Floris J. Bex, Peter J. van Koppen, Henry Prakken & Bart Verheij (2010):
A hybrid formal theory of arguments, stories and criminal evidence.
Artificial Intelligence and Law 18(2),
pp. 123–152,
doi:10.1007/s10506-010-9092-x.
Wayne Burleson, Shane S. Clark, Benjamin Ransford & Kevin Fu (2012):
Design Challenges for Secure Implantable Medical Devices.
In: Proceedings of the 49th Annual Design Automation Conference,
San Francisco, California, USA,
doi:10.1145/2228360.2228364.
Brian D. Carrier & Eugene H. Spafford (2006):
Categories of digital investigation analysis techniques based on the computer history model.
Digital Investigation Journal 3(S),
pp. 121–130,
doi:10.1016/j.diin.2006.06.011.
Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis & Noureddine Boudriga (2013):
Securing Implantable Cardiac Medical Devices: Use of radio frequency energy harvesting.
In: Proceedings of the Third International Workshop on Trustworthy Embedded Devices, in conjunction with with the ACM Conference on Computer & Communications Security,
Berlin, Germany,
doi:10.1145/2517300.2517307.
Sarbari Gupta (2012):
Implantable Medical Devices - Cyber Risks and Mitigation Approaches.
In: Proceedings of the Cybersecurity in Cyber-Physical Workshop,
The National Institute of Standards and Technology (NIST), US.
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjamin Ransford, Shane S. Clark, Benessa Defend, Will Morgan, Kevin Fu, Tadayoshi Kohno & MD William H. Maisel (2008):
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
In: Proceedings of the 2008 IEEE Symposium on Security and Privacy,
Oakland, California,
doi:10.1109/SP.2008.31.
Daniel Halperin, Tadayoshi Kohno, Thomas S. Heydt-Benjamin, Kevin Fu & William H. Maisel (2008):
Security and Privacy for Implantable Medical Devices.
Pervasive Computing, IEEE 7(1),
pp. 30–39,
doi:10.1109/MPRV.2008.16.
Fei Hu (2013):
Telehealthcare Computing and Engineering: Principles and Design.
CRC Press,
doi:10.1201/b14770.
Jeroen Keppens & Burkhard Schafer (2006):
Knowledge Based Crime Scenario Modelling.
Expert Systems with Applications 30(2),
pp. 203–222,
doi:10.1016/j.eswa.2005.07.011.
Chunxiao Li, Anand Raghunathan & Niraj K. Jha (2011):
Hijacking an Insulin Pump: Security Attacks and Defenses for a Diabetes Therapy System.
In: Proceedings of the 13th IEEE International Conference on e-Health Networking Applications and Services,
Columbia, USA,
doi:10.1109/HEALTH.2011.6026732.
Rafael Peinadoa, Jose L Merinoa & Mar Gonzalez-Vasserota (2007):
Life-Threatening Implantable Defibrillator-Induced Proarrhythmia.
Revista Espanola de Cardiologia (Rev Esp Cardiol) journal 60(7),
pp. 770–771,
doi:10.1016/S1885-5857(08)60012-2.
Slim Rekhis & Noureddine Boudriga (2011):
Logic-based approach for digital forensic investigation in communication Networks.
computers & security 30(6),
pp. 376–396,
doi:10.1016/j.cose.2011.02.002.
Masoud Rostami, Wayne Burleson, Farinaz Koushanfar & Ari Juels (2013):
Balancing Security and Utility in Medical Devices?.
In: Proceedings of the 50th Annual Design Automation Conference,
Austin, TX, USA.,
doi:10.1145/2463209.2488750.
Masoud Rostami, Ari Juels & Farinaz Koushanfar (2013):
Heart-to-Heart (H2H): Authentication for Implanted Medical Devices.
In: Proceedings of the Third International Workshop on Trustworthy Embedded Devices, in conjunction with with the ACM Conference on Computer & Communications Security,
Berlin, Germany,
doi:10.1145/2508859.2516658.
Huseyin S. Savci, Ahmet Sula, Zheng Wang, Numan S. Dogan & Ercument Arvas (2005):
MICS transceivers: regulatory standards and applications [medical implant communications service].
In: Proceedings of IEEE SoutheastCon 2005,
Fort. Lauderdale, FLorida, USA,
doi:10.1109/SECON.2005.1423241.
D. Noel Sims, Neil E.I. Langlois & Roger W. Byard (2013):
An approach to peer review in forensic pathology.
Journal of Forensic and Legal Medicine 20(5),
pp. 402–403,
doi:10.1016/j.jflm.2013.02.010.
Charlotte Vlek, Henry Prakken, Silja Renooij & Bart Verheij (2013):
Modeling Crime Scenarios in a Bayesian Network.
In: Proceedings of the 14th International Conference on AI and Law (ICAIL 2013),
Rome, Italy,
doi:10.1145/2514601.2514618.
Dirk Vollmann, Lars Lüthje, Stefan Vonhof & Christina Unterberg (2005):
Inappropriate therapy and fatal proarrhythmia by an implantable cardioverter-defibrillator.
The official journal of the Heart Rhythm 2(3),
pp. 307–309,
doi:10.1016/j.hrthm.2005.02.193.