Understanding the security of interoperable medical devices using attack graphs.
Curtis R. TaylorKrishna K. VenkatasubramanianCraig A. ShuePublished in: HiCoNS (2014)
Keyphrases
- medical devices
- attack graphs
- security vulnerabilities
- attack graph
- intrusion detection
- real time
- attack scenarios
- information security
- computer security
- web services
- security policies
- security issues
- network management
- access control
- security management
- network security
- intrusion detection system
- metadata
- information systems