[HTML][HTML] Security and privacy of electronic health records: Concerns and challenges

I Keshta, A Odeh - Egyptian Informatics Journal, 2021 - Elsevier
Abstract Electronic Medical Records (EMRs) can provide many benefits to physicians,
patients and healthcare services if they are adopted by healthcare organizations. But …

Artificial intelligence analysis in cyber domain: A review

L Zhao, D Zhu, W Shafik… - International …, 2022 - journals.sagepub.com
The application of Big Data Analytics is identified through the Cyber Research Alliance for
cybersecurity as the foremost preference for future studies and advancement in the field of …

IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication

S Bansal, D Kumar - International Journal of Wireless Information …, 2020 - Springer
In this era of research and technology, Internet of things (IoT) takes a prominent part in the
evolution of applications of the various field like health, education, smart cities, homes …

Internet of Things: Evolution and technologies from a security perspective

R Ande, B Adebisi, M Hammoudeh, J Saleem - Sustainable Cities and …, 2020 - Elsevier
In recent years, IoT has developed into many areas of life including smart homes, smart
cities, agriculture, offices, and workplaces. Everyday physical items such as lights, locks and …

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

F Mirsadeghi, MK Rafsanjani, BB Gupta - Peer-to-Peer Networking and …, 2021 - Springer
Abstract Vehicular Ad hoc Networks (VANETs) as a subset of mobile ad hoc networks which
allow communication between any vehicle with other adjacent vehicles, road side units and …

A blockchain-based secure healthcare scheme with the assistance of unmanned aerial vehicle in Internet of Things

A Islam, SY Shin - Computers & Electrical Engineering, 2020 - Elsevier
This paper introduces a blockchain-based secure healthcare scheme in which health data
(HD) are collected from users via an unmanned aerial vehicle (UAV) and stored on the …

WOA+ BRNN: An imbalanced big data classification framework using Whale optimization and deep neural network

EM Hassib, AI El-Desouky, LM Labib, ESM El-Kenawy - soft computing, 2020 - Springer
Nowadays, big data plays a substantial part in information knowledge analysis,
manipulation, and forecasting. Analyzing and extracting knowledge from such big datasets …

Hiding shares by multimedia image steganography for optimized counting-based secret sharing

A Gutub, M Al-Ghamdi - Multimedia Tools and Applications, 2020 - Springer
The secret sharing scheme is a data security tool that provides reliability and robustness for
multi-user authentication systems. This work focus on improving the counting-based secret …

Hybrid approach for detection of malicious profiles in twitter

SR Sahoo, BB Gupta - Computers & Electrical Engineering, 2019 - Elsevier
Emergence of social media invokes social actors to share their information digitally.
Moreover, it enables them to maintain their links with other people worldwide. Due to its …

MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique

FMM Mokbal, W Dan, A Imran, L Jiuchuan… - IEEE …, 2019 - ieeexplore.ieee.org
Dynamic web applications play a vital role in providing resources manipulation and
interaction between clients and servers. The features presently supported by browsers have …