A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AI Newaz, AK Sikder, MA Rahman… - … Computing for Healthcare, 2021 - dl.acm.org
… standards for medical devices based on the potential risk of … Moreover, future advances in
5G mobile communication systems … in healthcare companies across Europe, the United States, …

A systematic analysis on blockchain integration with healthcare domain: scope and challenges

S Khatri, FA Alzahrani, MTJ Ansari, A Agrawal… - IEEE …, 2021 - ieeexplore.ieee.org
… 2) Local and global risk analysis of blockchain application: To evaluate the security of the …
, “Patient healthcare smart card system: A unified medical record for access and analytics,” Proc…

[HTML][HTML] Influence of human factors on cyber security within healthcare organisations: A systematic review

S Nifakos, K Chandramouli, CK Nikolaou… - Sensors, 2021 - mdpi.com
… Objective: The objective of this systematic review is to identify commonly encountered …
of a healthcare organisation, resulting from the ignorance of cyber threat to healthcare. The …

[HTML][HTML] An integrated safety and security analysis for cyber-physical harm scenarios

NHC Guzman, I Kozine, MA Lundteigen - Safety science, 2021 - Elsevier
… for systematic risk identification. Section 5 demonstrates an application of this integrated
method in an illustrative case study … rely on diagrams such as the ones suggested by the Unified

[HTML][HTML] A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats …

MA Obaidat, S Obeidat, J Holst, A Al Hayajneh… - Computers, 2020 - mdpi.com
… cyber attacks, which threaten the security and privacy of users and systems. This survey
provides … The heterogeneity of device hardware and protocols makes it difficult to have a unified

[HTML][HTML] A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development

MTJ Ansari, FA Al-Zahrani, D Pandey… - BMC Medical Informatics …, 2020 - Springer
healthcare software as cyber-security is a significant risk … That is comparable to much more
than 69.78% of the United … This section provides a systematic and accurate description of the …

[HTML][HTML] Security and privacy in IoT-cloud-based e-health systems—A comprehensive review

C Butpheng, KH Yeh, H Xiong - Symmetry, 2020 - mdpi.com
… [23] analyzed the contemporary based on a systematic … merged and researched as a unified
system, with an emphasis … of personal data in risk analysis and compliance checking. The …

Systematic mapping study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
… , software security method, SDLC phases, publication venue, and SWOT analysis. The results
… [104] FA Al-Zahrani, ‘‘Evaluating the usable-security of healthcare software through unified

[HTML][HTML] A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
… The cause of a cyber-attack may be an inherent risk or a residual risk depending on its
risk analysis. Figure 8 depicts the nomenclature of cyber-attacks used in this review. Figure 9 …

Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations

SS Bhuyan, UY Kabir, JM Escareno, K Ector… - … of medical systems, 2020 - Springer
… threats to healthcare organizations, very few studies have systematically examined the …
This approach involves a risk assessment that begins with identifying potential risks. Once …