Security analysis of vulnerabilities and threats for medical information systems

被引:0
|
作者
Ju, Tea Kyung [1 ]
Hong, Chong Min [2 ]
Shin, Weon [3 ]
机构
[1] Department of Computers and Media Engineering, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[2] Department of Nursing, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
[3] Department of Information Security, Tongmyong University, 428, Sinseon-ro, Nam-gu, Busan, Korea, Republic of
来源
ICIC Express Letters | 2015年 / 9卷 / 03期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Medical information systems
引用
收藏
页码:849 / 854
相关论文
共 50 条
  • [31] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [32] A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions
    Kumar, Chandan
    Arya, Y. D. S.
    Agarwal, Gaurav
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1963 - 1967
  • [33] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Humayun, Mamoona
    Niazi, Mahmood
    Jhanjhi, N. Z.
    Alshayeb, Mohammad
    Mahmood, Sajjad
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (04) : 3171 - 3189
  • [34] Wireless LAN Security Threats & Vulnerabilities: A Literature Review
    Waliullah, Md.
    Gan, Diane
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 176 - 183
  • [35] Security of Web Applications: Threats, Vulnerabilities, and Protection Methods
    Mohammed, Asma
    Alkhathami, Jamilah
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 167 - 176
  • [36] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48
  • [37] Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
    Mamoona Humayun
    Mahmood Niazi
    NZ Jhanjhi
    Mohammad Alshayeb
    Sajjad Mahmood
    Arabian Journal for Science and Engineering, 2020, 45 : 3171 - 3189
  • [38] AN ANALYSIS OF SECURITY THREATS IN VoIP COMMUNICATION SYSTEMS
    Neacsu, Eugen
    Schiopu, Paul
    PROCEEDINGS OF THE 2020 12TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI-2020), 2020,
  • [39] Analysis of Research on Specific Insider Information Security Threats
    Zaytsev, Anton
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 725 - 735
  • [40] Information Security Threats Analysis for E-Learning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    TECHNOLOGY ENHANCED LEARNING: QUALITY OF TEACHING AND EDUCATIONAL REFORM, 2010, 73 : 285 - 291