2021
DOI: 10.1007/978-981-16-1480-4_16
|View full text |Cite
|
Sign up to set email alerts
|

Software for Analyzing Security for Healthcare Organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Dupont et al wrote a protocol dissector for the IDS Forescout Silent-Defense [141]. Magomedov recommends a signature-based approach for identified DICOM vulnerabilities [6]. Nguyen et al designed a secure logger for medical devices with some detection capabilities.…”
Section: A Rq 1 -Utilized Detection Approach and Employed Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…Dupont et al wrote a protocol dissector for the IDS Forescout Silent-Defense [141]. Magomedov recommends a signature-based approach for identified DICOM vulnerabilities [6]. Nguyen et al designed a secure logger for medical devices with some detection capabilities.…”
Section: A Rq 1 -Utilized Detection Approach and Employed Technologymentioning
confidence: 99%
“…As Coventry et al emphasized, securing legacy medical devices seems more crucial than ever. Despite these findings, current security scanners often fail to detect vulnerabilities in the healthcare environment because they do not have modules for medical devices and systems [6].…”
Section: Introductionmentioning
confidence: 99%