2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT) 2017
DOI: 10.1109/lisat.2017.8001952
|View full text |Cite
|
Sign up to set email alerts
|

Malicious behavior monitoring of embedded medical devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The authors promise this approach could detect unknown attacks while keeping the overhead and false positive rate low [131]. Refining this work, Abdulhammed et al create a hardware approach (Field Programmable Gate Array (FPGA) chip) that employs behavior rules to detect anomalies [128]. Their approaches address the resource constraints of MCPS.…”
Section: A Rq 1 -Utilized Detection Approach and Employed Technologymentioning
confidence: 99%
“…The authors promise this approach could detect unknown attacks while keeping the overhead and false positive rate low [131]. Refining this work, Abdulhammed et al create a hardware approach (Field Programmable Gate Array (FPGA) chip) that employs behavior rules to detect anomalies [128]. Their approaches address the resource constraints of MCPS.…”
Section: A Rq 1 -Utilized Detection Approach and Employed Technologymentioning
confidence: 99%
“…If the intrusion detection is offline, the implementation process will be very easy in contrast to the real time intrusion detection. While, the real time one have the benefit to understand the behavior of the attacker [3].…”
Section: Introductionmentioning
confidence: 99%