Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach

8Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring.

Cite

CITATION STYLE

APA

Angel, D. (2022). Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach. Wireless Personal Communications, 126(4), 3455–3464. https://doi.org/10.1007/s11277-022-09873-x

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free