MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection

作者: Meng Zhang , Anand Raghunathan , Niraj K. Jha

DOI: 10.1109/TBCAS.2013.2245664

关键词:

摘要: … ical anomaly detection shows promising results for defending against naive attackers. … by physical anomaly detection. We implement the behavioral anomaly detection module based on …

参考文章(48)
Kevin Fu, Tamara Denning, Tadayoshi Kohno, Absence makes the heart grow fonder: new directions for implantable medical device security usenix security symposium. pp. 5- ,(2008)
Jayaraman Manni, Wei-Lung Lai, Ashar Aziz, Systems and methods for detecting communication channels of bots ,(2007)
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi, The EM Side-Channel(s) cryptographic hardware and embedded systems. pp. 29- 45 ,(2002) , 10.1007/3-540-36400-5_4
Heribert Baldus, Oscar Garcia Morchon, Axel Guenther Huebner, Personal security manager for ubiquitous patient monitoring ,(2009)
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
Albert B. Muaddi, Albert A. Tomko, Intrusion detection system for wireless networks ,(2003)
L. Schwiebert, S.K.S. Gupta, P.S.G. Auner, G. Abrams, R. Iezzi, P. McAllister, A biomedical smart sensor for the visually impaired ieee sensors. ,vol. 1, pp. 693- 698 ,(2002) , 10.1109/ICSENS.2002.1037187
D. Arney, K. K. Venkatasubramanian, O. Sokolsky, Insup Lee, Biomedical devices and systems security international conference of the ieee engineering in medicine and biology society. ,vol. 2011, pp. 2376- 2379 ,(2011) , 10.1109/IEMBS.2011.6090663