A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

ECP Neto, S Dadkhah, S Sadeghi, H Molyneaux… - Computer …, 2023 - Elsevier
Abstract The Internet of Things (IoT) is transforming society by connecting businesses and
optimizing systems across industries. Its impact has been felt in healthcare, where it has the …

[HTML][HTML] Cybersecurity in Internet of Medical Vehicles: State-of-the-Art Analysis, Research Challenges and Future Perspectives

CR Bhukya, P Thakur, BR Mudhivarthi, G Singh - Sensors, 2023 - mdpi.com
The “Internet-of-Medical-Vehicles (IOMV)” is one of the special applications of the Internet of
Things resulting from combining connected healthcare and connected vehicles. As the IOMV …

[HTML][HTML] A Sustainable W-RLG Model for Attack Detection in Healthcare IoT Systems

BB Gupta, A Gaurav, RW Attar, V Arya, A Alhomoud… - Sustainability, 2024 - mdpi.com
The increasingly widespread use of IoT devices in healthcare systems has heightened the
need for sustainable and efficient cybersecurity measures. In this paper, we introduce the W …

[HTML][HTML] A Deep Learning-Based Framework for Strengthening Cybersecurity in Internet of Health Things (IoHT) Environments

SA Algethami, SS Alshamrani - Applied Sciences, 2024 - mdpi.com
The increasing use of IoHT devices in healthcare has brought about revolutionary
advancements, but it has also exposed some critical vulnerabilities, particularly in …

LW-PWECC: Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT

J Ranjith, K Mahantesh… - Journal of Robotics and …, 2024 - journal.umy.ac.id
In the present era, the number of Internet of Health Things (IoHT) devices and applications
has drastically expanded. Security and attack are major issues in the IoHT domain because …

Deep Convolutional Neural Network for Active Intrusion Detection and Protect data from Passive Intrusion by Pascal Triangle

AS Alqahtani - Wireless Personal Communications, 2024 - Springer
Active and passive intrusion are the two types of intrusion. The active intrusion attempts to
modify the data and the passive intrusion observes the data and replica. This intrusion …

Rényi Differential Privacy Analysis of Graph-Based Federated Learning Under Internet of Health Things

M Amjath, S Henna - 2023 31st Irish Conference on Artificial …, 2023 - ieeexplore.ieee.org
The rise of the Internet of Health Things (IoHTs) has resulted in a significant increase in
collaborative initiatives among healthcare organizations employing federated learning (FL) …

Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm

NK Singh, SK BJ - … Conference on Data Science and Network …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have gained popularity in diverse areas such as military
surveillance, patient monitoring, traffic control, environmental and structural monitoring …

Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT

A CN - International Journal of Computing and Digital Systems, 2024 - journal.uob.edu.bh
In the present era, the number of Internet of Health Things (IoHT) devices and applications
has drastically expanded. Security and attack are major issues in the IoHT domain because …

Intelligent Biometric Authentication-Based Intrusion Detection in Medical Cyber Physical System Using Deep Learning

PB Dash, PP Priyadarshani… - Machine Learning for …, 2024 - Springer
The current generation of technology is evolving at a rapid speed and gaining a prominent
position in the hearts of individuals. For instance, when internet-connected gadgets link to …