Attack Graph Modeling for Implantable Pacemaker

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Verification of a Dual Chamber Implantable Pacemaker

The design and implementation of software for medical devices is challenging due to their rapidly increasing functionality and the tight coupling of computation, control, and communication. The safety-critical nature and the lack of existing industry standards for verification, make this an ideal domain for exploring applications of formal modeling and analysis. In this paper, we use a dual cha...

متن کامل

Implantable demand pacemaker.

Adams-Stokes seizures can occur in patients with intermittent complete A-V block. The history of a single Adams-Stokes syncopal attack is an indication for intracardiac pacing. Fixed rate pacemakers employed in the presence of intermittent varying degrees of A-V block and sinus rhythm result in recurrent co-acting rhythms of artificial and natural beats (Linenthal and Zoll, 1962). This arrhythm...

متن کامل

Design Overview Of Processor Based Implantable Pacemaker

Implantable pacemaker is a battery operated real time embedded system, which includes software/hardware codesign strategy. As it is placed within the heart by surgery, battery life is an important constraint to extend device lifetime. In this paper, pacemaker’s functionalities like basic pacing, pulse width, refractory period in VOO mode has been realized using ultralow power processor MSP 430F...

متن کامل

Attack Graph to Graph Database

Databases are an integral part of almost any computing system today, and users heavily rely on the services they provide. When we interact with a computing system, we expect that any data be stored for future use, that the data is able to be looked up quickly, and that we can perform complex queries against the data stored in the database. There are many different emerging database types availa...

متن کامل

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices

The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient’s vital signs. This integration creates environments that are conducive to malicious activities. The potent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Biosensors

سال: 2020

ISSN: 2079-6374

DOI: 10.3390/bios10020014