Lien Articles

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

602ba1c249646-PrconisationsIAUrg_avant_trad (1). (n.d.).

Achten. (2021). La cybersécurité dans le secteur de la santé Other Publication.


https://doi.org/10.3929/ethz-b-000517396

Alaiat, R., & Alenezi, S. (n.d.). NORTH DAKOTA STATE UNIVERSITY.


Ali, G., & M. Mijwil, M. (2024). Cybersecurity for Sustainable Smart Healthcare: State of
the Art, Taxonomy, Mechanisms, and Essential Roles. Mesopotamian Journal of
CyberSecurity, 4(2), 20–62. https://doi.org/10.58496/MJCS/2024/006

Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., Florin, M. V., Calcavecchia, F.,
Anderson, D., Burleson, W., Vogel, J. M., O’Leary, C., Eshaya-Chauvin, B., & Flahault, A.
(2020). Cybersecurity of Hospitals: Discussing the challenges and working towards
mitigating the risks. In BMC Medical Informatics and Decision Making (Vol. 20, Issue 1).
BioMed Central Ltd. https://doi.org/10.1186/s12911-020-01161-7

Barbier, B., Bossard, M., Durand, M., & Robin, T. (n.d.). Outiller l’ingénieur biomédical
dans la prévention des cyberattaques. https://doi.org/10.34746/ids213

Beavers, J., & Pournouri, S. (2019). Recent cyber attacks and vulnerabilities in medical
devices and healthcare institutions. In Advanced Sciences and Technologies for Security
Applications (pp. 249–267). Springer. https://doi.org/10.1007/978-3-030-11289-9_11

Betioui Karim, E., & Mohammed, H. (n.d.). Le potentiel des technologies numériques pour
renforcer l’impact des associations dans la lutte contre la pauvreté : cas des monnaies
locales et complémentaires The potential of digital technologies to strengthen the impact of
associations in the fight against poverty: the case of local and complementary currencies.
4(4). www.revuechercheur.com

Branch, L. E., Eller, W. S., Bias, T. K., Mccawley, M. A., Myers, D. J., Gerber, B. J., &
Bassler, J. R. (2016). Trends in Malware Attacks against United States Healthcare
Organizations. In Global Biosecurity (Vol. 1, Issue 1).
Canada, A., Bcomph, V. H., Ackery, A., Grant, K., Jamieson, T., Mbi, M. D., Mehta, S., &
Gpllm, M. D. (2024). Cyberattaques contre les systèmes d’information de santé au Canada.
https://doi.org/10.1503/cmaj.230436
f
carolinesaur. (n.d.). ENDERLIN_Clément_2011.
Chergui-Darif, M. (n.d.). Cyberattaques dans les hôpitaux, universités, administrations…
Comment mieux résister ? https://hal.science/hal-04330555

Clarke, M., Allen, C., Camacho, A., Copsey, J., Cuervo, L. G., Khalid, F., Lim, J., Mansilla,
C., McHugh, J., Pizarro, A., & Saeed, Y. (2023). Advancing Knowledge Translations to
Contribute to Resilience in Emergency Preparedness, Response and Recovery: The Role of
Evidence Aid. Prehospital and Disaster Medicine, 38(S1), s93–s93.
https://doi.org/10.1017/s1049023x23002601

Consortium national pour la cybersécurité (CNC). (n.d.-a).


Consortium national pour la cybersécurité (CNC). (n.d.-b).
Crowson, M., Martin, G., Kedia, S., Wasserman, L., & Wasserman, Y. (n.d.). Hospital
cybersecurity risks and gaps: Review (for the non-cyber professional).
Cybersécurité des dispositifs médicaux intégrant du logiciel au cours de leur cycle de vie.
(2019).

