[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

M Javaid, A Haleem, RP Singh, R Suman - Cyber Security and Applications, 2023 - Elsevier
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …

A survey on COVID-19 impact in the healthcare domain: worldwide market implementation, applications, security and privacy issues, challenges and future prospects

T Shakeel, S Habib, W Boulila, A Koubaa… - Complex & intelligent …, 2023 - Springer
Extensive research has been conducted on healthcare technology and service
advancements during the last decade. The Internet of Medical Things (IoMT) has …

Cyberattack path generation and prioritisation for securing healthcare systems

S Islam, S Papastergiou, EM Kalogeraki, K Kioskli - Applied Sciences, 2022 - mdpi.com
Cyberattacks in the healthcare sector are constantly increasing due to the increased usage
of information technology in modern healthcare and the benefits of acquiring a patient …

[HTML][HTML] Vulnerability to cyberattacks and sociotechnical solutions for health care systems: systematic review

P Ewoh, T Vartiainen - Journal of medical internet research, 2024 - jmir.org
Background Health care organizations worldwide are faced with an increasing number of
cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …

Enhancing E-commerce Security: The Effectiveness of Blockchain Technology in Protecting Against Fraudulent Transactions

SB Dahal - International Journal of Information and …, 2023 - publications.dlpress.org
This study aims to investigate the effectiveness of blockchain technology in securing e-
commerce transactions and protecting against fraud. The study examines the application of …

Safeguarding the Future: Cutting-Edge Time-Stamping Services and Blockchain Technologies for Maintaining EHR Data Integrity

R Komalasari - Blockchain and IoT Approaches for Secure Electronic …, 2024 - igi-global.com
The chapter discusses the challenges of maintaining data security over time, particularly in
sensitive fields like electronic health records (EHR). It highlights the importance of time …

Enhancing Cybersecurity through Automated Infrastructure Management: A Comprehensive Study on Optimizing Security Measures

A Yaseen - Quarterly Journal of Emerging Technologies and …, 2024 - vectoral.org
The present research discusses the integration of automated infrastructure management
(AIM) in fortifying cybersecurity measures within organizational settings. The study employs …

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies

K Kioskli, D Dellagiacoma, T Fotis… - Journal of Wireless …, 2022 - repository.essex.ac.uk
Worldwide, vulnerabilities and weak security strategies are exploited everyday by
adversaries in healthcare organizations. Healthcare is targeted because these crimes are …

Machine learning based intrusion detection system for IoMT

P Kulshrestha, TV Vijay Kumar - International Journal of System Assurance …, 2023 - Springer
Millennials have the advantage of accessing readily available modern scientific
advancements, particularly in technology. One of these technologies that encompasses …

AI-Integrated Technology for a Secure and Ethical Healthcare Ecosystem

S Boopathi, A Khang - AI and IoT-Based Technologies for Precision …, 2023 - igi-global.com
The chapter explores the complex relationship between healthcare privacy, user well-being,
and cybersecurity in the digital age. It highlights the role of technology integration in modern …