[HTML][HTML] Challenges with developing secure mobile health applications: Systematic review

B Aljedaani, MA Babar - JMIR mHealth and uHealth, 2021 - mhealth.jmir.org
Background: Mobile health (mHealth) apps have gained significant popularity over the last
few years due to their tremendous benefits, such as lowering health care costs and …

[HTML][HTML] Telehealth interventions during COVID-19 pandemic: a scoping review of applications, challenges, privacy and security issues

M Tukur, G Saad, FM AlShagathrh… - BMJ Health & Care …, 2023 - ncbi.nlm.nih.gov
Telehealth interventions during COVID-19 pandemic: a scoping review of applications,
challenges, privacy and security issues - PMC Back to Top Skip to main content NIH NLM Logo …

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications

Z Wenhua, MK Hasan, NB Jailani, S Islam… - Computers in Human …, 2024 - Elsevier
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …

An integrated scalable framework for cloud and iot based green healthcare system

MM Islam, ZA Bhuiyan - IEEE Access, 2023 - ieeexplore.ieee.org
Recent developments in IoT-enabled cloud computing and interactive applications have
made researchers rethink how healthcare services are currently provided. The IoT-cloud …

[HTML][HTML] CardioGuard: AI-driven ECG authentication hybrid neural network for predictive health monitoring in telehealth systems

MJ Ahmed, U Afridi, HA Shah, H Khan, MW Bhatt… - SLAS technology, 2024 - Elsevier
The increasing integration of telehealth systems underscores the importance of robust and
secure methods for patient data management. Traditional authentication methods, such as …

Advancing database security: a comprehensive systematic mapping study of potential challenges

A Iqbal, SU Khan, M Niazi, M Humayun, NU Sama… - Wireless …, 2024 - Springer
The value of data to a company means that it must be protected. When it comes to
safeguarding their local and worldwide databases, businesses face a number of challenges …

Security vulnerabilities in healthcare: an analysis of medical devices and software

CM Mejía-Granda, JL Fernández-Alemán… - Medical & Biological …, 2024 - Springer
The integration of IoT in healthcare has introduced vulnerabilities in medical devices and
software, posing risks to patient safety and system integrity. This study aims to bridge the …

[HTML][HTML] A method and validation for auditing e-Health applications based on reusable software security requirements specifications

CM Mejía-Granda, JL Fernández-Alemán… - International Journal of …, 2025 - Elsevier
Objective This article deals with the complex process of obtaining security requirements for e-
Health applications. It introduces a tailored audit and validation methodology particularly …

[PDF][PDF] Deep Neural Artificial Intelligence for IoT Based Tele Health Data Analytics.

N Rekha Sivakumar… - Computers, Materials & …, 2022 - cdn.techscience.cn
Tele health utilizes information and communication mechanisms to convey medical
information for providing clinical and educational assistances. It makes an effort to get the …

Cybersecurity Protocols for Telehealth: Developing new cybersecurity protocols to protect patient data during telehealth sessions

V Yadav - North American Journal of Engineering Research, 2024 - najer.org
The introduction of telehealth services into the healthcare system sped innovation and
transformed the patient's only option to obtain quality care, providing exceptional access and …