Dameff, C., Selzer, J., & Tully, J. L. (n.d.). Cybersecurity in Medicine: A Review.
https://doi.org/10.2196/preprints.35588

Daniel, C., Ivana, D., & Robert, M. (n.d.). A Systematic Literature Evaluation of
Cyberbiosecurity in Healthcare. https://doi.org/10.13140/RG.2.2.30908.97929

Desjardins, B., Mirsky, Y., Ortiz, M. P., Glozman, Z., Tarbox, L., Horn, R., & Horii, S. C.
(2020). DIcom images have been hacked! Now what? In American Journal of Roentgenology
(Vol. 214, Issue 4, pp. 727–735). American Roentgen Ray Society.
https://doi.org/10.2214/AJR.19.21958

Eichelberg, M., Kleber, K., & Kämmerer, M. (2020a). Cybersecurity Challenges for PACS
and Medical Imaging. Academic Radiology, 27(8), 1126–1139.
https://doi.org/10.1016/j.acra.2020.03.026

Eichelberg, M., Kleber, K., & Kämmerer, M. (2020b). Cybersecurity in PACS and Medical
Imaging: an Overview. In Journal of Digital Imaging (Vol. 33, Issue 6, pp. 1527–1542).
Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s10278-
020-00393-3

Eichelberg, M., Kleber, K., & Kämmerer, M. (2021). Cybersecurity Protection for PACS and
Medical Imaging: Deployment Considerations and Practical Problems. Academic Radiology,
28(12), 1761–1774. https://doi.org/10.1016/j.acra.2020.09.001

European Society of Radiology (ESR). (2014). Renewal of radiological equipment. Insights


into Imaging, 5(5), 543–546. https://doi.org/10.1007/s13244-014-0345-1

Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID
Experts Independently conducted by Ponemon Institute LLC. (2015).
Fontaine, J., Zaourar, L., Benazouz, M., & Chotin, R. (2022). Recherche de cliques pour un
problème de cybersécurité matériel. https://cea.hal.science/cea-03605100
Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., & Aylin, P. (2019). A
retrospective impact analysis of the WannaCry cyberattack on the NHS. Npj Digital
Medicine, 2(1). https://doi.org/10.1038/s41746-019-0161-6

Giraud, P., Fleury, B., le Prince, C., Falk, A. T., Rousse, C., Hance, H., Santini, J. J.,
Bicheron, D., Palisson, J., Hannoun-Lévi, J. M., Tack, K., Marchesi, V., & Azria, D. (2023).
Interprofessional recommendations on behalf of Société française de radiothérapie
oncologique for the prevention, protection and management of cyberattacks in radiation
oncology. Cancer/Radiotherapie, 27(8), 683–688.
https://doi.org/10.1016/j.canrad.2023.09.001

Hart, A., & Hertelendy, A. (2023). The Future Technologies that will Define Disaster
Medicine. Prehospital and Disaster Medicine, 38(S1), s89–s89.
https://doi.org/10.1017/s1049023x23002534

Hashmi, B., & Khan, R. (n.d.-a). Cybersecurity Protocols in Medical Engineering:


Safeguarding Advanced Cancer Treatment Technologies.

Hashmi, B., & Khan, R. (n.d.-b). Cybersecurity Protocols in Medical Engineering:


Safeguarding Advanced Cancer Treatment Technologies.

He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecurity challenges and
solutions under the climate of COVID-19: Scoping review. In Journal of Medical Internet
Research (Vol. 23, Issue 4). JMIR Publications Inc. https://doi.org/10.2196/21747

Herrera, C. V. P., Valcarcel, J. S. M., Díaz, M., Salazar, J. L. H., & Andrade-Arenas, L.
(2023). Cybersecurity in health sector: a systematic review of the literature. Indonesian
Journal of Electrical Engineering and Computer Science, 31(2), 1099–1108.
https://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108

Hosny, A., Parmar, C., Quackenbush, J., Schwartz, L. H., & Aerts, H. J. W. L. (2018).
Artificial intelligence in radiology. In Nature Reviews Cancer (Vol. 18, Issue 8, pp. 500–
510). Nature Publishing Group. https://doi.org/10.1038/s41568-018-0016-5

