{"id":"https://openalex.org/W2989459919","doi":"https://doi.org/10.1007/978-981-15-1301-5_24","title":"Securing Smart Healthcare Systems from Vulnerability Exploitation","display_name":"Securing Smart Healthcare Systems from Vulnerability Exploitation","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2989459919","doi":"https://doi.org/10.1007/978-981-15-1301-5_24","mag":"2989459919"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-15-1301-5_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-1301-5_24","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020528398","display_name":"Gemini George","orcid":"https://orcid.org/0000-0001-5367-9588"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]},{"id":"https://openalex.org/I20497027","display_name":"Cochin University of Science and Technology","ror":"https://ror.org/00a4kqq17","country_code":"IN","type":"education","lineage":["https://openalex.org/I20497027"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gemini George","raw_affiliation_strings":["Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, 695581, India","Cochin University of Science and Technology, Kochi, 682022, India","Cochin University of Science and Technology, Kochi, India","Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, 695581, India","institution_ids":["https://openalex.org/I68695296"]},{"raw_affiliation_string":"Cochin University of Science and Technology, Kochi, 682022, India","institution_ids":["https://openalex.org/I20497027"]},{"raw_affiliation_string":"Cochin University of Science and Technology, Kochi, India","institution_ids":["https://openalex.org/I20497027"]},{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016838632","display_name":"Sabu M. Thampi","orcid":"https://orcid.org/0000-0001-6453-5520"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Sabu M. Thampi","raw_affiliation_strings":["Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, 695581, India","Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, 695581, India","institution_ids":["https://openalex.org/I68695296"]},{"raw_affiliation_string":"Center for Research and Innovation in Cyber Threat Resilience, Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016838632"],"corresponding_institution_ids":["https://openalex.org/I68695296"],"apc_list":null,"apc_paid":null,"fwci":0.9175,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75468962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"295","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6907261610031128},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6741359233856201},{"id":"https://openalex.org/keywords/damages","display_name":"Damages","score":0.6439907550811768},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5705009698867798},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5593276619911194},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5304372310638428},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.387308269739151},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.18984735012054443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6907261610031128},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6741359233856201},{"id":"https://openalex.org/C2777381055","wikidata":"https://www.wikidata.org/wiki/Q308922","display_name":"Damages","level":2,"score":0.6439907550811768},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5705009698867798},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5593276619911194},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5304372310638428},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.387308269739151},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.18984735012054443},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-15-1301-5_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-1301-5_24","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1943579973","https://openalex.org/W1963489908","https://openalex.org/W2044152003","https://openalex.org/W2054127354","https://openalex.org/W2068201078","https://openalex.org/W2078314964","https://openalex.org/W2079668303","https://openalex.org/W2113469892","https://openalex.org/W2117141700","https://openalex.org/W2155285218","https://openalex.org/W2258475915","https://openalex.org/W2293605433","https://openalex.org/W2314479092","https://openalex.org/W2383813018","https://openalex.org/W2399975186","https://openalex.org/W2526931032","https://openalex.org/W2580334929","https://openalex.org/W2611145822","https://openalex.org/W2883922809","https://openalex.org/W2887949427","https://openalex.org/W2912359980","https://openalex.org/W2966432753"],"related_works":["https://openalex.org/W4205240985","https://openalex.org/W2314597598","https://openalex.org/W1527183021","https://openalex.org/W3124239800","https://openalex.org/W2365977737","https://openalex.org/W1577024311","https://openalex.org/W4387399630","https://openalex.org/W1494001639","https://openalex.org/W2370590861","https://openalex.org/W4255088821"],"abstract_inverted_index":null,"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
