Lien Articles
Lien Articles
Lien Articles
Argaw, S. T., Troncoso-Pastoriza, J. R., Lacey, D., Florin, M. V., Calcavecchia, F.,
Anderson, D., Burleson, W., Vogel, J. M., O’Leary, C., Eshaya-Chauvin, B., & Flahault, A.
(2020). Cybersecurity of Hospitals: Discussing the challenges and working towards
mitigating the risks. In BMC Medical Informatics and Decision Making (Vol. 20, Issue 1).
BioMed Central Ltd. https://doi.org/10.1186/s12911-020-01161-7
Barbier, B., Bossard, M., Durand, M., & Robin, T. (n.d.). Outiller l’ingénieur biomédical
dans la prévention des cyberattaques. https://doi.org/10.34746/ids213
Beavers, J., & Pournouri, S. (2019). Recent cyber attacks and vulnerabilities in medical
devices and healthcare institutions. In Advanced Sciences and Technologies for Security
Applications (pp. 249–267). Springer. https://doi.org/10.1007/978-3-030-11289-9_11
Betioui Karim, E., & Mohammed, H. (n.d.). Le potentiel des technologies numériques pour
renforcer l’impact des associations dans la lutte contre la pauvreté : cas des monnaies
locales et complémentaires The potential of digital technologies to strengthen the impact of
associations in the fight against poverty: the case of local and complementary currencies.
4(4). www.revuechercheur.com
Branch, L. E., Eller, W. S., Bias, T. K., Mccawley, M. A., Myers, D. J., Gerber, B. J., &
Bassler, J. R. (2016). Trends in Malware Attacks against United States Healthcare
Organizations. In Global Biosecurity (Vol. 1, Issue 1).
Canada, A., Bcomph, V. H., Ackery, A., Grant, K., Jamieson, T., Mbi, M. D., Mehta, S., &
Gpllm, M. D. (2024). Cyberattaques contre les systèmes d’information de santé au Canada.
https://doi.org/10.1503/cmaj.230436
f
carolinesaur. (n.d.). ENDERLIN_Clément_2011.
Chergui-Darif, M. (n.d.). Cyberattaques dans les hôpitaux, universités, administrations…
Comment mieux résister ? https://hal.science/hal-04330555
Clarke, M., Allen, C., Camacho, A., Copsey, J., Cuervo, L. G., Khalid, F., Lim, J., Mansilla,
C., McHugh, J., Pizarro, A., & Saeed, Y. (2023). Advancing Knowledge Translations to
Contribute to Resilience in Emergency Preparedness, Response and Recovery: The Role of
Evidence Aid. Prehospital and Disaster Medicine, 38(S1), s93–s93.
https://doi.org/10.1017/s1049023x23002601
Dameff, C., Selzer, J., & Tully, J. L. (n.d.). Cybersecurity in Medicine: A Review.
https://doi.org/10.2196/preprints.35588
Daniel, C., Ivana, D., & Robert, M. (n.d.). A Systematic Literature Evaluation of
Cyberbiosecurity in Healthcare. https://doi.org/10.13140/RG.2.2.30908.97929
Desjardins, B., Mirsky, Y., Ortiz, M. P., Glozman, Z., Tarbox, L., Horn, R., & Horii, S. C.
(2020). DIcom images have been hacked! Now what? In American Journal of Roentgenology
(Vol. 214, Issue 4, pp. 727–735). American Roentgen Ray Society.
https://doi.org/10.2214/AJR.19.21958
Eichelberg, M., Kleber, K., & Kämmerer, M. (2020a). Cybersecurity Challenges for PACS
and Medical Imaging. Academic Radiology, 27(8), 1126–1139.
https://doi.org/10.1016/j.acra.2020.03.026
Eichelberg, M., Kleber, K., & Kämmerer, M. (2020b). Cybersecurity in PACS and Medical
Imaging: an Overview. In Journal of Digital Imaging (Vol. 33, Issue 6, pp. 1527–1542).
Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/s10278-
020-00393-3
Eichelberg, M., Kleber, K., & Kämmerer, M. (2021). Cybersecurity Protection for PACS and
Medical Imaging: Deployment Considerations and Practical Problems. Academic Radiology,
28(12), 1761–1774. https://doi.org/10.1016/j.acra.2020.09.001
Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID
Experts Independently conducted by Ponemon Institute LLC. (2015).
Fontaine, J., Zaourar, L., Benazouz, M., & Chotin, R. (2022). Recherche de cliques pour un
problème de cybersécurité matériel. https://cea.hal.science/cea-03605100
Ghafur, S., Kristensen, S., Honeyford, K., Martin, G., Darzi, A., & Aylin, P. (2019). A
retrospective impact analysis of the WannaCry cyberattack on the NHS. Npj Digital
Medicine, 2(1). https://doi.org/10.1038/s41746-019-0161-6
Giraud, P., Fleury, B., le Prince, C., Falk, A. T., Rousse, C., Hance, H., Santini, J. J.,
Bicheron, D., Palisson, J., Hannoun-Lévi, J. M., Tack, K., Marchesi, V., & Azria, D. (2023).
