References

  1. Floris J. Bex, Peter J. van Koppen, Henry Prakken & Bart Verheij (2010): A hybrid formal theory of arguments, stories and criminal evidence. Artificial Intelligence and Law 18(2), pp. 123–152, doi:10.1007/s10506-010-9092-x.
  2. Wayne Burleson, Shane S. Clark, Benjamin Ransford & Kevin Fu (2012): Design Challenges for Secure Implantable Medical Devices. In: Proceedings of the 49th Annual Design Automation Conference, San Francisco, California, USA, doi:10.1145/2228360.2228364.
  3. Brian D. Carrier & Eugene H. Spafford (2006): Categories of digital investigation analysis techniques based on the computer history model. Digital Investigation Journal 3(S), pp. 121–130, doi:10.1016/j.diin.2006.06.011.
  4. Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis & Noureddine Boudriga (2013): Securing Implantable Cardiac Medical Devices: Use of radio frequency energy harvesting. In: Proceedings of the Third International Workshop on Trustworthy Embedded Devices, in conjunction with with the ACM Conference on Computer & Communications Security, Berlin, Germany, doi:10.1145/2517300.2517307.
  5. Sarbari Gupta (2012): Implantable Medical Devices - Cyber Risks and Mitigation Approaches. In: Proceedings of the Cybersecurity in Cyber-Physical Workshop, The National Institute of Standards and Technology (NIST), US.
  6. Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno & MD William H. Maisel (2008): Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland, California, doi:10.1109/SP.2008.31.
  7. Daniel Halperin, Tadayoshi Kohno, Thomas S. Heydt-Benjamin, Kevin Fu & William H. Maisel (2008): Security and Privacy for Implantable Medical Devices. Pervasive Computing, IEEE 7(1), pp. 30–39, doi:10.1109/MPRV.2008.16.
  8. Fei Hu (2013): Telehealthcare Computing and Engineering: Principles and Design. CRC Press, doi:10.1201/b14770.
  9. Jeroen Keppens & Burkhard Schafer (2006): Knowledge Based Crime Scenario Modelling. Expert Systems with Applications 30(2), pp. 203–222, doi:10.1016/j.eswa.2005.07.011.
  10. Chunxiao Li, Anand Raghunathan & Niraj K. Jha (2011): Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System. In: Proceedings of the 13th IEEE International Conference on e-Health Networking Applications and Services, Columbia, USA, doi:10.1109/HEALTH.2011.6026732.
  11. Rafael Peinadoa, Jose L Merinoa & Mar Gonzalez-Vasserota (2007): Life-Threatening Implantable Defibrillator-Induced Proarrhythmia. Revista Espanola de Cardiologia (Rev Esp Cardiol) journal 60(7), pp. 770–771, doi:10.1016/S1885-5857(08)60012-2.
  12. Slim Rekhis & Noureddine Boudriga (2011): Logic-based approach for digital forensic investigation in communication Networks. computers & security 30(6), pp. 376–396, doi:10.1016/j.cose.2011.02.002.
  13. Masoud Rostami, Wayne Burleson, Farinaz Koushanfar & Ari Juels (2013): Balancing Security and Utility in Medical Devices?. In: Proceedings of the 50th Annual Design Automation Conference, Austin, TX, USA., doi:10.1145/2463209.2488750.
  14. Masoud Rostami, Ari Juels & Farinaz Koushanfar (2013): Heart-to-Heart (H2H): Authentication for Implanted Medical Devices. In: Proceedings of the Third International Workshop on Trustworthy Embedded Devices, in conjunction with with the ACM Conference on Computer & Communications Security, Berlin, Germany, doi:10.1145/2508859.2516658.
  15. Huseyin S. Savci, Ahmet Sula, Zheng Wang, Numan S. Dogan & Ercument Arvas (2005): MICS transceivers: regulatory standards and applications [medical implant communications service]. In: Proceedings of IEEE SoutheastCon 2005, Fort. Lauderdale, FLorida, USA, doi:10.1109/SECON.2005.1423241.
  16. D. Noel Sims, Neil E.I. Langlois & Roger W. Byard (2013): An approach to peer review in forensic pathology. Journal of Forensic and Legal Medicine 20(5), pp. 402–403, doi:10.1016/j.jflm.2013.02.010.
  17. Charlotte Vlek, Henry Prakken, Silja Renooij & Bart Verheij (2013): Modeling Crime Scenarios in a Bayesian Network. In: Proceedings of the 14th International Conference on AI and Law (ICAIL 2013), Rome, Italy, doi:10.1145/2514601.2514618.
  18. Dirk Vollmann, Lars Lüthje, Stefan Vonhof & Christina Unterberg (2005): Inappropriate therapy and fatal proarrhythmia by an implantable cardioverter-defibrillator. The official journal of the Heart Rhythm 2(3), pp. 307–309, doi:10.1016/j.hrthm.2005.02.193.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org