-
3
-
-
84883106841
-
Insulin pumps-global pipeline analysis, opportunity assessment and market forecasts to 2016
-
"Insulin pumps-global pipeline analysis, opportunity assessment and market forecasts to 2016, GlobalData," http://www.globaldata.com.
-
GlobalData
-
-
-
4
-
-
84883101757
-
-
http://www.tudiabetes.org/forum/topics/more-interesting-facts-on.
-
-
-
-
6
-
-
84883064406
-
-
http://www.theregister.co.uk/2011/10/27/fatal insulin pump attack.
-
-
-
-
7
-
-
84883066072
-
-
National Diabetes Information Clearinghouse
-
National Diabetes Information Clearinghouse, http://www.diabetes.niddk. nih.gov/dm/pubs/hypoglycemia/index.aspx.
-
-
-
-
8
-
-
80053973692
-
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
-
C. Li, A. Raghunathan and N. K. Jha, "Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System", in Proc. of the 13th IEEE Intl. Conf. on e-Health Networking, Applications and Services, pp. 150-156, 2011.
-
(2011)
Proc. of the 13th IEEE Intl. Conf. on E-Health Networking, Applications and Services
, pp. 150-156
-
-
Li, C.1
Raghunathan, A.2
Jha, N.K.3
-
9
-
-
84883058408
-
-
J, Radcliffe. https://media.blackhat.com/bh-us-11/Radcliffe/BH US 11 Radcliff Hacking Medical Devices WP.pdf
-
-
-
Radcliffe, J.1
-
10
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses," In Proc. of the 2008 IEEE Symp. on SP'08, pp. 129-142, 2008.
-
(2008)
Proc. of the 2008 IEEE Symp. on SP'08
, pp. 129-142
-
-
Halperin, D.1
-
11
-
-
84883131606
-
Safety-assured development of the GPCA infusion pump software
-
Taipei
-
B. Kim et al., "Safety-Assured Development of the GPCA Infusion Pump Software," In Proc. of the Intl. Conf. on EMSOFT'11, Taipei, 2011.
-
(2011)
Proc. of the Intl. Conf. on EMSOFT'11
-
-
Kim, B.1
-
13
-
-
77953972283
-
Absence makes the heart grow fonder: New directions for implantable medical device security
-
T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder: new directions for implantable medical device security," in Proc. of the 3rd Conf. on Hot topics on security, pp. 1-7, 2008.
-
(2008)
Proc. of the 3rd Conf. on Hot Topics on Security
, pp. 1-7
-
-
Denning, T.1
Fu, K.2
Kohno, T.3
-
14
-
-
48949118124
-
Practical techniques for limiting disclosure of RF-equipped medical devices
-
E. Freudenthal, R. Spring, and L. Estevez, "Practical techniques for limiting disclosure of RF-equipped medical devices," in Proc. of Engineering in Medicine and Biology Workshop, pp. 82-85, 2007.
-
(2007)
Proc. of Engineering in Medicine and Biology Workshop
, pp. 82-85
-
-
Freudenthal, E.1
Spring, R.2
Estevez, L.3
-
15
-
-
74049128234
-
Proximity-based access control for implantable medical devices
-
K. B. Rasmussen et al., "Proximity-based access control for implantable medical devices," in Proc. of ACM CCS '09, pp. 410-419, 2009.
-
(2009)
Proc. ACM CCS '09
, pp. 410-419
-
-
Rasmussen, K.B.1
-
16
-
-
79551649543
-
Defending resource depletion attacks on implantable medical devices
-
X. Hei et al., "Defending Resource Depletion Attacks on Implantable Medical Devices," in Proc. of IEEE Globecom'10, pp. 1-5, 2010.
-
(2010)
Proc. IEEE Globecom'10
, pp. 1-5
-
-
Hei, X.1
-
17
-
-
79960856885
-
Biometric-based Two-level Secure Access Control for Implantable Medical Devices during Emergencies
-
X. Hei and X. Du, "Biometric-based Two-level Secure Access Control for Implantable Medical Devices during Emergencies," in Proc. of IEEE INFOCOM'11, pp. 346-350, 2011.
-
(2011)
Proc. IEEE INFOCOM'11
, pp. 346-350
-
-
Hei, X.1
Du, X.2
-
18
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota et al., "They can hear your heartbeats: Non-invasive security for implantable medical devices," in Proc. ACM Conf. SIGCOMM'11, pp. 2-13, 2011.
-
(2011)
Proc. ACM Conf. SIGCOMM'11
, pp. 2-13
-
-
Gollakota, S.1
-
19
-
-
80051864290
-
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare
-
J. Sun et al., "HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare," in Proc. of ICDCS'11, pp. 373-382, 2011.
-
(2011)
Proc. of ICDCS'11
, pp. 373-382
-
-
Sun, J.1
-
20
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
Shanghai, China Apr
-
F. Xu et al., "IMDGuard: Securing implantable medical devices with the external wearable guardian," In Proc. of IEEE INFOCOM'11, Shanghai, China, Apr. 2011.
-
(2011)
Proc. IEEE INFOCOM'11
-
-
Xu, F.1
-
22
-
-
84883088316
-
Reliable clinical monitoring usingwireless sensor networks: Experience in a step-down hospital unit
-
Zurich, Switzerland
-
G. Hackmann et al., "Reliable Clinical Monitoring usingWireless Sensor Networks: Experience in a Step-down Hospital Unit," in Proc. of ACM Conf. on SenSys'10, Zurich, Switzerland, 2010.
-
(2010)
Proc. ACM Conf. on SenSys'10
-
-
Hackmann, G.1
-
23
-
-
84871956543
-
Enabling pervasive healthcare with privacy preservation in smart community
-
Ottawa, Canada
-
X. Liang et al., "Enabling Pervasive Healthcare with Privacy Preservation in Smart Community", in Proc. of IEEE ICC'12, Ottawa, Canada, 2012.
-
(2012)
Proc. IEEE ICC'12
-
-
Liang, X.1
-
24
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks", in Journal of Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.
-
(1995)
Journal of Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
25
-
-
84883066381
-
-
http://en.wikipedia.org/wiki/Genetic algorithm.
-
-
-
-
26
-
-
84883100424
-
-
(statistics)
-
http://en.wikipedia.org/wiki/Cross-validation (statistics).
-
-
-
|