Hospitalia_62_Imagerie_AFIB. (n.d.).
Introduire la sécurité numérique dans les procédures d’acquisition. (n.d.).
https://doi.org/10.34746/ids213

Jalali, M. S., & Kaiser, J. P. (2018). Cybersecurity in hospitals: A systematic, organizational


perspective. In Journal of Medical Internet Research (Vol. 20, Issue 5). JMIR Publications
Inc. https://doi.org/10.2196/10059
Joëlle Hayek, P. (n.d.). LA CYBERSÉCURITÉ DES DISPOSITIFS MÉDICAUX SOUS LA
LOUPE DE L’AFIB.
Joyce, C., Roman, F. L., Miller, B., Jeffries, J., & Miller, R. C. (2021). Emerging
Cybersecurity Threats in Radiation Oncology. Advances in Radiation Oncology, 6(6).
https://doi.org/10.1016/j.adro.2021.100796

Kandasamy, K., Srinivas, S., Achuthan, K., & Rangan, V. P. (2022). Digital Healthcare -
Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST
Perspectives, and Recommendations. IEEE Access, 10, 12345–12364.
https://doi.org/10.1109/ACCESS.2022.3145372

Karagiannis, S., Magkos, E., Ntantogian, C., Cabecinha, R., & Fotis, T. (2023).
Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM
Communication. Applied Sciences (Switzerland), 13(18).
https://doi.org/10.3390/app131810072

Kirthana, K. S. (2022). Classification of COVID-19 using Chest X-ray Images with Deep
Learning Techniques-CNN & ResNet-18. International Journal of Innovative
Technology and Exploring Engineering, 11(6), 49–52.
https://doi.org/10.35940/ijitee.F9922.0511622

Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in
healthcare: A systematic review of modern threats and trends. In Technology and Health
Care (Vol. 25, Issue 1, pp. 1–10). IOS Press. https://doi.org/10.3233/THC-161263

Kulkarni, M., & Kolharkar, S. (2018). PACS: An Overview of the Technology and Related
Issues. https://www.researchgate.net/publication/327222366

La cybersécurité dans les dispositifs médicaux : enjeux et impacts. (2024).


https://polytech.grenoble-inp.fr/fr/lecole/

L’AUDIT DES PLANS DE CONTINUITE D’ACTIVITE ET DE LA GESTION DE CRISE


MERIEM DERRAHI & JORDANE GARCIA DERRAHI Meriem GARCIA Jordane 2013
GUIDE D’AUDIT. (n.d.).

Ma, P., Wang, Z., Hei, X., Zou, X., Zhang, J., Liu, Q., Lyu, X., & Zhuo, Z. (2019). A
Quantitative Approach for Medical Imaging Device Security Assessment. Proceedings - 49th
Annual IEEE/IFIP International Conference on Dependable Systems and Networks -
Supplemental Volume, DSN-S 2019, 5–6. https://doi.org/10.1109/DSN-S.2019.00008

Magjarevic, R., Ładyżyński, P., Fatimah Ibrahim, P., Lackovic, I., & Sacristan Rock, E.
(n.d.). IFMBE Proceedings Volume 77 Series Editor. http://www.springer.com/series/7403
Mahler, T., Elovici, Y., & Shahar, Y. (2020a). A New Methodology for Information Security
Risk Assessment for Medical Devices and Its Evaluation. http://arxiv.org/abs/2002.06938

Mahler, T., Elovici, Y., & Shahar, Y. (2020b). A New Methodology for Information Security
Risk Assessment for Medical Devices and Its Evaluation. http://arxiv.org/abs/2002.06938

Mahler, T., Shalom, E., Makori, A., Elovici, Y., & Shahar, Y. (2022). A Cyber-Security Risk
Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective.
Journal of Digital Imaging, 35(3), 666–677. https://doi.org/10.1007/s10278-021-00562-y

Maki, N., Nakata, R., Toyoda, S., Kasai, Y., Shin, S., & Seto, Y. (2020). An effective
cybersecurity exercises platform cyexec and its training contents. International Journal of
Information and Education Technology, 10(3), 215–221.
https://doi.org/10.18178/ijiet.2020.10.3.1366

Mancilla, D., & Moczygemba, J. (n.d.). Exploring Medical Identity Theft.


