2021 10th International Conference on System Modeling &Amp; Advancement in Research Trends (SMART) 2021
DOI: 10.1109/smart52563.2021.9676266
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security in Smart Hospitals: A Investigational Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…al. in [33] reviewed several literature that identify and discuss threats and concerns in healthcare systems. This paper focused to manage workflow of patient's data, secure collection, storage and transmission of clinical patient's data, software solution for viewing and processing of diagnostic data.…”
Section: Related Workmentioning
confidence: 99%
“…al. in [33] reviewed several literature that identify and discuss threats and concerns in healthcare systems. This paper focused to manage workflow of patient's data, secure collection, storage and transmission of clinical patient's data, software solution for viewing and processing of diagnostic data.…”
Section: Related Workmentioning
confidence: 99%
“…The authors have detailed the examples of adversarial in detail by implementing the perturbations. In addition, Ranganayaki et al [13] have detailed and worked on introducing the hospitals security by reducing the cyber threats for ensuring a secure and efficient communication mechanism for smart hospitals. Furthermore, Mushtaq et al [14] introduced and discussed a number of security threats that can be encountered while ensuring a secure communication process among intelligent devices in smart hospitals.…”
Section: Motivation and Objectivementioning
confidence: 99%
“…And so, according to The Institute of Risk Management (2018), cyber risk is defined as “any risk of financial loss, disruption or damage to the reputation of an organization from some sort of failure of its information technology systems” (The Institute of Risk Management, 2018). Thus, managing cyber risk comprises many forms such as the utilization of cybersecurity protection for vulnerability mitigation (Bokan & Santos, 2021; Ranganayaki et al., 2021), understanding cyber risk losses on a network (see, e.g., Acemoglu et al., 2016; Santos et al., 2007), cyber‐insurance for minimizing the consequential financial risk (Federal Financial Institutions Examination Council, 2018; X. Zhang et al., 2023), and the use of risk management frameworks for risk identification and assessment (Meszaros & Buchalcevova, 2017; Millar, 2016; Paté‐Cornell et al., 2018; Rios Insua et al., 2021).…”
Section: Introductionmentioning
confidence: 99%