Security and privacy of technologies in health information systems: A systematic literature review
Health information systems (HISs) have immense value for healthcare institutions, as they
provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and …
provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and …
IoT-AI in Healthcare: A Comprehensive Survey of Current Applications and Innovations.
The convergence of IoT and AI technology has the capacity to revolutionize healthcare by
facilitating the gathering of real-time data and employing sophisticated analytics for tailored …
facilitating the gathering of real-time data and employing sophisticated analytics for tailored …
A Blockchain and IoT-Enabled Secure Health Data Handling Framework
Secure data sharing while preserving user privacy is a critical challenge in Biomedical
applications. This paper presents the Secure Health Data Handling Framework (SHDHF), a …
applications. This paper presents the Secure Health Data Handling Framework (SHDHF), a …
Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach
The rapidly expanding Internet of Medical Things (IoMT) landscape fosters enormous
opportunities for personalized healthcare, yet it also exposes patients and healthcare …
opportunities for personalized healthcare, yet it also exposes patients and healthcare …
[HTML][HTML] Update on Patient Self-Testing with Portable and Wearable Devices: Advantages and Limitations
Laboratory medicine has undergone a deep and multifaceted revolution in the course of
human history, in both organizational and technical terms. Over the past century, there has …
human history, in both organizational and technical terms. Over the past century, there has …
Shadow Health-Related Data: Definition, Categorization, and User Perspectives
Health-related data (HRD) about individuals are increasingly generated and processed. The
sources and volume of such data have grown larger over the past years, they include …
sources and volume of such data have grown larger over the past years, they include …
[HTML][HTML] Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information
Y Li, Y Wang, X Liu, P Zuo, H Li, H Jiang - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) technology has permeated into all aspects of today's society and is
playing an increasingly important role. Identity authentication is crucial for IoT devices to …
playing an increasingly important role. Identity authentication is crucial for IoT devices to …
Network Security Perception System Integrating Improved CNN Algorithm and Improved GRU Algorithm
Y Huang, Z Zhao, C Shi - IEEE Access, 2024 - ieeexplore.ieee.org
To enhance the accuracy and real-time response of network security-aware systems, the
convolutional neural network is optimized by introducing exponentially weighted dempster …
convolutional neural network is optimized by introducing exponentially weighted dempster …
An Empirical Study to Understand the Role of Institution-Based Trust and Its Antecedents in IoT Adoption by Individuals
AK Nath, AK Nath - Journal of International Technology …, 2024 - scholarworks.lib.csusb.edu
ABSTRACT The Internet of Things (IoT) enables the connection between humans, physical
objects, and cyber objects, resulting in monitoring, automation, and decision-making …
objects, and cyber objects, resulting in monitoring, automation, and decision-making …
Attitudes and perceptions towards privacy and surveillance in Australia
AJ Shanley - 2024 - ro.ecu.edu.au
Understanding attitudes towards privacy and surveillance technologies used to enhance
security objectives is a complex, but crucial aspect for policy makers to consider. Historically …
security objectives is a complex, but crucial aspect for policy makers to consider. Historically …