Security analysis of vulnerabilities and threats for medical information systems

被引:0
|
作者
Ju, Tea Kyung [1 ]
Hong, Chong Min [2 ]
Shin, Weon [3 ]
机构
[1] Department of Computers and Media Engineering, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[2] Department of Nursing, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[3] Department of Information Security, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
来源
ICIC Express Letters | 2015年 / 9卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Medical information systems
引用
收藏
页码:849 / 854
相关论文
共 50 条
  • [11] Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
    Costin, Andrei
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 45 - 54
  • [12] Security threats categories in healthcare information systems
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ismail, Zuraini
    HEALTH INFORMATICS JOURNAL, 2010, 16 (03) : 201 - 209
  • [13] Information Security and Insider Threats in Small Medical Practices
    Martin, Nancy L.
    Imboden, Thomas R.
    AMCIS 2014 PROCEEDINGS, 2014,
  • [14] Vulnerabilities and threats in distributed systems
    Bhargava, B
    Lilien, L
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 146 - 157
  • [15] Vulnerabilities and threats in distributed systems
    Bhargava, Bharat
    Lilien, Leszek
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3347 : 146 - 157
  • [16] Web services and grid security vulnerabilities and threats analysis and model.
    Demchenko, Y
    Gommans, L
    de Laat, C
    Oudenaarde, B
    2005 6th International Workshop on Grid Computing (GRID), 2005, : 262 - 267
  • [17] Finance and Security: Global Vulnerabilities, Threats, and Responses
    Osman, Tarek
    FOREIGN AFFAIRS, 2020, 99 (03) : 198 - 198
  • [18] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [19] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [20] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86