Interprofessional recommendations on behalf of Société française de radiothérapie
oncologique for the prevention, protection and management of cyberattacks in radiation
oncology. Cancer/Radiotherapie, 27(8), 683–688.
https://doi.org/10.1016/j.canrad.2023.09.001
Hart, A., & Hertelendy, A. (2023). The Future Technologies that will Define Disaster
Medicine. Prehospital and Disaster Medicine, 38(S1), s89–s89.
https://doi.org/10.1017/s1049023x23002534
He, Y., Aliyu, A., Evans, M., & Luo, C. (2021). Health care cybersecurity challenges and
solutions under the climate of COVID-19: Scoping review. In Journal of Medical Internet
Research (Vol. 23, Issue 4). JMIR Publications Inc. https://doi.org/10.2196/21747
Herrera, C. V. P., Valcarcel, J. S. M., Díaz, M., Salazar, J. L. H., & Andrade-Arenas, L.
(2023). Cybersecurity in health sector: a systematic review of the literature. Indonesian
Journal of Electrical Engineering and Computer Science, 31(2), 1099–1108.
https://doi.org/10.11591/ijeecs.v31.i2.pp1099-1108
Hosny, A., Parmar, C., Quackenbush, J., Schwartz, L. H., & Aerts, H. J. W. L. (2018).
Artificial intelligence in radiology. In Nature Reviews Cancer (Vol. 18, Issue 8, pp. 500–
510). Nature Publishing Group. https://doi.org/10.1038/s41568-018-0016-5
Hospitalia_62_Imagerie_AFIB. (n.d.).
Introduire la sécurité numérique dans les procédures d’acquisition. (n.d.).
https://doi.org/10.34746/ids213
Kandasamy, K., Srinivas, S., Achuthan, K., & Rangan, V. P. (2022). Digital Healthcare -
Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST
Perspectives, and Recommendations. IEEE Access, 10, 12345–12364.
https://doi.org/10.1109/ACCESS.2022.3145372
Karagiannis, S., Magkos, E., Ntantogian, C., Cabecinha, R., & Fotis, T. (2023).
Cybersecurity and Medical Imaging: A Simulation-Based Approach to DICOM
Communication. Applied Sciences (Switzerland), 13(18).
https://doi.org/10.3390/app131810072
Kirthana, K. S. (2022). Classification of COVID-19 using Chest X-ray Images with Deep
Learning Techniques-CNN & ResNet-18. International Journal of Innovative
Technology and Exploring Engineering, 11(6), 49–52.
https://doi.org/10.35940/ijitee.F9922.0511622
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in
healthcare: A systematic review of modern threats and trends. In Technology and Health
Care (Vol. 25, Issue 1, pp. 1–10). IOS Press. https://doi.org/10.3233/THC-161263
Kulkarni, M., & Kolharkar, S. (2018). PACS: An Overview of the Technology and Related
Issues. https://www.researchgate.net/publication/327222366
Ma, P., Wang, Z., Hei, X., Zou, X., Zhang, J., Liu, Q., Lyu, X., & Zhuo, Z. (2019). A
Quantitative Approach for Medical Imaging Device Security Assessment. Proceedings - 49th
Annual IEEE/IFIP International Conference on Dependable Systems and Networks -
Supplemental Volume, DSN-S 2019, 5–6. https://doi.org/10.1109/DSN-S.2019.00008
Magjarevic, R., Ładyżyński, P., Fatimah Ibrahim, P., Lackovic, I., & Sacristan Rock, E.
(n.d.). IFMBE Proceedings Volume 77 Series Editor. http://www.springer.com/series/7403
Mahler, T., Elovici, Y., & Shahar, Y. (2020a). A New Methodology for Information Security
Risk Assessment for Medical Devices and Its Evaluation. http://arxiv.org/abs/2002.06938
Mahler, T., Elovici, Y., & Shahar, Y. (2020b). A New Methodology for Information Security
Risk Assessment for Medical Devices and Its Evaluation. http://arxiv.org/abs/2002.06938
Mahler, T., Shalom, E., Makori, A., Elovici, Y., & Shahar, Y. (2022). A Cyber-Security Risk
Assessment Methodology for Medical Imaging Devices: the Radiologists’ Perspective.
Journal of Digital Imaging, 35(3), 666–677. https://doi.org/10.1007/s10278-021-00562-y
Maki, N., Nakata, R., Toyoda, S., Kasai, Y., Shin, S., & Seto, Y. (2020). An effective
cybersecurity exercises platform cyexec and its training contents. International Journal of
Information and Education Technology, 10(3), 215–221.
https://doi.org/10.18178/ijiet.2020.10.3.1366
Messinis, S., Protonotarios, N., Tzortzis, I., Rallis, I., Kalogeras, D., & Doulamis, N. (2023).
