An intelligent quantum cyber-security framework for healthcare data management

K Gupta, D Saxena, P Rani, J Kumar… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Digital healthcare is essential to facilitate consumers to access and disseminate their
medical data easily for enhanced medical care services. However, the significant concern …

A global cybersecurity standardization framework for healthcare informatics

K Gupta, V Mishra, A Makkar - IEEE Journal of Biomedical and …, 2024 - ieeexplore.ieee.org
Healthcare has witnessed an increased digitalization in the post-COVID world.
Technologies such as the medical Internet of Things and wearable devices are generating a …

FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments

K Gupta, D Saxena, R Gupta, J Kumar, AK Singh - Applied Soft Computing, 2024 - Elsevier
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …

MAIDS: malicious agent identification-based data security model for cloud environments

K Gupta, D Saxena, R Gupta, AK Singh - Cluster Computing, 2024 - Springer
With the vigorous development of cloud computing, most organizations have shifted their
data and applications to the cloud environment for storage, computation, and sharing …

A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers

V Mishra, K Gupta, D Saxena… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Electronic Health Records (EHR) are crucial for the success of digital healthcare, with a
focus on putting consumers at the center of this transformation. However, the digitalization of …

Fedmup: Federated Learning Driven Malicious User Prediction Model for Secure Data Distribution in Cloud Environments

D Saxena, K Gupta, R Gupta, J Kumar… - Available at SSRN … - papers.ssrn.com
Cloud computing is flourishing at a rapid pace. Significant consequences related to data
security appear as a malicious user may get unauthorized access to sensitive data which …

Energy-Aware Straggler Task Management Framework for Sustainable Cloud Environment

SR Swain, D Saxena - Authorea Preprints, 2024 - techrxiv.org
Modern large-scale computing systems improve job completion and energy efficiency by
executing tasks in parallel. However, the Long Tail problem where a few slow-performing …

Detecting PII Leakage Using DPI and Machine Learning in an Enterprise Environment

L Khorkheli, D Bourne, GB Satrya - International Conference on Next …, 2023 - Springer
With the emergence of new technologies, the threat of cyberattacks is becoming more
prominent. Apart from direct attacks, hackers also try to steal personal data through indirect …

End To End Data Security System For Secure Cloud Communications

K Gupta - techrxiv.org
Data is a vital asset for any organization and are needed to be safeguarded against the
deliberate damage or unintentional loss. In industry enormous volumes of data are …

Μηχανισμοί ανίχνευσης υποκλοπής και διαρροής πληροφοριών από εσωτερικά επιτιθέμενους

Α Καμαριώτης - 2022 - polynoe.lib.uniwa.gr
Η προστασία εμπιστευτικών δεδομένων και πληροφοριών από διαρροή, αποτελεί μια από τις
μεγαλύτερες ανησυχίες παγκοσμίως. Παραδοσιακά, η εμπιστευτικότητα των δεδομένων …