Login / Signup

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis.

Ragib HasanShams ZawoadShahid Al NoorMd Munirul HaqueDarrell Burke
Published in: COMPSAC (2016)
Keyphrases
  • insider attacks
  • insider threat
  • protocol stack
  • lightweight
  • communication networks
  • wireless sensor networks
  • network structure
  • decision support system
  • key management
  • cryptographic protocols
  • security architecture