Blockchain and AI-empowered healthcare insurance fraud detection: an analysis, architecture, and future prospects

K Kapadiya, U Patel, R Gupta, MD Alshehri… - IEEE …, 2022 - ieeexplore.ieee.org
Nowadays, health insurance has become an essential part of people's lives as the number
of health issues increases. Healthcare emergencies can be troublesome for people who …

Data breaches in healthcare: security mechanisms for attack mitigation

L Nemec Zlatolas, T Welzer, L Lhotska - Cluster Computing, 2024 - Springer
The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting
sensitive personal information. In this paper, we conduct a systematic review of existing …

Cyber Deception: State of the art, Trends and Open challenges

PB López, MG Pérez, P Nespoli - arXiv preprint arXiv:2409.07194, 2024 - arxiv.org
The growing interest in cybersecurity has significantly increased articles designing and
implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent …

A Survey of Security Protection Methods for Deep Learning Model

H Peng, S Bao, L Li - IEEE Transactions on Artificial Intelligence, 2023 - ieeexplore.ieee.org
In recent years, deep learning (DL) models have attracted widespread concern. Due to its
own characteristics, DL has been successfully applied in the fields of object detection …

Microservice security framework for IoT by mimic defense mechanism

F Ying, S Zhao, H Deng - Sensors, 2022 - mdpi.com
Containers and microservices have become the most popular method for hosting IoT
applications in cloud servers. However, one major security issue of this method is that if a …

An active defense model based on situational awareness and firewalls

D Li, Y Hu, G Xiao, M Duan, K Li - … and Computation: Practice …, 2023 - Wiley Online Library
With the rapid development of the internet, cyberspace security issues have become
increasingly prominent. The importance of constructing a cyberspace security system is self …

CICADA: Cloud-based intelligent classification and active defense approach for IoT security

RL Neupane, T Zobrist, K Neupane… - … -IEEE Conference on …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) devices capture and process sensitive personally identifiable
information such as eg, camera feeds/health data from enterprises and households. These …

[PDF][PDF] A Comprehensive Analysis of High-Impact Cybersecurity Incidents: Case Studies and Implications

A Pavelea, PC Negrea - 2024 - researchgate.net
The rapid digitalization of society has not only reshaped traditional systems and
methodologies but has also introduced a novel sphere of contention: the realm of …

[PDF][PDF] Blockchain and AI-Empowered Healthcare Insurance Fraud Detection: An Analysis, Architecture, and Future Prospects

PN BOKORO - academia.edu
Nowadays, health insurance has become an essential part of people's lives as the number
of health issues increases. Healthcare emergencies can be troublesome for people who …

[PDF][PDF] Blockchain and AI-empowered Healthcare Insurance Fraud Detection: An Analysis, Architecture, and Future Prospects

G SHARMA, PN BOKORO - researchgate.net
Nowadays, health insurance has become an essential part of people's lives as the number
of health issues increases. Healthcare emergencies can be troublesome for people who …