-
1
-
-
34548702421
-
Adverse interaction between a left ventricular assist device and an implantable cardioverter defibrillator
-
Sep
-
J. C. Matthews, D. Betley, F. Morady, and F. Pelosi, "Adverse interaction between a left ventricular assist device and an implantable cardioverter defibrillator," J. Cardiovasc. Electrophysiol., vol. 18, no. 10, pp. 1107-1108, Sep 2007.
-
(2007)
J. Cardiovasc. Electrophysiol.
, vol.18
, Issue.10
, pp. 1107-1108
-
-
Matthews, J.C.1
Betley, D.2
Morady, F.3
Pelosi, F.4
-
2
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel, "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Security and Privacy, 2008 IEEE Symposium on, 2008, pp. 129-142.
-
(2008)
Security and Privacy, 2008 IEEE Symposium on
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
3
-
-
84885876349
-
Hacking medical devices for fun and insulin: Breaking the human scada system
-
J. Radcliffe, "Hacking medical devices for fun and insulin: Breaking the human scada system," Black Hat Conference presentation slides 2011, 2011.
-
(2011)
Black Hat Conference Presentation Slides 2011
-
-
Radcliffe, J.1
-
5
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Oct.
-
K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, Oct. 2004. [Online]. Available: http://dx.doi.org/10.1109/MPRV.2004.18
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
6
-
-
45849120977
-
-
Department of Computer Science, University of Virginia, USA, Tech. Rep
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring," Department of Computer Science, University of Virginia, USA, Tech. Rep., 2006.
-
(2006)
ALARM-NET: Wireless Sensor Networks for Assisted-living and Residential Monitoring
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
7
-
-
35548956399
-
Detection of subtle nocturnal motor activity from 3-d accelerometry recordings in epilepsy patients
-
T. Nijsen, P. J. M. Cluitmans, J. Arends, and P. Griep, "Detection of subtle nocturnal motor activity from 3-d accelerometry recordings in epilepsy patients," Biomedical Engineering, IEEE Transactions on, vol. 54, no. 11, pp. 2073-2081, 2007.
-
(2007)
Biomedical Engineering, IEEE Transactions on
, vol.54
, Issue.11
, pp. 2073-2081
-
-
Nijsen, T.1
Cluitmans, P.J.M.2
Arends, J.3
Griep, P.4
-
8
-
-
84868129314
-
Development of a body sensor network to detect motor patterns of epileptic seizures
-
A. Dalton, S. Patel, A. Chowdhury, M. Welsh, T. Pang, S. Schachter, G. OLaighin, and P. Bonato, "Development of a body sensor network to detect motor patterns of epileptic seizures," Biomedical Engineering, IEEE Transactions on, vol. 59, no. 11, pp. 3204-3211, 2012.
-
(2012)
Biomedical Engineering, IEEE Transactions on
, vol.59
, Issue.11
, pp. 3204-3211
-
-
Dalton, A.1
Patel, S.2
Chowdhury, A.3
Welsh, M.4
Pang, T.5
Schachter, S.6
Olaighin, G.7
Bonato, P.8
-
9
-
-
77950999734
-
Detection of nocturnal frontal lobe seizures in pediatric patients by means of accelerometers: A first study
-
K. Cuppens, L. Lagae, B. Ceulemans, S. Van Huffel, and B. Vanrumste, "Detection of nocturnal frontal lobe seizures in pediatric patients by means of accelerometers: A first study," in Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE, 2009, pp. 6608-6611.
-
(2009)
Engineering in Medicine and Biology Society, 2009. EMBC 2009. Annual International Conference of the IEEE
, pp. 6608-6611
-
-
Cuppens, K.1
Lagae, L.2
Ceulemans, B.3
Van Huffel, S.4
Vanrumste, B.5
-
10
-
-
33846666658
-
Quantification of tremor and bradykinesia in parkinson's disease using a novel ambulatory monitoring system
-
A. Salarian, H. Russmann, C. Wider, P. Burkhard, F. J. G. Vingerhoets, and K. Aminian, "Quantification of tremor and bradykinesia in parkinson's disease using a novel ambulatory monitoring system," Biomedical Engineering, IEEE Transactions on, vol. 54, no. 2, pp. 313-322, 2007.