Matheu, S. N., Hernandez-Ramos, J. L., & Skarmeta, A. F. (2019). Toward a Cybersecurity
Certification Framework for the Internet of Things. IEEE Security and Privacy, 17(3), 66–76.
https://doi.org/10.1109/MSEC.2019.2904475

Mcbride, M. L. (2024). The Growing Number of Cybersecurity Vulnerabilities Inside


Healthcare Supply Chain. Cybersecurity and Innovative Technology Journal, 2(1), 1–14.
https://doi.org/10.52889/citj.v2i1.338

Messinis, S., Protonotarios, N., Tzortzis, I., Rallis, I., Kalogeras, D., & Doulamis, N. (2023).
Lightweight machine learning for privacy-preserving and secure networked medical devices:
The SEPTON project use cases. ACM International Conference Proceeding Series, 638–644.
https://doi.org/10.1145/3594806.3596562

Moses, V., & Korah, I. (2015). Lack of security of networked medical equipment in
radiology. In American Journal of Roentgenology (Vol. 204, Issue 2, pp. 343–353). American
Roentgen Ray Society. https://doi.org/10.2214/AJR.14.12882

Nissim, N., Mahler, T., Shalom, E., Goldenberg, I., Hasman, G., Makori, A., Kochav, I.,
Elovici, Y., & Shahar, Y. (n.d.). Know Your Enemy: Characteristics of Cyber-Attacks on
Medical Imaging Devices. http://www.malware-lab.com/

Oufi, N., Franck, B., De, L. A., Garza, C., Lot, N., & Jingxuan, M. A. (n.d.-a). Premiers
résultats d’une analyse conjointe FOH et cyber sécurité d’une cyberattaque en milieu
hospitalier.
Pavlek, I. B., Brnic, Z., Schmidt, S., Krpan, T., & Kralik, I. (2016). Old and outdated
radiology equipment in Croatia—radiation safety and economic consequences. Insights into
Imaging, 7(2), 283–284. https://doi.org/10.1007/s13244-016-0464-y
Plan de Continuité Informatique : principes de base Guide pratique organisationnel PGSSI-
S. (n.d.).

Portela, D., Nogueira-Leite, D., Almeida, R., & Cruz-Correia, R. (2023). Economic Impact of
a Hospital Cyberattack in a National Health System: Descriptive Case Study. JMIR
Formative Research, 7. https://doi.org/10.2196/41738

Premchand, P., Tinkuvasavya, G., Raghavendra, M. T., Gopi, G., Bhaskar, N., & Info, A.
(n.d.). As per UGC guidelines an electronic bar code is provided to seure your paper.
International Journal for Modern Trends in Science and Technology, 10(02), 143.
https://doi.org/10.46501/IJMTST1002020

quipement__La_securite_informatique_des_dispositi_-_HOSPIMEDIA. (n.d.).
Saibeni, S., Rondonotti, E., Iozzelli, A., Spina, L., Eugenio Tontini, G., Cavallaro, F.,
Ciscato, C., de Franchis, R., Sardanelli, F., Vecchi wwwwjgnetcom, M., Gionchetti, P.,
Endoscopy Service, G., Fondazione Ospedale Maggiore Policlinico, I., Elena, R., Andrea
Iozzelli, I., San Donato, P., Donato Milanese, S., Vecchi, M., Endoscopy Unit, G., &
Policlinico San Donato, I. (2007). Imaging of the small bowel in Crohn’s disease: A review
of old and new techniques MD, Series Editor. World J Gastroenterol, 13(24), 3279–3287.
www.wjgnet.comhttp://www.wjgnet.com/1007-9327/13/3279.asp

