Security analysis of vulnerabilities and threats for medical information systems

被引:0
|
作者
Ju, Tea Kyung [1 ]
Hong, Chong Min [2 ]
Shin, Weon [3 ]
机构
[1] Department of Computers and Media Engineering, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[2] Department of Nursing, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[3] Department of Information Security, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
来源
ICIC Express Letters | 2015年 / 9卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Medical information systems
引用
收藏
页码:849 / 854
相关论文
共 50 条
  • [1] Risks Management relating to Information Systems Security. Vulnerabilities and Threats in Information Systems
    Baicu, Floarea
    Baicu, Andrei Mihai
    QUALITY-ACCESS TO SUCCESS, 2012, 13 (128): : 112 - 116
  • [2] Analysis of Security Threats and Vulnerabilities for Train Control and Monitoring Systems
    Rekik, Mouna
    Gransart, Christophe
    Berbineau, Marion
    2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 693 - 698
  • [3] Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices
    McDonald, K.
    Curran, B.
    MEDICAL PHYSICS, 2014, 41 (06) : 545 - 546
  • [4] Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy
    Papp, Dorottya
    Ma, Zhendong
    Buttyan, Levente
    2015 THIRTEENTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2015, : 145 - 152
  • [5] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [6] Classification of security threats in information systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    Ben Aissa, Anis
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 489 - 496
  • [7] Investigating Security Threats in Information Systems
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    CREATING GLOBAL ECONOMIES THROUGH INNOVATION AND KNOWLEDGE MANAGEMENT: THEORY & PRACTICE, VOLS 1-3, 2009, : 1412 - 1419
  • [8] The Analysis of Threats to Information Security of Protocols and Lighting Control Systems
    Ivliyev, S. N.
    Krylova, S. L.
    Shikov, S. A.
    MORDOVIA UNIVERSITY BULLETIN, 2018, 28 (01): : 85 - 94
  • [9] Analysis of Data Exchange Systems about Information Security Threats
    E. Yu. Pavlenko
    N. V. Polosukhin
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1365 - 1372
  • [10] COMPUTER SECURITY - THREATS, VULNERABILITIES AND COUNTERMEASURES
    SMITH, M
    INFORMATION AGE, 1989, 11 (04): : 205 - 210