Lightweight machine learning for privacy-preserving and secure networked medical devices:
The SEPTON project use cases. ACM International Conference Proceeding Series, 638–644.
https://doi.org/10.1145/3594806.3596562
Moses, V., & Korah, I. (2015). Lack of security of networked medical equipment in
radiology. In American Journal of Roentgenology (Vol. 204, Issue 2, pp. 343–353). American
Roentgen Ray Society. https://doi.org/10.2214/AJR.14.12882
Nissim, N., Mahler, T., Shalom, E., Goldenberg, I., Hasman, G., Makori, A., Kochav, I.,
Elovici, Y., & Shahar, Y. (n.d.). Know Your Enemy: Characteristics of Cyber-Attacks on
Medical Imaging Devices. http://www.malware-lab.com/
Oufi, N., Franck, B., De, L. A., Garza, C., Lot, N., & Jingxuan, M. A. (n.d.-a). Premiers
résultats d’une analyse conjointe FOH et cyber sécurité d’une cyberattaque en milieu
hospitalier.
Pavlek, I. B., Brnic, Z., Schmidt, S., Krpan, T., & Kralik, I. (2016). Old and outdated
radiology equipment in Croatia—radiation safety and economic consequences. Insights into
Imaging, 7(2), 283–284. https://doi.org/10.1007/s13244-016-0464-y
Plan de Continuité Informatique : principes de base Guide pratique organisationnel PGSSI-
S. (n.d.).
Portela, D., Nogueira-Leite, D., Almeida, R., & Cruz-Correia, R. (2023). Economic Impact of
a Hospital Cyberattack in a National Health System: Descriptive Case Study. JMIR
Formative Research, 7. https://doi.org/10.2196/41738
Premchand, P., Tinkuvasavya, G., Raghavendra, M. T., Gopi, G., Bhaskar, N., & Info, A.
(n.d.). As per UGC guidelines an electronic bar code is provided to seure your paper.
International Journal for Modern Trends in Science and Technology, 10(02), 143.
https://doi.org/10.46501/IJMTST1002020
quipement__La_securite_informatique_des_dispositi_-_HOSPIMEDIA. (n.d.).
Saibeni, S., Rondonotti, E., Iozzelli, A., Spina, L., Eugenio Tontini, G., Cavallaro, F.,
Ciscato, C., de Franchis, R., Sardanelli, F., Vecchi wwwwjgnetcom, M., Gionchetti, P.,
Endoscopy Service, G., Fondazione Ospedale Maggiore Policlinico, I., Elena, R., Andrea
Iozzelli, I., San Donato, P., Donato Milanese, S., Vecchi, M., Endoscopy Unit, G., &
Policlinico San Donato, I. (2007). Imaging of the small bowel in Crohn’s disease: A review
of old and new techniques MD, Series Editor. World J Gastroenterol, 13(24), 3279–3287.
www.wjgnet.comhttp://www.wjgnet.com/1007-9327/13/3279.asp
Scholarworks, S., & Thigpen, B. L. (n.d.). Strategies to Lower Security Risks Involving
Medical Devices in Strategies to Lower Security Risks Involving Medical Devices in Patient
Care Patient Care. https://scholarworks.waldenu.edu/dissertations
Singapore General Hospital., & Nanyang Technological University. (2005). 7th Annual
NTU-SGH Symposium 2005 : moving technology towards better patient care, [11-12 August
2005, Singapore National Eye Centre Auditorium : programme & abstracts]. Singapore
General Hospital.
Susaki, E. A., & Ueda, H. R. (2016). Whole-body and Whole-Organ Clearing and Imaging
Techniques with Single-Cell Resolution: Toward Organism-Level Systems Biology in
Mammals. In Cell Chemical Biology (Vol. 23, Issue 1, pp. 137–157). Elsevier Ltd.
https://doi.org/10.1016/j.chembiol.2015.11.009
Torgersen, L. N. S., Schulz, S. M., Lugo, R. G., & Sütterlin, S. (2024). Patient informed
consent, ethical and legal considerations in the context of digital vulnerability with smart,
cardiac implantable electronic devices. PLOS Digital Health, 3(5), e0000507.
https://doi.org/10.1371/journal.pdig.0000507
US20130335576A1. (n.d.).
Varol, A., Institute of Electrical and Electronics Engineers. Lebanon Section., & Institute of
Electrical and Electronics Engineers. (n.d.). 8th International Symposium on Digital
Forensics and Security : 1-2 June 2020, Beirut, Lebanon.
Wang, Z., Ma, P., Zou, X., & Yang, T. (2019). Security of Medical Cyber-physical Systems:
An Empirical Study on Imaging Devices. http://arxiv.org/abs/1904.00224
Willing, M., Dresen, C., Haverkamp, U., & Schinzel, S. (2020). Analyzing medical device
connectivity and its effect on cyber security in german hospitals. BMC Medical Informatics
and Decision Making, 20(1). https://doi.org/10.1186/s12911-020-01259-y
Yuan, S., Fernando, A., & Klonoff, D. C. (2018). Standards for Medical Device
Cybersecurity in 2018. In Journal of Diabetes Science and Technology (Vol. 12, Issue 4, pp.
743–746). SAGE Publications Inc. https://doi.org/10.1177/1932296818763634