Author:
Zeadally Sherali,Isaac Jesús Téllez,Baig Zubair
Publisher
Springer Science and Business Media LLC
Subject
Health Information Management,Health Informatics,Information Systems,Medicine (miscellaneous)
Reference55 articles.
1. Abelson, R., and Creswell, J., Data breach at anthem may forecast a trend. http://www.nytimes.com/2015/02/07/business/data-breach-at-anthem-may-lead-to-others.html , 2015.
2. Alrabady, AI., and Mahmud, S M., Analysis of attacks against the security of keyless-entry systems for vehicles and suggestions for improved designs. IEEE Trans. Veh. Technol. 54(1):41–50, 2005.
3. Assaad, A., and Fayek, D.: General hospitals network models for the support of e-health applications. In: IEEE/IFIP Network Operations and Management Symposium (NOMS 2006), pp. 1–4 (2006)
4. Office of the Australian Information Commissioner Australian government. Regulation of drone technology. https://www.oaic.gov.au/media-and-speeches/statements/regulation-of-drone-technology . 2013 Last accessed September 3, 2016
5. Baldus, H., Corroy, S., Fazzi, A., Klabunde, K., Schenk, T., Human-centric connectivity enabled by body-coupled communications. IEEE Commun. Mag. 47(6):172–178, 2009.
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献