Evaluating the blockchain-based healthcare supply chain using interval-valued Pythagorean fuzzy entropy-based decision support system

AR Mishra, P Rani, AF Alrasheedi, R Dwivedi - Engineering Applications of …, 2023 - Elsevier
In the current era, blockchain technology has emerged as a novel technique to maintain the
operations of healthcare management systems. The global COVID-19 disease has led to …

Intrusion, anomaly, and attack detection in smart vehicles

ST Banafshehvaragh, AM Rahmani - Microprocessors and Microsystems, 2023 - Elsevier
With the advancement of technology and Internet penetration in all aspects of life in today's
modern world, smart vehicles, particularly connected vehicles, are rising. As a result, as …

[HTML][HTML] Blockchain user digital identity big data and information security process protection based on network trust

F Wang, Y Gai, H Zhang - Journal of King Saud University-Computer and …, 2024 - Elsevier
This study aims to delve into the knowledge graph, functional pathways, and qualitative logic
among elements such as network trust, blockchain organization, user identity, big data, and …

MV-Checker: A software tool for multi-valued model checking intelligent applications with trust and commitment

G Alwhishi, J Bentahar, A Elwhishi… - Expert Systems with …, 2024 - Elsevier
Intelligent applications are highly susceptible to uncertainty and inconsistency due to the
intense and intricate interactions among their autonomous components (or agents), making …

[PDF][PDF] Cyber security analysis and evaluation for intrusion detection systems

YB Abushark, AI Khan, F Alsolami… - Comput. Mater …, 2022 - cdn.techscience.cn
Machine learning is a technique that is widely employed in both the academic and industrial
sectors all over the world. Machine learning algorithms that are intuitive can analyse risks …

Analyzing the impact of cybersecurity on monitoring and control systems in the energy sector

M Alghassab - Energies, 2021 - mdpi.com
Monitoring and control systems in the energy sector are specialized information structures
that are not governed by the same information technology standards as the rest of the …

Analysis of the exploration of security and privacy for healthcare management using artificial intelligence: Saudi hospitals

A Almalawi, AI Khan, F Alsolami… - Computational …, 2022 - Wiley Online Library
A large component of the Health Information Systems now comprises numerous
independent apps created in the past that need to be merged to provide a more uniform …

[PDF][PDF] Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing

AA Khan, AA Laghari, AM Baqasah, R Alroobaea… - PeerJ Computer …, 2024 - peerj.com
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and
fog computing-enabled connected devices and nodes has changed our lifestyle nowadays …

[PDF][PDF] Linguistic Knowledge Representation in DPoS Consensus Scheme for Blockchain.

Y Chen, M Lin - Computers, Materials & Continua, 2023 - cdn.techscience.cn
The consensus scheme is an essential component in the real blockchain environment. The
Delegated Proof of Stake (DPoS) is a competitive consensus scheme that can decrease …

Multi-objective fuzzy krill herd congestion control algorithm for WSN

KA Bhatti, S Asghar, S Naz - Multimedia Tools and Applications, 2024 - Springer
Abstract Wireless Sensor Network (WSN) consists of hundreds of devices with limited
resources that collect, analyze, and transmit data to a base station. The carry-send nature …