Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference11 articles.
1. Andreassen HK , Bujnowska-Fedak MM , Chronaki CE, Dumitru RC, Pudule I, Santana S, Voss H, Wynn R (2007) European citizens’ use of E-health services: a study of seven countries. BMC Public Health 7(1):53
2. Pope J (2016) Ransomware: minimizing the risks. Innovations in Clinical Neuroscience 13(11-12):37–40
3. Stine I, Rice M, Dunlap S, John P (2017) A cyber risk scoring system for medical devices. International Journal of Critical Infrastructure Protection 19:32–46
4. Nist (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Technical report, National institute of standards and technology, Gaithersburg
5. Cao C, Yuan L-P, Singhal A, Liu P, Sun X, Zhu S (2018) Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs. In: Data and applications security and privacy XXXII, Springer, Cham, pp 330–348
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献