Harnessing big data analytics for healthcare: A comprehensive review of frameworks, implications, applications, and impacts

A Ahmed, R Xi, M Hou, SA Shah, S Hameed - IEEE Access, 2023 - ieeexplore.ieee.org
Big Data Analytics (BDA) has garnered significant attention in both academia and industries,
particularly in sectors such as healthcare, owing to the exponential growth of data and …

[HTML][HTML] The challenges of leveraging threat intelligence to stop data breaches

A Ibrahim, D Thiruvady, JG Schneider… - Frontiers in Computer …, 2020 - frontiersin.org
Despite the significant increase in cybersecurity solutions investment, organizations are still
plagued by security breaches, especially data breaches. As more organizations experience …

[HTML][HTML] Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach

N Liu, A Nikitas, S Parkinson - … research part F: traffic psychology and …, 2020 - Elsevier
Abstract Connected and Autonomous Vehicles (CAVs) constitute an automotive
development carrying paradigm-shifting potential that may soon be embedded into a …

[HTML][HTML] Using data mining techniques to explore security issues in smart living environments in Twitter

JR Saura, D Palacios-Marqués… - Computer …, 2021 - Elsevier
In present-day in consumers' homes, there are millions of Internet-connected devices that
are known to jointly represent the Internet of Things (IoT). The development of the IoT …

Internet of things with artificial intelligence for health care security

TM Ghazal - Arabian Journal for Science and …, 2021 - research.skylineuniversity.ac.ae
In recent years, health care facilities are moving towards technological advancements for
precise patient monitoring and record management. Though it is technically advanced, the …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

A data security enhanced access control mechanism in mobile edge computing

Y Hou, S Garg, L Hui, DNK Jayakody, R Jin… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile edge computing, with characteristics of position awareness, mobile support, low
latency, decentralization, and distribution, has received widespread attention from industry …

Sustainable development: Smart co-operative management framework

A Chawviang, S Kiattisin - Sustainability, 2022 - mdpi.com
A smart co-operative refers to a co-operative that aims to apply ICT to provide better services
and increase management efficiency to meet organizations' goals through the combinations …

Disease detection of plant leaf using image processing and cnn with preventive measures

H Ajra, MK Nahar, L Sarkar… - … Emerging Technology in …, 2020 - ieeexplore.ieee.org
Agriculture is a very significant field for increasing population over the world to meet the
basic needs of food. Meanwhile, nutrition and the world economy depend on the growth of …

Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm

B Balashunmugaraja, TR Ganeshbabu - Knowledge-Based Systems, 2022 - Elsevier
Decision-making is one of the important deals in knowledge transfer and it can be useful for
the multi-source domains. Meanwhile, the existing knowledge transfer schemes do not use …