2022
DOI: 10.1007/s11277-022-09873-x
|View full text |Cite
|
Sign up to set email alerts
|

Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach

Abstract: Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 14 publications
0
0
0
Order By: Relevance
“…According to Angel [9], the security of patients' electronic health records (EHRs) is a major concern in medical information systems, which poses special challenges. For this, they consider that it is important to protect the computer network of a health center against attacks, and it is necessary to implement mobile guards in the network nodes, thus defending the network against malware attacks to guarantee the information.…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
confidence: 99%
“…According to Angel [9], the security of patients' electronic health records (EHRs) is a major concern in medical information systems, which poses special challenges. For this, they consider that it is important to protect the computer network of a health center against attacks, and it is necessary to implement mobile guards in the network nodes, thus defending the network against malware attacks to guarantee the information.…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
confidence: 99%