop
, pp. 82-85
-
-
Freudenthal, E.1
Spring, R.2
Estevez, L.3
-
18
-
-
38349178199
-
Security and privacy for implantable medical devices
-
D. Halperin et al., "Security and privacy for implantable medical devices," IEEE Pervasive Computing, pp: 30-39, 2008.
-
(2008)
IEEE Pervasive Computing
, pp. 30-39
-
-
Halperin, D.1
-
19
-
-
79551617255
-
-
USPTO Patent Application 20080044014
-
USPTO Patent Application 20080044014, "Secure telemetric link," http://www.freshpatents.com.
-
Secure Telemetric Link
-
-
-
20
-
-
26444435642
-
RFID guardian: A battery-powered mobile device for RFID privacy management
-
M. R. Rieback, B. Crispo, and A. S. Tanenbaum, "RFID guardian: a battery-powered mobile device for RFID privacy management," in Proc. of 10th Australasian Conf. on Information Security and Privacy, pp: 184- 194, 2005.
-
(2005)
Proc. of 10th Australasian Conf. on Information Security and Privacy
, pp. 184-194
-
-
Rieback, M.R.1
Crispo, B.2
Tanenbaum, A.S.3
-
21
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. B. Rasmussen et al., "Proximity-based access control for implantable medical devices," in Proc. of ACM CCS, pp: 410-419, 2009.
-
(2009)
Proc. of ACM CCS
, pp. 410-419
-
-
Rasmussen, K.B.1
-
22
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses," in Proc. of the 2008 IEEE Symp. on Security and Privacy, pp: 129-142, 2008.
-
(2008)
Proc. of the 2008 IEEE Symp. on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
-
24
-
-
0000874557
-
Theoretical foundations of the potential function method in pattern recognition learning
-
M. Aizerman, E. Braverman, and L. Rozonoer, "Theoretical foundations of the potential function method in pattern recognition learning," Automation and Remote Control, vol. 25, pp: 821-837, 1964.
-
(1964)
Automation and Remote Control
, vol.25
, pp. 821-837
-
-
Aizerman, M.1
Braverman, E.2
Rozonoer, L.3
-
25
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
B. E. Boser, I. M. Guyon, and V. N. Vapnik, "A training algorithm for optimal margin classifiers," in Proc. of the 5th Annual ACM Workshop on COLT, pp: 144-152, 1992.
-
(1992)
Proc. of the 5th Annual ACM Workshop on COLT
, pp. 144-152
-
-
Boser, B.E.1
Guyon, I.M.2
Vapnik, V.N.3
|