Managing security of healthcare data for a modern healthcare system

A Almalawi, AI Khan, F Alsolami, YB Abushark… - Sensors, 2023 - mdpi.com
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created
previously unimaginable opportunities for boosting clinical and patient services, reducing …

A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare

HS Nguyen, HC Danh, QP Ma, J Mesicek, J Hajnys… - Electronics, 2023 - mdpi.com
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …

Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision tree

S Dalal, UK Lilhore, N Faujdar, S Simaiya… - Journal of Cloud …, 2023 - Springer
Billions of gadgets are already online, making the IoT an essential aspect of daily life.
However, the interconnected nature of IoT devices also leaves them open to cyber threats …

Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems

NI Haque, MA Rahman, S Uluagac - Computers & Security, 2024 - Elsevier
Modern cyber-physical systems (CPSs) use the Internet of Things (IoT) to collect and
exchange data efficiently, monitor device/sensor level interaction effectively, and adopt new …

An IoT-Based CNN Model for Patients in ICU Beds During the COVID-19 Outburst

BD Parameshachari, C Srinivas… - … Conference on Data …, 2023 - ieeexplore.ieee.org
The rising number of hospital admissions is a worldwide cause for alarm, with major
contributors being an ageing population, the prevalence of diseases, and the current COVID …

Securing electric transportation networks: A machine learning-driven cyber threat detection

NI Vatin, R Sundari - MATEC Web of Conferences, 2024 - matec-conferences.org
The study examines the cybersecurity environment of electric transportation networks using
a machine learning-based methodology. It analyzes the behaviors of electric vehicles …

Deception Detection And Vulnerability Analysis Using A Multi-Level Clustering Machine Learning Algorithm In Business Transactions

A Kapoor - Available at SSRN 4267942, 2022 - papers.ssrn.com
To protect criminals, fraud detection techniques are regularly improved. They make it
possible for us to spot frauds quickly and simply. We will concentrate on the issue of …

SQL-Injection Threat Analysis and Evaluation

A Kapoor - Available at SSRN 4430812, 2023 - papers.ssrn.com
Abstract A Structured Query Language (SQL) injection attack occurs on a database-driven
website when the hacker manipulates a standard SQL query. It is carried by injecting a …

Applications of quantum neural channels and constraints

A Kapoor - Available at SSRN 4284354, 2022 - papers.ssrn.com
In the last several years, there have been substantial advancements in both deep learning
and quantum computing, and better computation is a key factor in both. Recently, quantum …

Newsvendor Problem and Forecasting based on Past Data

A Kapoor - Available at SSRN 4430823, 2023 - papers.ssrn.com
Abstract In operational analytics, Newsvendor Problem is an essential model used to define
the problem of finding optimal solution for many industries. Forecasting methods are used to …