Security and privacy of technologies in health information systems: A systematic literature review

P Shojaei, E Vlahu-Gjorgievska, YW Chow - Computers, 2024 - mdpi.com
Health information systems (HISs) have immense value for healthcare institutions, as they
provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and …

IoT-AI in Healthcare: A Comprehensive Survey of Current Applications and Innovations.

RH Charfare, AU Desai, NN Keni… - … Journal of Robotics …, 2024 - search.ebscohost.com
The convergence of IoT and AI technology has the capacity to revolutionize healthcare by
facilitating the gathering of real-time data and employing sophisticated analytics for tailored …

A Blockchain and IoT-Enabled Secure Health Data Handling Framework

M Elkhodr, E Gide, F Farid… - … Conference on Advances …, 2023 - ieeexplore.ieee.org
Secure data sharing while preserving user privacy is a critical challenge in Biomedical
applications. This paper presents the Secure Health Data Handling Framework (SHDHF), a …

Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach

Pritika, B Shanmugam, S Azam - Sensors, 2024 - mdpi.com
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous
opportunities for personalized healthcare, yet it also exposes patients and healthcare …

[HTML][HTML] Update on Patient Self-Testing with Portable and Wearable Devices: Advantages and Limitations

G Lippi, L Pighi, C Mattiuzzi - Diagnostics, 2024 - mdpi.com
Laboratory medicine has undergone a deep and multifaceted revolution in the course of
human history, in both organizational and technical terms. Over the past century, there has …

Shadow Health-Related Data: Definition, Categorization, and User Perspectives

Y El Zein, K Salehzadeh Niksirat, N Zufferey… - Proceedings of the …, 2024 - dl.acm.org
Health-related data (HRD) about individuals are increasingly generated and processed. The
sources and volume of such data have grown larger over the past years, they include …

[HTML][HTML] Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information

Y Li, Y Wang, X Liu, P Zuo, H Li, H Jiang - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) technology has permeated into all aspects of today's society and is
playing an increasingly important role. Identity authentication is crucial for IoT devices to …

Network Security Perception System Integrating Improved CNN Algorithm and Improved GRU Algorithm

Y Huang, Z Zhao, C Shi - IEEE Access, 2024 - ieeexplore.ieee.org
To enhance the accuracy and real-time response of network security-aware systems, the
convolutional neural network is optimized by introducing exponentially weighted dempster …

An Empirical Study to Understand the Role of Institution-Based Trust and Its Antecedents in IoT Adoption by Individuals

AK Nath, AK Nath - Journal of International Technology …, 2024 - scholarworks.lib.csusb.edu
ABSTRACT The Internet of Things (IoT) enables the connection between humans, physical
objects, and cyber objects, resulting in monitoring, automation, and decision-making …

Attitudes and perceptions towards privacy and surveillance in Australia

AJ Shanley - 2024 - ro.ecu.edu.au
Understanding attitudes towards privacy and surveillance technologies used to enhance
security objectives is a complex, but crucial aspect for policy makers to consider. Historically …