-
(2007)
Biomedical Engineering, IEEE Transactions on
, vol.54
, Issue.2
, pp. 313-322
-
-
Salarian, A.1
Russmann, H.2
Wider, C.3
Burkhard, P.4
Vingerhoets, F.J.G.5
Aminian, K.6
-
11
-
-
84861898930
-
A body sensor network to monitor parkinsonian symptoms: Extracting features on the nodes
-
S. Patel, K. Lorincz, R. Hughes, N. Huggins, J. Growdon, D. Standaert, J. Dy, M. Welsh, and P. Bonato, "A body sensor network to monitor parkinsonian symptoms: extracting features on the nodes," in 5th International Workshop on Wearable Micro and Nanosystems for Personalised Health, pHealth2008, 2008, pp. 21-23.
-
(2008)
5th International Workshop on Wearable Micro and Nanosystems for Personalised Health, pHealth2008
, pp. 21-23
-
-
Patel, S.1
Lorincz, K.2
Hughes, R.3
Huggins, N.4
Growdon, J.5
Standaert, D.6
Dy, J.7
Welsh, M.8
Bonato, P.9
-
12
-
-
79955670717
-
Feature selection for accelerometer-based posture analysis in parkinson's disease
-
L. Palmerini, L. Rocchi, S. Mellone, F. Valzania, and L. Chiari, "Feature selection for accelerometer-based posture analysis in Parkinson's disease," Information Technology in Biomedicine, IEEE Transactions on, vol. 15, no. 3, pp. 481-490, 2011.
-
(2011)
Information Technology in Biomedicine, IEEE Transactions on
, vol.15
, Issue.3
, pp. 481-490
-
-
Palmerini, L.1
Rocchi, L.2
Mellone, S.3
Valzania, F.4
Chiari, L.5
-
13
-
-
33244467676
-
Ambulatory motor assessment in parkinson's disease
-
N. L. Keijsers, M. W. Horstink, and S. C. Gielen, "Ambulatory motor assessment in parkinson's disease," Movement Disorders, vol. 21, no. 1, pp. 34-44, 2006. [Online]. Available: http://dx.doi.org/10.1002/mds.20633
-
(2006)
Movement Disorders
, vol.21
, Issue.1
, pp. 34-44
-
-
Keijsers, N.L.1
Horstink, M.W.2
Gielen, S.C.3
-
14
-
-
34547371054
-
System architecture of a wireless body area sensor network for ubiquitous health monitoring
-
C. Otto, A. Milenkovic, C. Sanders, and E. Jovanov, "System architecture of a wireless body area sensor network for ubiquitous health monitoring," Journal of Mobile Multimedia, vol. 1, no. 4, pp. 307-326, 2006.
-
(2006)
Journal of Mobile Multimedia
, vol.1
, Issue.4
, pp. 307-326
-
-
Otto, C.1
Milenkovic, A.2
Sanders, C.3
Jovanov, E.4
-
15
-
-
73049087409
-
A survey on wearable sensorbased systems for health monitoring and prognosis
-
A. Pantelopoulos and N. Bourbakis, "A survey on wearable sensorbased systems for health monitoring and prognosis," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 40, no. 1, pp. 1-12, 2010.
-
(2010)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
, vol.40
, Issue.1
, pp. 1-12
-
-
Pantelopoulos, A.1
Bourbakis, N.2
-
16
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: A survey
-
P. Kumar and H.-J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey," Sensors, vol. 12, no. 1, pp. 55-91, 2011. [Online]. Available: http://www.mdpi.com/1424-8220/12/1/55
-
(2011)
Sensors
, vol.12
, Issue.1
, pp. 55-91
-
-
Kumar, P.1
Lee, H.-J.2
-
19
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," Wireless Communications, IEEE, vol. 17, no. 1, pp. 51-58, 2010.
-
(2010)
Wireless Communications, IEEE
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
20
-
-
11144340927
-
Designing secure sensor networks
-
E. Shi and A. Perrig, "Designing secure sensor networks," Wireless Communications, IEEE, vol. 11, no. 6, pp. 38-43, 2004.
-
(2004)
Wireless Communications, IEEE
, vol.11
, Issue.6
, pp. 38-43
-
-
Shi, E.1
Perrig, A.2
-
21
-
-
79956094375
-
Body area networks: A survey
-
Apr.
