Attack Graph Modeling for Implantable Pacemaker
نویسندگان
چکیده
منابع مشابه
Modeling and Verification of a Dual Chamber Implantable Pacemaker
The design and implementation of software for medical devices is challenging due to their rapidly increasing functionality and the tight coupling of computation, control, and communication. The safety-critical nature and the lack of existing industry standards for verification, make this an ideal domain for exploring applications of formal modeling and analysis. In this paper, we use a dual cha...
متن کاملImplantable demand pacemaker.
Adams-Stokes seizures can occur in patients with intermittent complete A-V block. The history of a single Adams-Stokes syncopal attack is an indication for intracardiac pacing. Fixed rate pacemakers employed in the presence of intermittent varying degrees of A-V block and sinus rhythm result in recurrent co-acting rhythms of artificial and natural beats (Linenthal and Zoll, 1962). This arrhythm...
متن کاملDesign Overview Of Processor Based Implantable Pacemaker
Implantable pacemaker is a battery operated real time embedded system, which includes software/hardware codesign strategy. As it is placed within the heart by surgery, battery life is an important constraint to extend device lifetime. In this paper, pacemaker’s functionalities like basic pacing, pulse width, refractory period in VOO mode has been realized using ultralow power processor MSP 430F...
متن کاملAttack Graph to Graph Database
Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types availa...
متن کاملAttack-Graph Threat Modeling Assessment of Ambulatory Medical Devices
The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient’s vital signs. This integration creates environments that are conducive to malicious activities. The potent...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Biosensors
سال: 2020
ISSN: 2079-6374
DOI: 10.3390/bios10020014