1. M. M. Kermani, M. Zhang, A. Raghunathan, N. K. Jha, in 26th International Conference on VLSI Design and 2013 12th International Conference on Embedded Systems, Pune, India. Emerging frontiers in embedded security (IEEENew York, 2013), pp. 203–208.
2. D. Halperin, T. Kohno, T. S. Heydt-Benjamin, K. Fu, W. H. Maisel, Security and privacy for implantable medical devices. IEEE Pervasive Comput. 7(1), 30–39 (2008).
3. C. Li, A. Raghunathan, N. K. Jha, in 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services, Columbia, MO. Hijacking an insulin pump: security attacks and defenses for a diabetes therapy system (IEEENew York, 2011), pp. 150–156.
4. N. Brown, N. Patel, P. Plenefisch, A. Moghimi, T. Eisenbarth, C. Shue, K. Venkatasubramanian, in 25th Usenix Security Symposium, Austin, TX, 2016. Poster: SCREAM: sensory channel remote execution attack methods (Usenix AssociationBerkeley, 2016).
5. D. F. Kune, J. Backes, S. S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, W. Xu, in 2013 IEEE Symposium on Security and Privacy, Berkeley, CA. Ghost talk: mitigating EMI signal injection attacks against analog sensors (IEEENew York, 2013), pp. 145–159.