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung, "Body area networks: A survey," Mobile Networks and Applications, vol. 16, no. 2, pp. 171-193, Apr. 2011. [Online]. Available: http://dx.doi.org/10.1007/s11036- 010-0260-8
-
(2011)
Mobile Networks and Applications
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
24
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
may
-
B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Security and Privacy, 2005 IEEE Symposium on, may 2005, pp. 49-63.
-
(2005)
Security and Privacy, 2005 IEEE Symposium on
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
25
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
26
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1570870503000088
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
27
-
-
84947273682
-
The sybil attack
-
ser. IPTPS '01. London, UK, UK: Springer-Verlag
-
J. R. Douceur, "The sybil attack," in Revised Papers from the First International Workshop on Peer-to-Peer Systems, ser. IPTPS '01. London, UK, UK: Springer-Verlag, 2002, pp. 251-260. [Online]. Available: http://dl.acm.org/citation.cfm?id=646334.687813
-
(2002)
Revised Papers from the First International Workshop on Peer-to-Peer Systems
, pp. 251-260
-
-
Douceur, J.R.1
-
28
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
London, UK, UK: Springer-Verlag
-
F. Stajano and R. J. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proceedings of the 7th International Workshop on Security Protocols. London, UK, UK: Springer-Verlag, 2000, pp. 172-194. [Online]. Available: http://dl.acm.org/citation.cfm?id= 647217.760118
-
(2000)
Proceedings of the 7th International Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.J.2
-
29
-
-
35348879637
-
The sleep deprivation attack in sensor networks: Analysis and methods of defense
-
M. Pirretti, S. Zhu, N. Vijaykrishnan, P. McDaniel, M. T. Kandemir, and R. R. Brooks, "The sleep deprivation attack in sensor networks: Analysis and methods of defense," International Journal of Distributed Sensor Networks, vol. 2, no. 3, pp. 267-287, 2006.
-
(2006)
International Journal of Distributed Sensor Networks
, vol.2
, Issue.3
, pp. 267-287
-
-
Pirretti, M.1
Zhu, S.2
Vijaykrishnan, N.3
McDaniel, P.4
Kandemir, M.T.5
Brooks, R.R.6
-
30
-
-
0003406377
-
-
Upper Saddle River, NJ, USA: Prentice Hall PTR
-
N. Doraswamy and D. Harkins, IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Upper Saddle River, NJ, USA: Prentice Hall PTR, 1999.
-
(1999)
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
-
-
Doraswamy, N.1
Harkins, D.2
-
31
-
-
7244238418
-
Virtual private networks: An overview with performance evaluation
-
S. Khanvilkar and A. Khokhar, "Virtual private networks: an overview with performance evaluation," Communications Magazine, IEEE, vol. 42, no. 10, pp. 146-154, 2004.
-
(2004)
Communications Magazine, IEEE
, vol.42
, Issue.10
, pp. 146-154
-
-
Khanvilkar, S.1
Khokhar, A.2
-
32
-
-
77953155714
-
A wearable smartphone-based platform for real-time cardiovascular disease detection via electrocardiogram processing
-
J. Oresko, Z. Jin, J. Cheng, S. Huang, Y. Sun, H. Duschl, and A. Cheng, "A wearable smartphone-based platform for real-time cardiovascular disease detection via electrocardiogram processing," Information Technology in Biomedicine, IEEE Transactions on, vol. 14, no. 3, pp. 734-740, 2010.
-
(2010)
Information Technology in Biomedicine, IEEE Transactions on
, vol.14
, Issue.3
, pp. 734-740
-
-
Oresko, J.1
Jin, Z.2
Cheng, J.3
Huang, S.4
Sun, Y.5
Duschl, H.6
Cheng, A.7
-
33
-
-
70449572356
-
Design and implementation of a distributed fall detection system-personal server
-
M. Estudillo-Valderrama, L. Roa, J. Reina-Tosina, and D. Naranjo-Hernandez, "Design and implementation of a distributed fall detection system-personal server," Information Technology in Biomedicine, IEEE Transactions on, vol. 13, no. 6, pp. 874-881, 2009.
