[HTML][HTML] Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

G Ali, MM Mijwil - Mesopotamian Journal of …, 2024 - journals.mesopotamian.press
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …

[HTML][HTML] IoT health devices: exploring security risks in the connected landscape

AO Affia, H Finch, W Jung, IA Samori, L Potter… - IoT, 2023 - mdpi.com
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its
inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable …

Enhancing cybersecurity protocols in modern healthcare systems: Strategies and best practices

MU Tariq - Transformative Approaches to Patient Literacy and …, 2024 - igi-global.com
This chapter explores the crucial responsibility of strengthening cybersecurity measures
within the ever-changing context of contemporary healthcare systems. As digitalization gets …

Enhancing Internet of Medical Things security with artificial intelligence: A comprehensive review

S Messinis, N Temenos, NE Protonotarios… - Computers in Biology …, 2024 - Elsevier
Over the past five years, interest in the literature regarding the security of the Internet of
Medical Things (IoMT) has increased. Due to the enhanced interconnectedness of IoMT …

[HTML][HTML] Data breaches in healthcare: security mechanisms for attack mitigation

L Nemec Zlatolas, T Welzer, L Lhotska - Cluster Computing, 2024 - Springer
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting
sensitive personal information. In this paper, we conduct a systematic review of existing …

[HTML][HTML] Verify and trust: A multidimensional survey of zero-trust security in the age of IoT

MA Azad, S Abdullah, J Arshad, H Lallie, YH Ahmed - Internet of Things, 2024 - Elsevier
The zero-trust (ZT) model assumes that all users, devices, and network traffic should not
considered as trusted until proven. The Zero-trust model emphasizes the importance of …

[HTML][HTML] Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT

S Karagiannis, LL Ribeiro, C Ntantogian, E Magkos… - Applied Sciences, 2023 - mdpi.com
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected
devices, known as the Internet of Health. The healthcare domain has been a target of …

Digital Privacy Under Attack: Challenges and Enablers

B Song, M Deng, SR Pokhrel, Q Lan, R Doss… - arXiv preprint arXiv …, 2023 - arxiv.org
Users have renewed interest in protecting their private data in the digital space. When they
don't believe that their privacy is sufficiently covered by one platform, they will readily switch …

Blockchain adoption strategies for combating deficient personal protective equipment in major public health emergencies

F Zhang, H Huang, C Cao, Z Tan - Annals of Operations Research, 2023 - Springer
The use of deficient personal protective equipment (PPE) during major public health
emergencies poses huge challenges for containing virus transmission. Blockchain …

Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability

Y Xu, Z Peng, C Zhang, G Wang, H Wang… - Journal of Systems …, 2024 - Elsevier
Abstract The data in Cyber–Physical Systems (CPSs) is currently undergoing an explosive
surge. Blockchain-based CPS exhibit enhancements in security, fault tolerance, and trust for …