ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
45
views
0
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,622
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
proceedings-article
Author(s):
Chunxiao Li
,
Anand Raghunathan
,
Niraj K. Jha
Publication date
(Print):
June 2011
Conference name:
2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011)
Conference date:
July 13, 2011 - July 15, 2011
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
GLUT4 biology
Author and article information
Conference
Publication date (Print):
June 2011
Pages
: 150-156
Article
DOI:
10.1109/HEALTH.2011.6026732
SO-VID:
81e6942d-7089-45c9-9284-096532472843
Copyright ©
© 2011
Conference name:
2011 IEEE 13th International Conference on e-Health Networking, Applications and Services (Healthcom 2011)
Conference location:
Columbia, MO, USA
Conference date:
July 13, 2011 - July 15, 2011
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,622
Viral Hijacking of BET Proteins.
Authors:
Irene P. Chen
,
Melanie Ott
SNIPERs – hijacking IAP activity to induce protein degradation
Authors:
M. NAITO
,
N. Ohoka
,
N SHIBATA
…
MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks. Computerworld.
Authors:
D. Storm
See all similar
Cited by
10
Security issues in implantable medical devices: Fact or fiction?
Authors:
Vikas Hassija
,
Vinay Chamola
,
Balindam Chandra Bajpai
…
Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges
Authors:
James Joshi
,
Joseph S Tan
,
Mohd. Shahbaz Anwar
Security-Aware Design Methodology and Optimization for Automotive Systems
Authors:
Alberto L. Sangiovanni-Vincentelli
,
Qi Zhu
,
Bowen Zheng
…
See all cited by