The internet of medical things and artificial intelligence: trends, challenges, and opportunities
High quality and efficient medical service is one of the major factors defining living
standards. Developed countries strive to make their healthcare systems as efficient and cost …
standards. Developed countries strive to make their healthcare systems as efficient and cost …
IoMT malware detection approaches: analysis and research challenges
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …
entire paradigm of computing. Because of such advancement, we have new types of …
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0
The recent spades of cyber attacks have compromised end-users' data security and privacy
in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard …
in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard …
Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends
Recent advances in machine-to-machine (M2M) communications, mini-hardware
manufacturing, and micro computing have led to the development of the Internet of Things …
manufacturing, and micro computing have led to the development of the Internet of Things …
A survey on security and cryptographic perspective of Industrial-Internet-of-Things
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
A survey on trend and classification of internet of things reviews
The Internet of Things (IoT) is sha** the current and next generation of the Internet. The
vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and …
vision of IoT is to embed communication capabilities with a highly distributed, ubiquitous and …
[PDF][PDF] Cloud data encryption and authentication based on enhanced Merkle hash tree method.
Many organizations apply cloud computing to store and effectively process data for various
applications. The user uploads the data in the cloud has less security due to the unreliable …
applications. The user uploads the data in the cloud has less security due to the unreliable …
MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption
Abstract The development of Electronic Information Technology has made the Electronic
Medical Record a commonly used approach to recording and categorizing medical patient …
Medical Record a commonly used approach to recording and categorizing medical patient …
Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …
people, but also interconnect and control the machine and other devices. 5G-enabled …
Building trust/distrust relationships on signed social service network through privacy-aware link prediction process
With the ever-increasing popularity of social software, we can easily establish a signed
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …
social n etwork (SSN) by capturing users' attitudes (ie, trust/distrust, friend/enemies …