Follow
Tom Mahler
Tom Mahler
PhD, the Department of Software and Information Systems Engineering, Ben-Gurion University
Verified email at post.bgu.ac.il
Title
Cited by
Cited by
Year
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Y Mirsky, T Mahler, I Shelef, Y Elovici
28th USENIX Security Symposium (USENIX Security 19), 461-478, 2019
2392019
Know Your Enemy: Characteristics of Cyber-Attacks on Medical Imaging Devices
T Mahler, N Nissim, E Shalom, I Goldenberg, G Hassman, A Makori, ...
Radiological Society of North America (RSNA) 2017 Annual Meeting, 2018
262018
A new methodology for information security risk assessment for medical devices and its evaluation
T Mahler, Y Elovici, Y Shahar
arXiv preprint arXiv:2002.06938, 2020
142020
A dual-layer architecture for the protection of medical devices from anomalous instructions
T Mahler, E Shalom, Y Elovici, Y Shahar
International Conference on Artificial Intelligence in Medicine, 273-286, 2020
52020
A cyber-security risk assessment methodology for medical imaging devices: the radiologists’ perspective
T Mahler, E Shalom, A Makori, Y Elovici, Y Shahar
Journal of Digital Imaging 35 (3), 666-677, 2022
42022
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices
T Mahler, E Shalom, Y Elovici, Y Shahar
Artificial Intelligence in Medicine 123, 102229, 2022
32022
Method and device for protection of medical devices from anomalous instructions
T Mahler, Y Shahar, Y Elovici
US Patent App. 17/779,888, 2023
2023
Generalized Detection and Prevention of Anomalous Commands Sent to Medical Devices Controlled by an Untrusted Controller
T Mahler
Ben-Gurion University of the Negev, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8