2022
DOI: 10.3233/ica-220689
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability prediction for secure healthcare supply chain service delivery

Abstract: Healthcare organisations are constantly facing sophisticated cyberattacks due to the sensitivity and criticality of patient health care information and wide connectivity of medical devices. Such attacks can pose potential disruptions to critical services delivery. There are number of existing works that focus on using Machine Learning (ML) models for predicting vulnerability and exploitation but most of these works focused on parameterized values to predict severity and exploitability. This paper proposes a no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 30 publications
0
1
0
Order By: Relevance
“…Shareeful et al 59 proposed a cybersecurity‐based vulnerability detection in a healthcare supply chain. They used the ontology axioms method for the formal specifications in vulnerability assessment.…”
Section: Taxonomy Of Security and Privacy Issues And Its Solutions In...mentioning
confidence: 99%
“…Shareeful et al 59 proposed a cybersecurity‐based vulnerability detection in a healthcare supply chain. They used the ontology axioms method for the formal specifications in vulnerability assessment.…”
Section: Taxonomy Of Security and Privacy Issues And Its Solutions In...mentioning
confidence: 99%
“…Highly advanced Artificial Intelligence (AI), along with its associated sub-disciplines like machine learn-ing (ML), paved the way for a wide range of real-world applications in sectors such as visual recognition systems, language understanding, automated translation techniques, and robotic innovations [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. In recent years, the most prominent sub-field of machine learning (ML), Artificial Neural Networks (ANNs), have been widely and effectively utilized to transform technological advancements and elevate both businesses and daily life towards a new stage of AI sophistication [19][20][21][22][23][24][25].…”
Section: Generalmentioning
confidence: 99%
“…1 has K hidden layers with N (i) total neurons in the i-th layer; a(i, j) denote the activation functions of the j-th neuron in the i-th layer; for convenience we assume that the 0-th layer is the input layer (with a(0, j) ≡ x j , where x j denotes the j-th input; and (K + 1)-th layer is the input layer (with a(K + 1, j) ≡ y j , where y j denotes the j-output. Let w = [w (1) ; w (2) ; . .…”
Section: The Set-upmentioning
confidence: 99%
“…There is no doubt about the positive impact of digital transformation in the healthcare sector. However, despite these benefits, the adoption of digital technology provides many Cyber Security (CS) challenges that can pose any potential risks within the healthcare system [ 1 ]. This massive technological transformation increases the attack surface where threat actors can exploit possible threats for any potential risk within the Health Care Information Infrastructure (HCII).…”
Section: Introductionmentioning
confidence: 99%