A Comparative Assessment of Threat Identification Methods in EHR Systems (original) (raw)

Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression

Peter Bath

2009 Fifth International Conference on Information Assurance and Security, 2009

View PDFchevron_right

Threat Model for Secure Health Care Data Using EMR, EHR and Health Monitoring Devices

Ceronmani Sharmila

Recent Trends in Intensive Computing

View PDFchevron_right

Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs

Bhakti Patel

AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium, 2011

View PDFchevron_right

Grounding information security in healthcare

Ricardo J Cruz-Correia

International Journal of Medical Informatics, 2010

View PDFchevron_right

A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation

Yuval Shahar

arXiv (Cornell University), 2020

View PDFchevron_right

Explaining accesses to electronic health records

daniel fabri

Proceedings of the 2011 workshop on Data mining for medicine and healthcare, 2011

View PDFchevron_right

A red-flag-based approach to risk management of EHR-related safety concerns

Dean F Sittig

Journal of healthcare risk management : the journal of the American Society for Healthcare Risk Management, 2013

View PDFchevron_right

EHR Anonymising System Based on the ISO/EN 13606 Norm

Adolfo Muñoz

IFMBE Proceedings, 2014

View PDFchevron_right

Main Barriers for Quality Data Collection in Ehr

Pedro Pereira Rodrigues

2011

View PDFchevron_right

De-Identification of Electronic Health Records Data

Mariusz Dzieciątko

Advances in Intelligent Systems and Computing

View PDFchevron_right

Interoperable EHR Systems - Challenges, Standards and Solutions

Bernd Blobel

European Journal for Biomedical Informatics, 2018

View PDFchevron_right

Participation in EHR based simulation improves recognition of patient safety issues

Vishnu Mohan

BMC Medical Education, 2014

View PDFchevron_right

A Flexible Solution for Privilege Management and Access Control in EHR Systems

Bernd Blobel

European Journal for Biomedical Informatics, 2017

View PDFchevron_right

Risk management based early warning system for healthcare industry

Turki Alghamdi

2013 International Conference on Computer Medical Applications (ICCMA), 2013

View PDFchevron_right

Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures

Wolfgang Leister

2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015

View PDFchevron_right

E-Health Threat Intelligence Within Cyber-Defence Framework for E-Health Organizations

Joshua C Sopuru

Advanced information and knowledge processing, 2021

View PDFchevron_right

Security requirements and solutions in distributed Electronic Health Records

Bernd Blobel

Springer eBooks, 1997

View PDFchevron_right

COVID-19 and the effectiveness of ERM frameworks

Madhu Acharyya

British Actuarial Journal

View PDFchevron_right

Data Management in the EHDI System

K. Todd Houston

The Volta Review, 2011

View PDFchevron_right

Healthcare cybersecurity and cybercrime supply chain risk management

Jorja Wright

Health Economics and Management Review, 2023

View PDFchevron_right

Measuring hazard identification

Sofia Guerra

2006

View PDFchevron_right

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices

Jeffrey McDonald

Proceedings of the 50th Hawaii International Conference on System Sciences (2017), 2017

View PDFchevron_right

Electronic Health Records (EHR) Implementation and Post Implementation Challenges

Khandaker Islam

clcloud.com

View PDFchevron_right

Health care is the new battlefront for anti-DEI attacks

Jessica Isom

PLOS global public health, 2024

View PDFchevron_right

Characteristics of IS Security Approaches with Respect to Healthcare

Jan Leimeister

2009

View PDFchevron_right

Hossam Ahmed , Abeer Alsadoon , P.W.C. Prasad , N. Costadopoulos, Lau Siong Hoe , Amr Elchoemi, “Next Generation Cyber Security Solution for an eHealth Organization,” 5th International Conference on Information and Communication Technology (ICoICT), Pages: 1 - 5, Melaka, Malaysia, 2017

A/Prof Abeer Alsadoon

View PDFchevron_right

Evaluation of the Electronic Medical Record for Emergencies (EMR-E) platform

kiran jobanputra

F1000Research, 2016

View PDFchevron_right

Towards a Human Security-Based Early Warning and Response System

Schnabel Albrecht

Hexagon Series on Human and Environmental Security and Peace, 2009

View PDFchevron_right

Validation of patient identification in an HL7 messages integrator for health data monitoring and portability

Ricardo J Cruz-Correia

Procedia Computer Science, 2019

View PDFchevron_right

Identifying Personal Health Information Using Support Vector Machines

George Demetriou

2006

View PDFchevron_right

A comprehensive EHR timeseries pre-training benchmark

Peter Szolovits

Proceedings of the Conference on Health, Inference, and Learning

View PDFchevron_right

Vulnerability-threats assessment for enterprise network

Aliyu Mohammed

View PDFchevron_right

Analysis of EHR-related Patient Safety Concerns

Dean F Sittig

View PDFchevron_right

Towards event sequence representation, reasoning and visualization for EHR data

Cui Tao

Proceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12, 2012

View PDFchevron_right

Electronic Health Records Information Security Dynamics for EHR Projects

IOSR Journals

View PDFchevron_right