-
(2009)
Information Technology in Biomedicine, IEEE Transactions on
, vol.13
, Issue.6
, pp. 874-881
-
-
Estudillo-Valderrama, M.1
Roa, L.2
Reina-Tosina, J.3
Naranjo-Hernandez, D.4
-
34
-
-
84861954788
-
Chronious: A wearable platform for monitoring and management of patients with chronic disease
-
C. Bellos, A. Papadopoulos, R. Rosso, and D. Fotiadis, "CHRONIOUS: A wearable platform for monitoring and management of patients with chronic disease," in Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE, 2011, pp. 864-867.
-
(2011)
Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE
, pp. 864-867
-
-
Bellos, C.1
Papadopoulos, A.2
Rosso, R.3
Fotiadis, D.4
-
35
-
-
85032751754
-
Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain
-
C. Aguilar-Melchor, S. Fau, C. Fontaine, G. Gogniat, and R. Sirdey, "Recent advances in homomorphic encryption: A possible future for signal processing in the encrypted domain," Signal Processing Magazine, IEEE, vol. 30, no. 2, pp. 108-117, 2013.
-
(2013)
Signal Processing Magazine, IEEE
, vol.30
, Issue.2
, pp. 108-117
-
-
Aguilar-Melchor, C.1
Fau, S.2
Fontaine, C.3
Gogniat, G.4
Sirdey, R.5
-
37
-
-
80053293956
-
The relationship between cen 13606, hl7, and openehr
-
P. Schloeffel, T. Beale, G. Hayworth, S. Heard, and H. Leslie, "The relationship between CEN 13606, HL7, and openEHR," in Health Informatics Conference, 2006.
-
(2006)
Health Informatics Conference
-
-
Schloeffel, P.1
Beale, T.2
Hayworth, G.3
Heard, S.4
Leslie, H.5
-
40
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," Communications Surveys Tutorials, IEEE, vol. 8, no. 2, pp. 2-23, 2006.
-
(2006)
Communications Surveys Tutorials, IEEE
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
41
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming sensor networks: attack and defense strategies," Network, IEEE, vol. 20, no. 3, pp. 41-47, 2006.
-
(2006)
Network, IEEE
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
42
-
-
77951462755
-
Bluetooth cavities
-
P. McFedries, "Bluetooth cavities," IEEE Spectrum, vol. 42, no. 6, p. 88, 2005.
-
(2005)
IEEE Spectrum
, vol.42
, Issue.6
, pp. 88
-
-
McFedries, P.1
-
45
-
-
11244354854
-
Security considerations for ieee 802.15.4 networks
-
ser. WiSe '04. New York, NY, USA: ACM
-
N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," in Proceedings of the 3rd ACM workshop on Wireless security, ser. WiSe '04. New York, NY, USA: ACM, 2004, pp. 32-42. [Online]. Available: http://doi.acm.org/10.1145/1023646.1023654
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 32-42
-
-
Sastry, N.1
Wagner, D.2
-
46
-
-
84935078039
-
Security weaknesses in bluetooth
-
ser. CT-RSA, London, UK, UK: Springer-Verlag, 2001
-
M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth," in Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA, ser. CT-RSA 2001. London, UK, UK: Springer-Verlag, 2001, pp. 176-191. [Online]. Available: http://dl.acm.org/citation.cfm?id= 646139.680779
-
(2001)
Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
, pp. 176-191
-
-
Jakobsson, M.1
Wetzel, S.2
-
47
-
-
34247394276
-
Review of the bluetooth security architecture
-
D. Singeĺee and B. Preneel, "Review of the Bluetooth security architecture," Information Security Bulletin, vol. 11, pp. 45-53, 2006.
-
(2006)
Information Security Bulletin
, vol.11
, pp. 45-53
-
-
Singeĺee, D.1
Preneel, B.2
-
48
-
-
71949122821
-
Perils of transitive trust in the domain name system
-
ser. IMC '05. Berkeley, CA, USA: USENIX Association
-
V. Ramasubramanian and E. G. Sirer, "Perils of transitive trust in the domain name system," in Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, ser. IMC '05. Berkeley, CA, USA: USENIX Association, 2005, pp. 35-35. [Online]. Available: http://dl.acm.org/citation.cfm?id=1251086. 1251121
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 35-35
-
-
Ramasubramanian, V.1
Sirer, E.G.2
|