


default search action
HealthSec@CCS 2024: Salt Lake City, UT, USA
- William Yurcik:
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, HealthSec 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1238-8 - Peter G. Neumann
:
Position Paper: Computer-Related Health Risks. 1-9 - Natalie Sullivan
, Kristin Raphel
:
Clinical and Hospital System Emergency Management Implications of Cyberthreats. 11-16 - Josiah Dykstra
, O. Sami Saydjari
, Jamie Met
, Douglas Hough
:
Position Paper: Evaluating Analogies and Applying Public Health Models for Cybersecurity. 17-28 - Yunzheng Zhu
, Aichi Chien
, Yuan Tian
:
Protecting Lung CT Nodule Classification Models with Feature Fusion of Image and Pixel-level Features. 29-36 - Moshe Levy
, Guy Amit
, Yuval Elovici
, Yisroel Mirsky
:
The Security of Deep Learning Defenses in Medical Imaging. 37-44 - William Yurcik
, Andreas Schick
, Stephen C. North
, Michael T. Gastner
, Fabio Roberto de Miranda
, Rodolfo da Silva Avelino
, André Filipe de Moraes Batista
, Gregory Pluta
, Ian Brooks
:
Cybersecurity Monitoring/Mapping of USA Healthcare (All Hospitals) - Magnified Vulnerability due to Shared IT Infrastructure, Market Concentration, & Geographical Distribution. 45-52 - Prashant Anantharaman
, Rebecca Shapiro
, Vishnupriya Varadharaju
, Michael E. Locasto
:
A Study of Interoperability in Electronic Health Record Software. 53-60 - Jorge Castillo
, Qian Chen
:
MediLink: A Secure Blockchain Framework for Multi-Institutional Healthcare. 61-68 - Preston Chang
, Veena Krish
, Amir Rahmati
:
Security Analysis of RL-Based Artificial Pancreas Systems. 69-76 - Mohammadreza Hallajiyan
, Athish Pranav Dharmalingam
, Gargi Mitra
, Homa Alemzadeh
, Shahrear Iqbal
, Karthik Pattabiraman
:
SAM: Foreseeing Inference-Time False Data Injection Attacks on ML-enabled Medical Devices. 77-84 - Zahra Rahmani
, Nahal Shahini
, Nadav Gat
, Zebin Yun
, Yuzhou Jiang
, Ofir Farchy
, Yaniv Harel
, Vipin Chaudhary
, Erman Ayday
, Mahmood Sharif
:
Privacy-Preserving Collaborative Genomic Research: A Real-Life Deployment and Vision. 85-91 - Sai Shreya Nuguri
, Karan Karthik
, Vamsi Pusapati
, Anirudh Kambhampati
, Subrahmanya Chandra Bhamidipati
, Aneesh Calyam
, Mauro Lemus Alarcon
, Prasad Calyam
:
Zeus: IoT-based Healthcare Data Management Security Framework for Remote Patient Monitoring. 93-100 - Ashley Brooks
, Arnab Majumdar
:
Mixed Methods Analysis of System Hazards in the Provision of Remote Health Services in Rural Australia: Combining STPA Analysis and Thematic Analysis to Identify and Manage Hazards. 101-108 - John D. Halamka
:
Position Paper: Early Experiences Protecting Healthcare Data for Secondary Use. 109-111 - John McHugh
, William Yurcik
:
Position Paper: Personal Experience in the Technology Opportunities and Associated Risks of Healthcare Challenges in a Continuing Care Retirement Community (CCRC). 113-124 - Charlotte Tschider
:
Position Paper: Revealing the Limits of Cybersecurity Law for Healthcare AI. 125-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.