{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:16:47Z","timestamp":1725700607004},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361509","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0478-0485","source":"Crossref","is-referenced-by-count":0,"title":["Safeguarding Healthcare: A Comprehensive Threat Analysis of Clinical Decision Support Systems"],"prefix":"10.1109","author":[{"given":"Aleksandra Ursula Charlotte","family":"Hamel","sequence":"first","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Bogdan-Cristian","family":"Zarcu","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Andr\u00e1s-Gergely","family":"Csenteri","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Tamara","family":"Pfliegler","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Sajjad","family":"Khan","sequence":"additional","affiliation":[{"name":"Vienna University of Economics and Business,Information Systems and Operations Management,Vienna,Austria"}]},{"given":"Davor","family":"Svetinovic","sequence":"additional","affiliation":[{"name":"Khalifa University,Center for Cyber-Physical Systems, Electrical Engineering and Computer Science,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/forecast3030028"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/chase.2017.69"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322472"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3238412"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA56895.2022.10017885"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98886-9_21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930962"},{"article-title":"Microsoft Threat Modeling Tool Overview - Azure","volume-title":"overview - Azure - Microsoft Learn","year":"2023","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/wcncw.2018.8369033"},{"article-title":"Threat Modeling of Electronic Health Systems and Mitigating Countermeasures","volume-title":"International Conference on Information and Communication Technology and Its Applications (ICTA 2016)","year":"2016","author":"Alhassan","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2021.3051675"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2828306"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2867497"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/telfor.2018.8611900"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0153-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21231"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.17"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21252"},{"volume-title":"Threat Modeling: Designing for Security","year":"2014","author":"Shostack","key":"ref20"},{"volume-title":"Threat modeling: a summary of available methods","year":"2018","author":"Shevchenko","key":"ref21"},{"article-title":"The Security Cards: A Security Threat Brainstorming Toolkit","volume-title":"Univ. of Washington","year":"2013","author":"Denning","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/isgteurope.2017.8260283"},{"volume-title":"EBMeDS - White Paper","year":"2020","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8836927"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3290688.3290729"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.08.075"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3551636"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icit52682.2021.9491638"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6981-8_47"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1001\/jamahealthforum.2022.4873"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssmph.2022.101092"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/info13090404"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/bigdatasecurity-hpsc-ids.2019.00016"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.54517\/m.v4i1.2156"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2905731"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17080"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2021.1995537"},{"volume-title":"Cryptography and Network Security: Principles and Practice","year":"2017","author":"Stallings","key":"ref39"},{"volume-title":"Social Engineering the Science of Human Hacking","year":"2018","author":"Hadnagy","key":"ref40","doi-asserted-by":"crossref","DOI":"10.1002\/9781119433729"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361509.pdf?arnumber=10361509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:30:39Z","timestamp":1705091439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361509","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}