Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices

A Judith, GJW Kathrine, S Silas - Engineering Proceedings, 2023 - mdpi.com
The usage of IoT in the medical field, often referred to as IoMT, plays a vital role in facilitating
the exchange of sensitive data among medical devices. This capability significantly …

Attack Detection in IoT Using Machine Learning—A Survey

SA Haifa Ali, J Vakula Rani - … on Intelligent Cyber Physical Systems and …, 2022 - Springer
In the last decade, the İnternet Of Things (IoT) increased dramatically until it became an
integral part of our daily lives. These devices are interconnected to the internet without the …

Intelligent Cyberattack Detection on SAFECARE Virtual Hospital

E Maia, D Lancelin, J Carneiro, T Oudin… - World Conference on …, 2022 - Springer
Healthcare organizations are a popular target for cybercrime due to its critical and
vulnerable infrastructure. The IT threat detection system (ITDS), described in this work, is an …

Enhanced Intrusion Detection System for Remote Healthcare

S Ayoub, AG Mohammed Ali, B Narhimene - International Conference on …, 2022 - Springer
Abstract The Internet of Medical Things (IoMT) is an Internet of Things (IoT) application,
where medical devices associated with the human body collect physiological data and then …

Cyberattacks against Artificial Intelligence-Enabled Internet of Medical Things

AU Rufai, EP Fasina, CO Uwadia… - Handbook of Security …, 2023 - taylorfrancis.com
The fourth industrial revolution is characterized by the ubiquity of cyberspace as well as its
exploitation by criminal elements (hackers) that are ready to compromise cyberspace by …

Machine Learning-Based Cyber Intrusion Detection System for Internet of Medical Things Attacks in Healthcare Environments

B Kumar, A Kumar, HS Negi, J Alam - Cyber Trafficking, Threat …, 2023 - igi-global.com
In this chapter, the authors calculate the accuracy value of machine learning models for
combined, network, bio-medical data. The result shows that random forest has the highest …

A reliable trust-aware reinforcement learning based routing protocol for wireless medical sensor networks.

MS Hajar - 2022 - rgu-repository.worktribe.com
Interest in the Wireless Medical Sensor Network (WMSN) is rapidly gaining attention thanks
to recent advances in semiconductors and wireless communication. However, by virtue of …

Security issue reviewed and resolved: Heart disease detection

RK Kaur, S Kaur - … on Artificial Intelligence for Innovations in …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising technologies that have taken
industrial and academic attention over the past few years. This technology brings new …

[PDF][PDF] OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers

R Cayre, V Nicomette, G Auriol, M Kaâniche… - 2024 - s3.eurecom.fr
ABSTRACT Bluetooth Low Energy has established itself as one of the central protocols of
the Internet of Things. Its many features (mobility, low energy consumption) make it an …

Edge-based Analysis for Network Intrusion Detection using a GNN Approach

M Gorricho-Segura, X Echeberria-Barrio… - 2023 JNIC …, 2023 - ieeexplore.ieee.org
Anomaly detection is an essential task in detecting fraud and identifying faults in various
areas, including network security. Network Intrusion Detection Systems (NIDS) have …