Managing security of healthcare data for a modern healthcare system

A Almalawi, AI Khan, F Alsolami, YB Abushark… - Sensors, 2023 - mdpi.com
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created
previously unimaginable opportunities for boosting clinical and patient services, reducing …

An ensemble tree-based model for intrusion detection in industrial internet of things networks

JB Awotunde, SO Folorunso, AL Imoize, JO Odunuga… - Applied Sciences, 2023 - mdpi.com
With less human involvement, the Industrial Internet of Things (IIoT) connects billions of
heterogeneous and self-organized smart sensors and devices. Recently, IIoT-based …

A multi-level random forest model-based intrusion detection using fuzzy inference system for internet of things networks

JB Awotunde, FE Ayo, R Panigrahi, A Garg… - International Journal of …, 2023 - Springer
Intrusion detection (ID) methods are security frameworks designed to safeguard network
information systems. The strength of an intrusion detection method is dependent on the …

Industrial internet of things intrusion detection method using machine learning and optimization techniques

T Gaber, JB Awotunde, SO Folorunso… - Wireless …, 2023 - Wiley Online Library
The emergence of the Internet of Things (IoT) has witnessed immense growth globally with
the use of various devices found in home, transportation, healthcare, and industry. The …

Intelligent cybersecurity approach for data protection in cloud computing based internet of things

A Mughaid, I Obeidat, L Abualigah, S Alzubi… - International Journal of …, 2024 - Springer
Users of computer networks may benefit from cloud computing, which is a fairly new
abstraction that offers features like processing as well as the sharing and storing of data. As …

Artificial intelligence of medical things for medical information systems privacy and security

M Abdulraheem, EA Adeniyi, JB Awotunde… - Handbook of Security …, 2024 - taylorfrancis.com
Artificial intelligence (AI) is a modern approach based on computer research that aims to
create algorithms and programs that make machines clever and effective at carrying out jobs …

[HTML][HTML] Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm

A John, IFB Isnin, SHH Madni, FB Muchtar - Intelligent Systems with …, 2024 - Elsevier
The intrusion detection system (IDS) model, which can identify the presence of intruders in
the network and take some predefined action for safe data transit across the network, is …

Abnormal transactions detection in the ethereum network using semi-supervised generative adversarial networks

YK Sanjalawe, SR Al-E'mari - IEEE Access, 2023 - ieeexplore.ieee.org
Numerous abnormal transactions have been exposed as a result of targeted attacks on
Ethereum, such as the Ethereum Decentralized Autonomous Organization attack. Exploiting …

[HTML][HTML] A Review of Deep Learning Applications in Intrusion Detection Systems: Overcoming Challenges in Spatiotemporal Feature Extraction and Data Imbalance

Y Zhang, RC Muniyandi, F Qamar - Applied Sciences, 2025 - mdpi.com
In the rapid development of the Internet of Things (IoT) and large-scale distributed networks,
Intrusion Detection Systems (IDS) face significant challenges in handling complex …