최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기전자통신동향분석 = Electronics and telecommunications trends, v.36 no.5, 2021년, pp.21 - 31
권혁찬 (네트워크.시스템보안연구실) , 정병호 (네트워크.시스템보안연구실) , 문대성 (네트워크.시스템보안연구실) , 김익균 (정보보호연구본부)
Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these at...
Comparitech, "Ransomware attacks on US healthcare organizations cost $20.8bn in 2020," Mar. 2021, https://www.comparitech.com/blog/information-security/ransomware-attacks-hospitals-data/
권혁찬, "의료사물인터넷(IoMT) 보안 기술 및 동향," ICT Conver gence Korea 2021, 2021. 3.
권혁찬 외, "커넥티드 의료기기 보안 동향 및 이슈," 주간기술동향, 제1911호, 2019. 8.
A. James and M.B. Simon, "MEDJACK.3-Medical device hijack cyber attack evolve," in Proc. RSA Conf. (San Francisco, CA, USA), Feb. 2017.
Armis, "URGENT/11-Takeover of a Spacelabs Xprezzon patient monitor," 2019, https://www.youtube.com/watch?vtpSXr4XhQwM
Armis, "NAT slipstreaming v2.0," https://www.armis.com/research/nat-slipstreaming-v20/
Paloalto Networks(zingbox), "IoT guardian for the healthcare industry," White paper, 2016.
Medigate, "Dedicated medical device-security platform," White paper, 2017.
L. Fernandez Maimo et al., "Intelligent and dynamic ransomware spread detection and mitigation in integrated clinical environments," Sensors, vol. 19, no. 5, 2019.
OpenICE, https://www.openice.info/
C. Ma et al., "Analysis of multi-types of flow features based on hybrid neural network for improving network anomaly detection," IEEE Access, vol. 7, 2019, pp. 148363-148380.
P. Berezinski et al., "An entropy-based network anomaly detection method," J. Entropy. vol. 17, 2015, pp. 2367-2408.
FDA, "Premarket submissions for management of cybersecurity in medical devices," 2014.
FDA, "Postmarket management of cybersecurity in medical devices," 2016.
M. Zou et al., "Network phenotyping for network traffic classification and anomaly detection," in Proc. IEEE Int. Symp. Technol. Homeland Secur. (Woburn, MA, USA), oct. 2018, pp. 23-24.
A. Azmoodeh et. al., "Detecting crypto-ransomware in IoT networks based on energy consumption footprint," J. Ambient Intell. Humanized Comput. vol. 9, 2018, pp. 1141-1152.
R.H. Hwang et al., "An LSTM-based deep learning approach for classifying malicious traffic at the packet level," Appl. Sci. vol. 9, 2019.
B. Seri et al., "Pwned piper," White paper, Armis, 2021, https://www.armis.com/research/pwnedpiper
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.