Scholarworks, S., & Thigpen, B. L. (n.d.). Strategies to Lower Security Risks Involving
Medical Devices in Strategies to Lower Security Risks Involving Medical Devices in Patient
Care Patient Care. https://scholarworks.waldenu.edu/dissertations

Securing Your Radiology Practice: Evidence-Based Strategies for Radiologists Compiled


From 10 Years of Cyberattacks and HIPAA Breaches Involving Medical Imaging. (n.d.-a).
https://perspectives.ahima.org/page/securing-your-radiology-practice-evidence-based-
strategies-for-radiologists-compiled-from-10-years-of-cyber

Securing Your Radiology Practice: Evidence-Based Strategies for Radiologists Compiled


From 10 Years of Cyberattacks and HIPAA Breaches Involving Medical Imaging. (n.d.-b).
https://perspectives.ahima.org/page/securing-your-radiology-practice-evidence-based-
strategies-for-radiologists-compiled-from-10-years-of-cyber

Singapore General Hospital., & Nanyang Technological University. (2005). 7th Annual
NTU-SGH Symposium 2005 : moving technology towards better patient care, [11-12 August
2005, Singapore National Eye Centre Auditorium : programme & abstracts]. Singapore
General Hospital.
Susaki, E. A., & Ueda, H. R. (2016). Whole-body and Whole-Organ Clearing and Imaging
Techniques with Single-Cell Resolution: Toward Organism-Level Systems Biology in
Mammals. In Cell Chemical Biology (Vol. 23, Issue 1, pp. 137–157). Elsevier Ltd.
https://doi.org/10.1016/j.chembiol.2015.11.009

Tam_Anthony_2021_rapport_projet_dirige (1). (n.d.).


Tervoort, T., de Oliveira, M. T., Pieters, W., van Gelder, P., Olabarriaga, S. D., &
Marquering, H. (2020). Solutions for mitigating cybersecurity risks caused by legacy
software in medical devices: A scoping review. IEEE Access, 8, 84352–84361.
https://doi.org/10.1109/ACCESS.2020.2984376

Torgersen, L. N. S., Schulz, S. M., Lugo, R. G., & Sütterlin, S. (2024). Patient informed
consent, ethical and legal considerations in the context of digital vulnerability with smart,
cardiac implantable electronic devices. PLOS Digital Health, 3(5), e0000507.
https://doi.org/10.1371/journal.pdig.0000507

Triplett, W. (n.d.). Ransomware Attacks on the Healthcare Industry (Vol. 4).


Triplett, W. J. (2024). Cybersecurity Vulnerabilities in Healthcare: A Threat to Patient
Security. Cybersecurity and Innovative Technology Journal, 2(1), 15–25.
https://doi.org/10.52889/citj.v2i1.333

US20130335576A1. (n.d.).
Varol, A., Institute of Electrical and Electronics Engineers. Lebanon Section., & Institute of
Electrical and Electronics Engineers. (n.d.). 8th International Symposium on Digital
Forensics and Security : 1-2 June 2020, Beirut, Lebanon.
Wang, Z., Ma, P., Zou, X., & Yang, T. (2019). Security of Medical Cyber-physical Systems:
An Empirical Study on Imaging Devices. http://arxiv.org/abs/1904.00224

Williams, C. M., Chaturvedi, R., & Chakravarthy, K. (2020). Cybersecurity risks in a


pandemic. In Journal of Medical Internet Research (Vol. 22, Issue 9). JMIR Publications Inc.
https://doi.org/10.2196/23692

Willing, M., Dresen, C., Haverkamp, U., & Schinzel, S. (2020). Analyzing medical device
connectivity and its effect on cyber security in german hospitals. BMC Medical Informatics
and Decision Making, 20(1). https://doi.org/10.1186/s12911-020-01259-y

Yuan, S., Fernando, A., & Klonoff, D. C. (2018). Standards for Medical Device
Cybersecurity in 2018. In Journal of Diabetes Science and Technology (Vol. 12, Issue 4, pp.
743–746). SAGE Publications Inc. https://doi.org/10.1177/1932296818763634

You might also like